Umuwa Home
  Web     Image     Video     News  
 
Showing results for 852566C90012664F

    Web Results
 
 
Penetration Testing: Re: Using Domino5.0.7 webadmin.ntf to read files 
 
seclists.org
May 17, 2002 ... Supposing that 852566C90012664F is the ReplicaID of webadmin.ntf,by using : http://x.x.x.x:80/852566C90012664F/DBList?ReadForm you ...    
 
 
pentest: Re: Lotus Notes 
 
www.blacksheepnetworks.com/security/resources/pentest/...
/852566C90012664F /admin4.nsf /admin5.nsf /admin.nsf /agentrunner.nsf /alog.nsf /a_domlog.nsf /bookmark.nsf /busytime.nsf /catalog.nsf /certa.nsf /certlog.nsf /certsrv.nsf /chatlog.nsf /clbusy.nsf /cldbdir.nsf /clusta4.nsf /collect4.nsf /da.nsf  
 
 
 
Penetration Testing: Re: Lotus Notes - SecLists.Org 
 
seclists.org
Nov 28, 2002 ... You can also use N-Stealth or any of your favorite web scanners and add the following files: /852566C90012664F /admin4.nsf /admin5.nsf ...    
 
 
carnal0wnage/Metasploit-Code - GitHub 
 
github.com
Dec 3, 2012 ... 852566C90012664F/DBList?ReadForm ?Open ?OpenServer. @CGIDIRScom5.java. @CGIDIRScom5.pl. @CGIDIRSftp.pl. AgentRunner.nsf.    
 
 
Penetration Testing: Re: Lotus Notes - SecLists.Org Security ... 
 
seclists.org/pen-test/2002/Nov/47
... /852566C90012664F /admin4.nsf /admin5.nsf /admin.nsf /agentrunner.nsf /alog.nsf /a_domlog.nsf /bookmark.nsf /busytime.nsf /catalog.nsf /certa.nsf /certlog.nsf /certsrv.nsf /chatlog.nsf /clbusy.nsf /cldbdir.nsf /clusta4.nsf /collect4.nsf /da.nsf /dba4.nsf /dclf.nsf /DEASAppDesign.nsf ...    
 
 
Lotus Notes Penetration - SANS Network, IT Penetration Testing 
 
pen-testing.sans.org
alert tcp any any -> any 80 (msg:"WEB Domino R5 WebAdmin Template access via replica ID";flags: A+; content:"/852566C90012664F"; nocase;) alert tcp any ...    
 
 
SecurityFocus 
 
www.securityfocus.com/archive/101/301644
... > > > > /852566C90012664F > > /admin4.nsf > > /admin5.nsf > > /admin.nsf > > /agentrunner.nsf > > /alog.nsf > > /a_domlog.nsf > > /bookmark.nsf > > /busytime.nsf > > /catalog.nsf > > /certa.nsf > > /certlog.nsf > > /certsrv.nsf > > /chatlog.nsf > > /clbusy.nsf > > /cldbdir.nsf ...  
 
 
 
SecurityFocus Penetration: Re: Lotus Notes 
 
www.derkeiler.com/Mailing-Lists/securityfocus/pen-test/...
/852566C90012664F /admin4.nsf /admin5.nsf /admin.nsf /agentrunner.nsf /alog.nsf /a_domlog.nsf /bookmark.nsf /busytime.nsf /catalog.nsf /certa.nsf /certlog.nsf /certsrv.nsf /chatlog.nsf /clbusy.nsf /cldbdir.nsf /clusta4.nsf /collect4.nsf /da.nsf  
 
 
 
Index of .*(Apache.*) Server at', output = 'Root directory w ... 
 
https://svn.nmap.org/nmap/nselib/data/http-fingerprints.lua
... , { path = '/852566C90012664F', method = 'HEAD' }, { path = '/admin4.nsf', method = 'HEAD' }, { path = '/admin5.nsf', method = 'HEAD' }, { path = '/admin.nsf', method = 'HEAD ...  
 
 
 
security.penetration - Nikto v1.21 scan_database.db lotus ... 
 
osdir.com/ml/security.penetration/2002-11/msg00053.html
... > > > > /852566C90012664F > > /admin4.nsf > > /admin5.nsf > > /admin.nsf > > /agentrunner.nsf > > /alog.nsf > > /a_domlog.nsf > > /bookmark.nsf > > /busytime.nsf > > /catalog.nsf > > /certa.nsf > > /certlog.nsf > > /certsrv.nsf > > /chatlog.nsf > > /clbusy.nsf > > /cldbdir.nsf ...  
 
 
 
pentest: Re: Lotus Notes 
 
www.blacksheepnetworks.com/security/resources/pentest/...
> > /852566C90012664F > > /admin4.nsf > > /admin5.nsf > > /admin.nsf > > /agentrunner.nsf > > /alog.nsf > > /a_domlog.nsf > > /bookmark.nsf > > /busytime.nsf > > /catalog.nsf > > /certa.nsf > > /certlog.nsf > > /certsrv.nsf > > /chatlog.nsf  
 
 
 
Petsex.com FULL SCAN. #OpOutrageBeastiality - Pastebin.com 
 
pastebin.com/FDVsEuLt
+ /852566C90012664F: This database can be read using the replica ID without authentication. + /hidden.nsf: This database can be read without authentication. Common database name. + /mail.box: The mail database can be read without authentication.    
 
 
phoile.kattare.com 
 
phoile.kattare.com/stats/data/petrodigital.com.au/aw...
... /services/last10.php 1 - /megabook/files/20/setup.db 1 - /webmatic/index.php 1 - /postnuke/html/bb_smilies.php 1 - /852566C90012664F 1 - /Petroleum/products/gadgets/Blog/BlogModel.php 1 - /Petroleum/script/admin/lost-pass.php 1 http://petrodigital.com.au/Petroleum/script/admin/lost-pass ...  
 
 
 
phoile.kattare.com 
 
phoile.kattare.com/stats/data/efieldforce.com/awstats...
... bin/view/foswiki/WebHome 2 - /openwebmail.pl 2 - /postnuke/html/bb_smilies.php 2 - /cgi-local/wwwthreads/3tvars.pm 2 - /852566C90012664F 2 - /DkqGdg5N.properties 1 - /aspx/ 2 - /_private/orders.htm 2 - /reports/rwservlet/showmap 4 - /doc/11iRelNotes.txt 2 - /demo/ 4 - /cgi-bin/htdocs ...  
 
 
 
root@kali:~# nikto -h gartic.com.br - Nikto v2.1.6 
 
pastebin.com/jjmu5y2D
+ /lists/admin/: PHPList pre 2.6.4 contains a number of vulnerabilities including remote administrative access, harvesting user info and more. Default login to admin interface is admin/phplist    
 
 
www.hackerboard.de 
 
www.hackerboard.de/webmaster-security/33064-webserver...
+ OSVDB-0: GET /852566C90012664F : This database can be read using the replica id without authentication. + OSVDB-0: GET /index.php?module=My_eGallery : My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection.  
 
 
 
scan_database.db - opensourcejavaphp.net Opensource Java ... 
 
opensourcejavaphp.net/python/w3af/plugins/discovery/...
"generic", "/852566C90012664F", "200", "GET", "This database can be read using the replica id without authentication." "generic", "/hidden.nsf", "200", "GET", "This database can be read withoutauthentication. Common database name."  
 
 
 
Hello! 
 
https://www.cirt.net/nikto/UPDATES/1.23/scan_database.db
","GET","Mambo PHP Portal/Server is vulnerable to Cross Site Scripting (XSS). CA-2000-02." "generic","/ticket.php?id=99999","expects first argument","GET","ZenTrack from http://zentrack.phpzen.net/ versions v2.0.3, v2.0.2beta and older reveal the web root with certain errors."  
 
 
 
Sambar Server - CIRT.net | Suspicion Breeds Confidence 
 
https://www.cirt.net/nikto/UPDATES/1.32/scan_database.db
CA-2000-02." "generic","/syshelp/stmex.stm?foo= "," ","GET","Sambar Server default script is vulnerable to Cross Site Scripting (XSS). CA-2000-02."&bar=456 "generic","/sysuser/docmgr/create.stm?path= "," ","GET","Sambar Server default script is vulnerable to Cross Site Scripting (XSS).  
 
 
 
CGI_XPlatform.fuzz.txt - fuzzdb - Attack and Discovery ... 
 
code.google.com/p/fuzzdb/source/browse/trunk/discovery/...
Attack and Discovery Pattern Database for Application Fuzz Testing. Project Home Downloads Wiki Issues Source Export to GitHub. Checkout Browse Changes  
 
 
 
www.arealestate.com 
 
www.arealestate.com/tmp/awstats/awstats102012.cedar...
... /backup.bz2 1 - /error.aspx 1 - /db/schema.sql 1 - /ax/ 1 - /Minutes/06%20july%20ch%20minutes.pdf 3 - /fuploadcss 1 - /852566C90012664F 1 - /backup/srcsite.tar.gz 1 - /groupadmin 1 - /692 1 - /owa_util.signature 1 - /cron.txt 1 - /export/back.sql 1 - /bak/www.cedarhighlandshoa.org.sql 1 ...  
 
 
 
Webserver auf Sicherheit prüfen - Hackerboard.de 
 
www.hackerboard.de/webmaster-security/33064-webserver...
Webserver auf Sicherheit prüfen. Diskussion: Webserver auf Sicherheit prüfen im Forum Webmaster-Security, in der Kategorie Security Area; ... + OSVDB-0: GET /852566C90012664F : This database can be read using the replica id without authentication.  
 
 
 
Malwr - Malware Analysis by Cuckoo Sandbox 
 
https://malwr.com/analysis/MGFkZGEwZWYyZGIwNDU3OThiNGI5...
Submit malware for free analysis with Cuckoo Sandbox  
 
 
 
Все о Lotus Notes / Domino - NOTESNET.RU > Про Notes ... 
 
www.notesnet.ru/nn/notesnet.nsf/9f5e4d4de1d8f0e2c3256cc...
Введя в браузере URL http://адрес сервера/852566C90012664F/DBList?ReadForm, вполне возможно, вы увидите список всех БД, находящихся на данном сервере.  
 
 
 
retrogod.altervista.org 
 
retrogod.altervista.org/paths.txt
... /666%0a%0a666.jsp /852566C90012664F /?D=A /?M=A /?N=D /?Open /?OpenServer /?PageServices /?S=A /?\ /?sql_debug=1 /?wp-cs-dump /?wp-cs-dump /?wp-html-rend /?wp-start-ver /?wp-stop-ver /?wp-uncheckout /?wp-usr-prop /?wp-ver-diff /?wp-ver- ...    
 
 
Category:OWASP Fuzzing Code Database - OWASP 
 
owasp.com/index.php/Category:OWASP_Fuzzing_Code_Database
This database is a collection of several statements used in code injection, fuzzing and brute-force aproach. All too often security professionals rely on their own repositories of statements collected from assessments they've conducted.  
 
 
 
paste bin - dcpdata - post number 2950900 
 
www.pastebin.ca/2950900
paste bin - dcpdata - post number 2950900    
 
 
endymion.com 
 
endymion.com/awstats/data/awstats062009.endymion.txt
endymion.com  
 
 
 
www.kostochnaring.se 
 
www.kostochnaring.se/awstats/data/awstats072013...
AWSTATS DATA FILE 6.8 (build 1.910) # If you remove this file, all statistics for date 201307 will be lost/reset. # Position (offset in bytes) in this file of beginning of each section for # direct I/O access.  
 
 
 
Все о Lotus Notes / Domino - NOTESNET.RU > Про Notes ... 
 
www.notesnet.ru/nn/notesnet.nsf/9f5e4d4de1d8f0e2c3256cc...
Введя в браузере URL http://адрес сервера/852566C90012664F/DBList?ReadForm, вполне возможно, вы увидите список всех БД, находящихся на данном сервере.  
 
 
 
hacktimes.com - where infomation meets freedom 
 
www.hacktimes.com/parosproxy_un_proxy_http_https_y_mucho_m_s...
addTest("/", "852566C90012664F,a_domlog.nsf,bookmark.nsf,clbusy.nsf,cldbdir.nsf,clusta4.nsf"); addTest("/", "da.nsf,DEASAppDesign.nsf,DEASLog01.nsf,DEASLog02.nsf,DEASLog03.nsf,DEASLog04.nsf,DEASLog05.nsf,DEASLog.ns f,decslog.nsf");  
 
 
 
db_tests - inguma - A Free Penetration Testing And ... 
 
code.google.com/p/inguma/source/browse/data/db_tests?r=2...
A Free Penetration Testing And Vulnerability Research Toolkit. Project Home Downloads Wiki Issues Source. Repository: ...  
 
 
 
www.pumpingplus.com 
 
www.pumpingplus.com/awstats/data/awstats012008.pumping...
AWSTATS DATA FILE 6.5 (build 1.857) # If you remove this file, all statistics for date 200801 will be lost/reset. # Position (offset in bytes) in this file of beginning of each section for # direct I/O access.  
 
 
 
awstats.inera.it 
 
awstats.inera.it/www.bibliotecauniversitaria.ge.it/stats/......
AWSTATS DATA FILE 6.95 (build 1.943) # If you remove this file, all statistics for date 201205 will be lost/reset. # Last config file used to build this data file was /etc/awstats/awstats.www.bibliotecauniversitaria.ge.it.conf. # Position (offset in bytes) in this file for beginning of each ...  
 
 
 
stats.powersource.cx 
 
stats.powersource.cx/awstats/cgi-bin/awstats032013.empty...
... - /COM2. 20 - /private/guestbook.cgi 20 - /scripts/index.php 187 - /store/wp-includes/js/plupload/changelog.txt 20 - /__852566c90012664f.nsf 20 - /admin/phpPgAdmin/sql.php 20 - /myfaces-example-blank/index.jsf 20 - /forum/phpBB/ 20 - /wp-content/plugins/WP-Symposium/readme.txt 20 ...  
 
 
 
www.ethicalhack3r.co.uk 
 
www.ethicalhack3r.co.uk/files/misc/amihackerproof.txt
www.ethicalhack3r.co.uk  
 
 
 


No more results ...
Copyright © 2016 Umuwa. All Rights Reserved. About us / Privacy Policy / Sitemap Most searched