mirror of
https://github.com/danielmiessler/SecLists
synced 2026-03-06 21:34:45 +01:00
| .. | ||
| CGI-HTTP-POST-Windows.fuzz.txt | ||
| CGI-HTTP-POST.fuzz.txt | ||
| CGI-Microsoft.fuzz.txt | ||
| CGI-XPlatform.fuzz.txt | ||
| CGIs.txt | ||
| README.md | ||
CGIs
These wordlists are for testing legacy systems that use Common Gateway Interface scripts.
CGI-HTTP-POST-Windows.fuzz.txt
Use for: Exploiting various vulnerabilities in the now defunct WYSIWYG HTML editor and website administration tool, Microsoft FrontPage
Source: https://github.com/deepak0401/Front-Page-Exploit
Date of last update: Aug 27, 2012
The last version of FrontPage was released on 2003.
CGI-HTTP-POST.fuzz.txt
Use for: Exploiting/Discovering various vulnerabilities in extremely old systems (Circa 1998) that use "CGI".
Date of last update: Aug 27, 2012
This wordlist tests for the following vulnerabilities:
- Default password in the Nortel Meridian private branch exchange telephone switching system. Source: Nikto.
- XSS in the "Bajie HTTP JServer" (software site completely defunct, no archives exist). Source: Nikto
- CGI Vulnerability in an unknown system (payload
lastlines.cgi?process) which would allow attackers to "read arbitrary files and/or execute commands". Source: Nikto - Remote File Include in myPHPNuke. Source: Nessus
- DoS in the "D-Link Ethernet/Fast Ethernet Print Server DP-300+". Source: Sullo's Security Advisory Archive.
CGI-Microsoft.fuzz.txt
Use for: Exploiting/Discovering various vulnerabilities in miscelaneous CGI scripts that run on Microsoft operating systems.
Date of last update: Aug 27, 2012