SecLists/Discovery/Web-Content/LEGACY-SERVICES/CGIs
2025-02-21 21:01:07 -03:00
..
CGI-HTTP-POST-Windows.fuzz.txt chore(wordlist): Moved CGI wordlists into the 'LEGACY-SERVICES/CGIs' directory 2025-02-21 21:01:07 -03:00
CGI-HTTP-POST.fuzz.txt chore(wordlist): Moved CGI wordlists into the 'LEGACY-SERVICES/CGIs' directory 2025-02-21 21:01:07 -03:00
CGI-Microsoft.fuzz.txt chore(wordlist): Moved CGI wordlists into the 'LEGACY-SERVICES/CGIs' directory 2025-02-21 21:01:07 -03:00
CGI-XPlatform.fuzz.txt chore(wordlist): Moved CGI wordlists into the 'LEGACY-SERVICES/CGIs' directory 2025-02-21 21:01:07 -03:00
CGIs.txt chore(wordlist): Moved CGI wordlists into the 'LEGACY-SERVICES/CGIs' directory 2025-02-21 21:01:07 -03:00
README.md chore(wordlist): Moved CGI wordlists into the 'LEGACY-SERVICES/CGIs' directory 2025-02-21 21:01:07 -03:00

CGIs

These wordlists are for testing legacy systems that use Common Gateway Interface scripts.

CGI-HTTP-POST-Windows.fuzz.txt

Use for: Exploiting various vulnerabilities in the now defunct WYSIWYG HTML editor and website administration tool, Microsoft FrontPage

Source: https://github.com/deepak0401/Front-Page-Exploit

Date of last update: Aug 27, 2012

The last version of FrontPage was released on 2003.

CGI-HTTP-POST.fuzz.txt

Use for: Exploiting/Discovering various vulnerabilities in extremely old systems (Circa 1998) that use "CGI".

Date of last update: Aug 27, 2012

This wordlist tests for the following vulnerabilities:

  • Default password in the Nortel Meridian private branch exchange telephone switching system. Source: Nikto.
  • XSS in the "Bajie HTTP JServer" (software site completely defunct, no archives exist). Source: Nikto
  • CGI Vulnerability in an unknown system (payload lastlines.cgi?process) which would allow attackers to "read arbitrary files and/or execute commands". Source: Nikto
  • Remote File Include in myPHPNuke. Source: Nessus
  • DoS in the "D-Link Ethernet/Fast Ethernet Print Server DP-300+". Source: Sullo's Security Advisory Archive.

CGI-Microsoft.fuzz.txt

Use for: Exploiting/Discovering various vulnerabilities in miscelaneous CGI scripts that run on Microsoft operating systems.

Date of last update: Aug 27, 2012