From a693ec13e1938edc8cfec8d993183199489274e2 Mon Sep 17 00:00:00 2001 From: "Ignacio J. Perez Portal" <5990@protonmail.com> Date: Wed, 11 Sep 2024 04:02:40 -0300 Subject: [PATCH] feat(docs): Added documentation for 'CGI-HTTP-POST-Windows.fuzz.txt' wordlist --- Discovery/Web-Content/README.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/Discovery/Web-Content/README.md b/Discovery/Web-Content/README.md index eaa3eede..b07c8d92 100644 --- a/Discovery/Web-Content/README.md +++ b/Discovery/Web-Content/README.md @@ -18,6 +18,12 @@ Date of last update: Jan 26, 2015 Use for: Discovering sensitive content in Apache Tomcat servers. Date of last update: Dec 14, 2017 +## CGI-HTTP-POST-Windows.fuzz.txt +Use for: Exploiting various vulnerabilities in the now defunct WYSIWYG HTML editor and website administration tool, [Microsoft FrontPage](https://en.wikipedia.org/wiki/Microsoft_FrontPage) +Source: https://github.com/deepak0401/Front-Page-Exploit +Date of last update: Aug 27, 2012 +The last version of FrontPage was released on 2003. + ## raft-* wordlists Use for: Directory and file brute-forcing leading to identification of vulnerabilities in web applications. Source: [Google's RAFT](https://code.google.com/archive/p/raft/)