2012-11-09

www.islamicmessageboard.com your Nemesis was here!Looks like your forum has been infiltrated!

Nmap scan report for www.islamicmessageboard.com (67.20.76.39)
Host is up (0.23s latency).
Not shown: 990 filtered ports
PORT    STATE  SERVICE VERSION
21/tcp  open   ftp     Pure-FTPd
22/tcp  open   ssh     OpenSSH 5.3 (protocol 2.0)
26/tcp  open   smtp    Exim smtpd 4.76
| smtp-commands: host406.hostmonster.com Hello www.islamicmessageboard.com [46.246.17.53], SIZE 52428800, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
|_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
80/tcp  closed http
110/tcp open   pop3    Dovecot pop3d
|_pop3-capabilities: USER CAPA UIDL TOP OK(K) RESP-CODES PIPELINING STLS SASL(PLAIN LOGIN)
113/tcp closed ident
143/tcp open   imap    Dovecot imapd
|_imap-capabilities: LOGIN-REFERRALS QUOTA AUTH=PLAIN LIST-STATUS CHILDREN CONTEXT=SEARCH THREAD=REFERENCES UIDPLUS SORT IDLE MULTIAPPEND CONDSTORE ESEARCH Capability UNSELECT AUTH=LOGINA0001 IMAP4rev1 ID WITHIN QRESYNC LIST-EXTENDED SORT=DISPLAY THREAD=REFS STARTTLS OK completed SEARCHRES ENABLE I18NLEVEL=1 LITERAL+ ESORT SASL-IR NAMESPACE
443/tcp open   ssl     OpenSSL (SSLv3)
|_sslv2: server supports SSLv2 protocol, but no SSLv2 cyphers
993/tcp open   ssl     OpenSSL (SSLv3)
|_sslv2: server supports SSLv2 protocol, but no SSLv2 cyphers
995/tcp open   ssl     OpenSSL (SSLv3)
|_sslv2: server supports SSLv2 protocol, but no SSLv2 cyphers
Device type: general purpose|storage-misc
Running (JUST GUESSING): Linux 2.6.X (87%), HP embedded (87%)
OS CPE: cpe:/o:linux:kernel:2.6
Aggressive OS guesses: Linux 2.6.22 - 2.6.36 (87%), Linux 2.6.32 (87%), Linux 2.6.34 (87%), HP P2000 G3 NAS device (87%), Linux 2.6.18 (85%)
No exact OS matches for host (test conditions non-ideal).
Service Info: Host: host406.hostmonster.com

Target IP:          67.20.76.39
+ Target Hostname:    www.islamicmessageboard.com
+ Target Port:        80
+ Start Time:         2012-11-09
---------------------------------------------------------------------------
+ Server: Apache
+ Cookie PHPSESSID created without the httponly flag
+ The anti-clickjacking X-Frame-Options header is not present.
+ Server leaks inodes via ETags, header found with file /, inode: 12810199, size: 9949, mtime: 0x4909858045799
+ DEBUG HTTP verb may show server debugging information. See http://msdn.microsoft.com/en-us/library/e8z01xdh%28VS.80%29.aspx for details.
+ /scgi-bin/cart32.exe: request cart32.exe/cart32clientlist
+ /scgi-bin/classified.cgi: Check Phrack 55 for info by RFP
+ /scgi-bin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP
+ /scgi-bin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info to writable files.
+ /scgi-bin/flexform: Check Phrack 55 for info by RFP, allows to append info to writable files.
+ /scgi-bin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
+ /scgi-bin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/show.php?p=55&a=7
+ /scgi-bin/lwgate: Check Phrack 55 for info by RFP
+ /scgi-bin/LWGate: Check Phrack 55 for info by RFP
+ /scgi-bin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP
+ /scgi-bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners.
+ /scgi-bin/finger: finger other users, may be other commands?
+ /scgi-bin/finger.pl: finger other users, may be other commands?
+ /scgi-bin/get32.exe: This can allow attackers to execute arbitrary commands remotely.
+ /scgi-bin/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See http://www.attrition.org/~jericho/works/security/greymatter.html for more info.
+ /scgi-bin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file.
+ /scgi-bin/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
+ /scgi-bin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view directories
+ /cgi-sys/formmail.pl: Many versions of FormMail have remote vulnerabilities, including file access, information disclosure and email abuse. FormMail access should be restricted as much as possible or a more secure solution found.
+ /scgi-bin/formmail.pl: Many versions of FormMail have remote vulnerabilities, including file access, information disclosure and email abuse. FormMail access should be restricted as much as possible or a more secure solution found.
+ /scgi-bin/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory.
+ /scgi-bin/html2chtml.cgi: Html2Wml
/sbcgi/sitebuilder.cgi?username=
&password=
&selectedpage=../../../../../../../../../../etc/passwd
+ OSVDB-7715: /scgi-bin/talkback.cgi?article=../../../../../../../../etc/passwd&action=view&matchview=1: Talkback CGI displays arbitrary files
+ /scgi-bin/classifieds/index.cgi: My Classifieds pre 2.12 is vulnerable to SQL injection attacks.
+ /scgi-bin/myguestbook.cgi?action=view: myGuestBook 1.0 may be vulnerable to Cross Site Scripting (XSS) in posted contents. Upgrade to the latest version from http://www.levcgi.com/.  http://www.cert.org/advisories/CA-2000-02.html.
+ OSVDB-21366: /scgi-bin/diagnose.cgi: This COWS (CGI Online Worldweb Shopping) script may give system information to attackers, and may be vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
+ OSVDB-19772: /scgi-bin/title.cgi: HNS's title.cgi is vulnerable to Cross Site Scripting (XSS http://www.cert.org/advisories/CA-2000-02.html) in version 2.00 and earlier, and Lite 0.8 and earlier.
+ OSVDB-21365: /scgi-bin/compatible.cgi: This COWS (CGI Online Worldweb Shopping) script may give system information to attackers, and may be vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
+ /scgi-bin/probecontrol.cgi?command=enable&userNikto=cancer&password=killer: This might be interesting... has been seen in web logs from a scanner.
+ /scgi-bin/probecontrol.cgi?command=enable&username=cancer&password=killer: This might be interesting... has been seen in web logs from a scanner.
+ /scgi-bin/retrieve_password.pl: May not be vulnerable, but see http://www.dcscripts.com/bugtrac/DCForumID7/3.html for information.
+ /scgi-bin/wwwadmin.pl: Administration CGI?
+ /scgi-bin/webmap.cgi: nmap front end... could be fun
+ /scgi-bin/admin/admin.cgi: May be ImageFolio Pro administration CGI. Default login is Admin/ImageFolio.
+ /scgi-bin/admin/setup.cgi: May be ImageFolio Pro setup CGI. Default login is Admin/ImageFolio.
+ /scgi-bin/mt-static/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
+ /scgi-bin/mt/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload.
+ /scgi-bin/dbman/db.cgi?db=no-db: This CGI allows remote attackers to view system information.
+ OSVDB-17111: /scgi-bin/dcshop/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
+ OSVDB-17111: /scgi-bin/DCShop/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
+ OSVDB-596: /scgi-bin/dcshop/orders/orders.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
+ OSVDB-596: /scgi-bin/DCShop/orders/orders.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
+ /scgi-bin/dumpenv.pl: This CGI gives a lot of information to attackers.
+ /scgi-bin/mkilog.exe: This CGI can give an attacker a lot of information.
+ /scgi-bin/mkplog.exe: This CGI can give an attacker a lot of information.
+ OSVDB-596: /scgi-bin/orders/orders.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
+ /scgi-bin/processit.pl: This CGI returns environment variables, giving attackers valuable information.
+ /scgi-bin/rpm_query: This CGI allows anyone to see the installed RPMs
+ OSVDB-17111: /scgi-bin/shop/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
+ OSVDB-596: /scgi-bin/shop/orders/orders.txt: The DCShop installation allows credit card numbers to be viewed remotely. See dcscripts.com for fix information.
+ /scgi-bin/ws_ftp.ini: Can contain saved passwords for ftp sites
+ /scgi-bin/WS_FTP.ini: Can contain saved passwords for ftp sites
+ /scgi-bin/view-source?view-source: This allows remote users to view source code.
+ OSVDB-13978: /scgi-bin/ibill.pm: iBill.pm is installed. This may allow brute forcing of passwords.
+ OSVDB-9332: /scgi-bin/scoadminreg.cgi: This script (part of UnixWare WebTop) may have a local root exploit. It is also an system admin script and should be protected via the web.
+ OSVDB-4663: /scgi-bin/SGB_DIR/superguestconfig: Super GuestBook 1.0 from lasource.r2.ru stores the admin password in a plain text file.
+ /scgi-bin/icat: Multiple versions of icat allow attackers to read arbitrary files. Make sure the latest version is running.
+ /scgi-bin/nph-showlogs.pl?files=../../&filter=.*&submit=Go&linecnt=500&refresh=0: nCUBE Server Manager 1.0 nph-showlogs.pl directory traversal bug
+ OSVDB-6192: /scgi-bin/update.dpgs: Duma Photo Gallery System may allow remote users to write to any file on the system. See http://b0iler.eyeonsecurity.net for details. This could not be remotely tested.
+ /scgi-bin/view-source: This may allow remote arbitrary file retrieval.
+ /scgi-bin/wrap: This CGI lets users read any file with 755 perms. It should not be in the CGI directory.
+ /scgi-bin/cgiwrap: Some versions of cgiwrap allow anyone to execute commands remotely.
+ /cgi-sys/Count.cgi: This may allow attackers to execute arbitrary commands on the server
+ /scgi-bin/Count.cgi: This may allow attackers to execute arbitrary commands on the server
+ /scgi-bin/echo.bat: This CGI may allow attackers to execute remote commands.
+ OSVDB-4571: /scgi-bin/ImageFolio/admin/admin.cgi: ImageFolio (default accout Admin/ImageFolio) may allow files to be deleted via URLs like: ?cgi=remove.pl&uid=111.111.111.111&rmstep=2&category=../../../../../../../../../../../etc/
+ /scgi-bin/info2www: This CGI allows attackers to execute commands.
+ /scgi-bin/infosrch.cgi: This CGI allows attackers to execute commands.
+ /scgi-bin/listrec.pl: This CGI allows attackers to execute commands on the host.
+ /scgi-bin/mailnews.cgi: Some versions allow attacker to execute commands as http daemon. Upgrade or remove.
+ /scgi-bin/mmstdod.cgi: May allow attacker to execute remote commands. Upgrade to version 3.0.26 or higher.
+ /scgi-bin/pagelog.cgi: Some versions of this allow you to create system files. Request 'pagelog.cgi?name=../../../../.././tmp/filename' to try.
+ /scgi-bin/perl?-v: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir.
+ /scgi-bin/perl.exe?-v: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove perl.exe from the CGI dir.
+ /scgi-bin/perl.exe: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir.
+ /scgi-bin/perl: Perl is installed in the CGI directory. This essentially gives attackers a system shell. Remove Perl from the CGI dir.
+ /scgi-bin/plusmail: This CGI may allow attackers to execute commands remotely.
+ OSVDB-10944: /scgi-bin/scripts/slxweb.dll/getfile?type=Library&file=[invalid fileNikto]: SalesLogix WebClient may allow attackers to execute arbitrary commands on the host.
+ OSVDB-10944: /scgi-bin/scripts/slxweb.dll/getfile?type=Library&file=[invalid filename]: SalesLogix WebClient may allow attackers to execute arbitrary commands on the host.
+ /scgi-bin/smartsearch.cgi?keywords=|/bin/cat%20/etc/passwd|: To check for remote execution vulnerability use ?keywords=|/bin/ls| or your favorite command
+ /scgi-bin/smartsearch/smartsearch.cgi?keywords=|/bin/cat%20/etc/passwd|: To check for remote execution vulnerability use ?keywords=|/bin/ls| or your favorite command
+ OSVDB-54034: /scgi-bin/spin_client.cgi?aaaaaaaa: This CGI may be vulnerable to remote execution by sending 8000 x 'a' characters (check to see if you get a 500 error message)
+ OSVDB-10598: /scgi-bin/sscd_suncourier.pl: Sunsolve CD script may allow users to execute arbitrary commands. The script was confirmed to exist, but the test was not done.
+ OSVDB-13981: /scgi-bin/viralator.cgi: May be vulnerable to command injection, upgrade to 0.9pre2 or newer. This flaw could not be confirmed.
+ OSVDB-4854: /scgi-bin/virgil.cgi: The Virgil CGI Scanner 0.9 allows remote users to gain a system shell. This could not be confirmed (try syntax like virgil.cgi?tar=-lp&zielport=31337 to open a connection on port 31337.
+ OSVDB-2088: /scgi-bin/vpasswd.cgi: Some versions of this CGI allow attackers to execute commands on your system. Verify this is the latest version available.
+ OSVDB-236: /scgi-bin/webgais: The webgais allows attackers to execute commands.
+ OSVDB-237: /scgi-bin/websendmail: This CGI may allow attackers to execute arbitrary commands remotely.
+ /scgi-bin/wwwwais: wwwais has a vulnerability that lets attackers run commands as http daemon owner. Request 'CGIDIR/wwwais?version=version=123&' and 4096 bytes of garbage.
+ /scgi-bin/common/listrec.pl: This CGI allows attackers to execute commands on the host.
+ OSVDB-59031: /scgi-bin/stat.pl: Uninets StatsPlus 1.25 from http://www.uninetsolutions.com/stats.html may be vulnerable to command/script injection by manipulating HTTP_USER_AGENT or HTTP_REFERER.
+ OSVDB-28: /scgi-bin/cachemgr.cgi: Manager for squid proxy; problem with RedHat 6 making it public, can allow attacker to perform port scans.
+ OSVDB-142: /scgi-bin/ppdscgi.exe: PowerPlay Web Edition may allow unauthenticated users to view pages.
+ /scgi-bin/webif.cgi: HNS's webif.cgi is vulnerable to allow remote users to rewrite diary entries if 'direct mode' is enabled in version 2.00 and earlier, and Lite 0.8 and earlier.
+ /scgi-bin/.cobalt/siteUserMod/siteUserMod.cgi: Older versions of this CGI allow any user to change the administrator password.
+ /scgi-bin/webdriver: This CGI often allows anyone to access the Informix DB on the host.
+ /scgi-bin/c32web.exe/ChangeAdminPassword: This CGI may contain a backdoor and may allow attackers to change the Cart32 admin password.
+ /scgi-bin/cgi-lib.pl: CGI Library. If retrieved check to see if it is outdated, it may have vulns
+ /scgi-bin/log/nether-log.pl?checkit: Default Pass: nethernet-rules
+ /scgi-bin/mini_logger.cgi: Default password: guest
+ /scgi-bin/mt-static/: Movable Type weblog found. May contain security problems in CGIs, weak passwords, and more. Default login 'Melody' with password 'Nelson'.
+ /scgi-bin/mt/: Movable Type weblog found. May contain security problems in CGIs, weak passwords, and more. Default login 'Melody' with password 'Nelson'.
+ /scgi-bin/nimages.php: Alpha versions of the Nimages package vulnerable to non-specific 'major' security bugs.
+ /scgi-bin/robadmin.cgi: Default password: roblog
+ /scgi-bin/netpad.cgi: netpad.cgi may be an indication of a malicious user on the system, as it allows web access to the file system. It may also have remote vulnerabilities itself. This should be removed or protected.
+ /scgi-bin/troops.cgi: This CGI may be a leftover from a hacked site; may be used to attempt to hack other sites.  It should be investigated further.
+ /scgi-bin/unlg1.1: web backdoor by ULG
+ /scgi-bin/unlg1.2: web backdoor by ULG
+ /scgi-bin/rwwwshell.pl: THC reverse www shell
+ /scgi-bin/photo/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more.
+ OSVDB-2717: /scgi-bin/include/new-visitor.inc.php: Les Visiteurs 2.0.1 and prior are vulnerable to remote command execution. BID 8902 for exploit example.
+ OSVDB-2735: /scgi-bin/musicqueue.cgi: Musicqueue 1.20 is vulnerable to a buffer overflow. Ensure the latest version is installed (exploit not attempted). http://musicqueue.sourceforge.net/
+ OSVDB-279: /scgi-bin/windmail: Some versions are vulnerable. Request 'windmail?-n%20c:\boot.ini%20you@youraddress.com' (replace your address) and see if you get the boot.ini file
+ OSVDB-279: /scgi-bin/windmail.exe: Some versions are vulnerable. Request 'windmail.exe?-n%20c:\boot.ini%20you@youraddress.com' (replace your address) and see if you get the boot.ini file
+ OSVDB-2873: /scgi-bin/gbadmin.cgi?action=change_adminpass: RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 200
+ OSVDB-2873: /scgi-bin/gbadmin.cgi?action=change_automail: RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 200
+ OSVDB-2873: /scgi-bin/gbadmin.cgi?action=colors: RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 200
+ OSVDB-2873: /scgi-bin/gbadmin.cgi?action=setup: RNN Guestbook 1.2 contains multiple vulnerabilities including remotely changing administrative password, deleting posts, changing the setup, remotely executing commands, and more. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 200
+ OSVDB-2915: /scgi-bin/gbpass.pl:  RNN Guestbook 1.2 password storage file. Administrative password should be stored in plaintext. Access gbadmin.cgi in the same directory to (ab)use. By default, the admin password is either 'admin' or 'demo'. See Nov 26, 2003 BugTraq post by brainrawt@ha
+ OSVDB-3092: /scgi-bin/addalink.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/cgiecho: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/cgiemail: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/countedit: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/domainredirect.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/entropybanner.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /cgi-sys/entropysearch.cgi?query=asdfasdf&user=root&basehref=%2F%2Fwww.yourdomain.com/: CPanel's Entropy Search allows username enumeration via the user parameter.
+ OSVDB-3092: /cgi-sys/FormMail-clone.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/FormMail-clone.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/helpdesk.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/mchat.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/randhtml.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/realhelpdesk.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/realsignup.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /cgi-sys/scgiwrap: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/scgiwrap: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/signup.cgi: Default CGI, often with a hosting manager. No known problems, but host managers allow sys admin via web
+ OSVDB-3092: /scgi-bin/GW5/GWWEB.EXE: Groupwise web interface
+ OSVDB-3092: /scgi-bin/dbmlparser.exe: This might be interesting...
+ /error_log: PHP error reveals file system path.
+ OSVDB-3092: /error_log: This might be interesting...
+ OSVDB-3092: /scgi-bin/: This might be interesting... possibly a system shell found.
+ OSVDB-3092: /scgi-bin/.fhp: This might be interesting...
+ OSVDB-3092: /scgi-bin/add_ftp.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/admin.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/admin.php: This might be interesting...
+ OSVDB-3092: /scgi-bin/admin.php3: This might be interesting...
+ OSVDB-3092: /scgi-bin/admin.pl: Might be interesting
+ OSVDB-3092: /scgi-bin/adminhot.cgi: This might be interesting... has been seen in web logs from another CGI scanner.
+ OSVDB-3092: /scgi-bin/adminwww.cgi: This might be interesting... has been seen in web logs from another CGI scanner.
+ OSVDB-3092: /scgi-bin/AnyBoard.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/AnyForm: This might be interesting...
+ OSVDB-3092: /scgi-bin/AnyForm2: This might be interesting...
+ OSVDB-3092: /scgi-bin/ash: This might be interesting... possibly a system shell found.
+ OSVDB-3092: /scgi-bin/ax-admin.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/ax.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/axs.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/bash: This might be interesting... possibly a system shell found.
+ OSVDB-3092: /scgi-bin/bnbform: This might be interesting...
+ OSVDB-3092: /scgi-bin/bnbform.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/cart.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/cgimail.exe: This might be interesting...
+ OSVDB-3092: /scgi-bin/classifieds: This might be interesting...
+ OSVDB-3092: /scgi-bin/classifieds.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/clickcount.pl?view=test: This might be interesting...
+ OSVDB-3092: /scgi-bin/code.php: This might be interesting...
+ OSVDB-3092: /scgi-bin/code.php3: This might be interesting...
+ OSVDB-3092: /scgi-bin/count.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/csh: This might be interesting... possibly a system shell found.
+ OSVDB-3092: /scgi-bin/cstat.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/c_download.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/dasp/fm_shell.asp: This might be interesting...
+ OSVDB-3092: /scgi-bin/day5datacopier.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/dfire.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/dig.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/displayTC.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/edit.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/enter.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/environ.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/environ.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/ex-logger.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/excite: This might be interesting...
+ OSVDB-3092: /scgi-bin/filemail: This might be interesting...
+ OSVDB-3092: /scgi-bin/filemail.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/ftp.pl: This might be interesting... is file transfer allowed?
+ OSVDB-3092: /scgi-bin/ftpsh: This might be interesting... possibly a system shell found.
+ OSVDB-3092: /scgi-bin/getdoc.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/glimpse: This might be interesting...
+ OSVDB-3092: /scgi-bin/hitview.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/jailshell: This might be interesting... possibly a system shell found.
+ OSVDB-105: /scgi-bin/jj: Allows attackers to execute commands as http daemon
+ OSVDB-3092: /scgi-bin/ksh: This might be interesting... possibly a system shell found.
+ OSVDB-3092: /scgi-bin/log-reader.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/log/: This might be interesting...
+ OSVDB-3092: /scgi-bin/login.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/login.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/logit.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/logs.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/logs/: This might be interesting...
+ OSVDB-3092: /scgi-bin/logs/access_log: This might be interesting...
+ OSVDB-3092: /scgi-bin/logs/error_log: This might be interesting...
+ OSVDB-3092: /scgi-bin/lookwho.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/maillist.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/maillist.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/man.sh: This might be interesting...
+ OSVDB-3092: /scgi-bin/meta.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/minimal.exe: This might be interesting...
+ OSVDB-3092: /scgi-bin/nlog-smb.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/nlog-smb.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/noshell: This might be interesting... possibly a system shell found.
+ OSVDB-3092: /scgi-bin/nph-publish: This might be interesting...
+ OSVDB-3092: /scgi-bin/ntitar.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/pass: This could be interesting...
+ OSVDB-3092: /scgi-bin/passwd: This could be interesting...
+ OSVDB-3092: /scgi-bin/passwd.txt: This could be interesting...
+ OSVDB-3092: /scgi-bin/password: This could be interesting...
+ OSVDB-3092: /scgi-bin/post_query: This might be interesting...
+ OSVDB-3092: /scgi-bin/pu3.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/ratlog.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/responder.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/rguest.exe: This might be interesting...
+ OSVDB-3092: /scgi-bin/rksh: This might be interesting... possibly a system shell found.
+ OSVDB-3092: /scgi-bin/rsh: This might be interesting... possibly a system shell found.
+ OSVDB-3092: /scgi-bin/search.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/search.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/session/adminlogin: This might be interesting...
+ OSVDB-3092: /scgi-bin/sh: This might be interesting... possibly a system shell found.
+ OSVDB-3092: /scgi-bin/show.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/stat/: This might be interesting...
+ OSVDB-3092: /scgi-bin/stats-bin-p/reports/index.html: This might be interesting...
+ OSVDB-3092: /scgi-bin/stats.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/stats.prf: This might be interesting...
+ OSVDB-3092: /scgi-bin/stats/: This might be interesting...
+ OSVDB-3092: /scgi-bin/statsconfig: This might be interesting...
+ OSVDB-3092: /scgi-bin/stats_old/: This might be interesting...
+ OSVDB-3092: /scgi-bin/statview.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/survey: This might be interesting...
+ OSVDB-3092: /scgi-bin/survey.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/tablebuild.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/tcsh: This might be interesting... possibly a system shell found.
+ OSVDB-3092: /scgi-bin/test.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/test/test.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/textcounter.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/tidfinder.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/tigvote.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/tpgnrock: This might be interesting...
+ OSVDB-3092: /scgi-bin/ultraboard.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/ultraboard.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/viewlogs.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/w3-msql: This might be interesting...
+ OSVDB-3092: /scgi-bin/w3-sql: This might be interesting...
+ OSVDB-3092: /scgi-bin/webais: This might be interesting...
+ OSVDB-3092: /scgi-bin/webbbs.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/webbbs.exe: This might be interesting...
+ OSVDB-3092: /scgi-bin/webutil.pl: This might be interesting... has been seen in web logs from another CGI scanner.
+ OSVDB-3092: /scgi-bin/webutils.pl: This might be interesting... has been seen in web logs from another CGI scanner.
+ OSVDB-3092: /scgi-bin/webwho.pl: This might be interesting... has been seen in web logs from another CGI scanner.
+ OSVDB-3092: /scgi-bin/wguest.exe: This might be interesting...
+ OSVDB-3092: /scgi-bin/www-sql: This might be interesting...
+ OSVDB-3092: /scgi-bin/wwwboard.cgi.cgi: This might be interesting...
+ OSVDB-3092: /scgi-bin/wwwboard.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/wwwstats.pl: This might be interesting...
+ OSVDB-3092: /scgi-bin/wwwthreads/3tvars.pm: This might be interesting...
+ OSVDB-3092: /scgi-bin/wwwthreads/w3tvars.pm: This might be interesting...
+ OSVDB-3092: /scgi-bin/zsh: This might be interesting... possibly a system shell found.
+ OSVDB-3093: /scgi-bin/adduser.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/amadmin.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/anyboard.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/AT-generate.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/auctiondeluxe/auction.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/awl/auctionweaver.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/bb-ack.sh: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/bb-histlog.sh: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/bb-rep.sh: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/bb-replog.sh: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/bbs_forum.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/build.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/bulk/bulk.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/cached_feed.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/calender_admin.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/cartmanager.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/cbmc/forums.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/cgforum.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/change-your-password.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/clickresponder.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/commandit.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/counter-ord: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/counterbanner: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/counterbanner-ord: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/counterfiglet-ord: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/counterfiglet/nc/: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/CSMailto.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/CSMailto/CSMailto.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/csNews.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/csPassword.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/csPassword/csPassword.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/cutecast/members/: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/day5datanotifier.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/db2www/library/document.d2w/show: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/db_manager.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/DCFORMS98.CGI: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/dnewsweb: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/donothing: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/ezshopper2/loadpage.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/ezshopper3/loadpage.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/if/admin/nph-build.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/ikonboard/help.cgi?: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/imageFolio.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/imagefolio/admin/admin.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/journal.cgi?folder=journal.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/majordomo.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/mojo/mojo.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/ncommerce3/ExecMacro/macro.d2w/%0a%0a: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/ncommerce3/ExecMacro/macro.d2w/NOEXISTINGHTMLBLOCK: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/non-existent.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/nph-exploitscanget.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/nph-maillist.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/parse-file: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/php-cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/pollssi.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/postcards.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/profile.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/quikstore.cfg: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/register.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/replicator/webpage.cgi/: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/rightfax/fuwww.dll/?: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/rmp_query: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/robpoll.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/scripts/*%0a.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/simplestguest.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/simplestmail.cgi: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/statusconfig.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/sws/manager.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/texis/phine: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/Upload.pl: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/utm/admin: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/utm/utm_stat: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin//_vti_bin/fpcount.exe?Page=default.htm|Image=3|Digits=15: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin//_vti_pvt/doctodep.btr: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/cfgwiz.exe: cfgwiz.exe is a Norton Anti-Virus file and should not be available via the web site.
+ OSVDB-3093: /scgi-bin/Cgitest.exe: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/mailform.exe: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/ms_proxy_auth_query/: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/post16.exe: This might be interesting... has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /scgi-bin/.htaccess: Contains authorization information
+ OSVDB-3093: /scgi-bin/.htaccess.old: Backup/Old copy of .htaccess - Contains authorization information
+ OSVDB-3093: /scgi-bin/.htaccess.save: Backup/Old copy of .htaccess - Contains authorization information
+ OSVDB-3093: /scgi-bin/.htaccess~: Backup/Old copy of .htaccess - Contains authorization information
+ OSVDB-3093: /scgi-bin/.htpasswd: Contains authorization information
+ OSVDB-3093: /scgi-bin/.passwd: Contains authorization information
+ OSVDB-3093: /scgi-bin/.wwwacl: Contains authorization information
+ OSVDB-3093: /scgi-bin/.www_acl: Contains authorization information
+ OSVDB-3233: /scgi-bin/test-cgi.bat: This is an Apache for Win default. If Apache is lower than 1.3.23, this can be exploited as in test-cgi.bat?|dir+c:+>..\htdocs\listing.txt, but may not allow data sent back to the browser.
+ OSVDB-3233: /scgi-bin/cgi-test.exe: Default CGI found
+ OSVDB-3380: /scgi-bin/imagemap: imagemap.exe was found. Many versions from different vendors contain flaws.
+ OSVDB-3380: /scgi-bin/imagemap.exe: imagemap.exe was found. Many versions from different vendors contain flaws.
+ OSVDB-3384: /scgi-bin/htimage.exe: htimage.exe may be vulnerable to a buffer overflow in the mapname portion. http://www.microsoft.com/technet/security/bulletin/MS00-028.asp. http://www.securityfocus.com/bid/1117
+ OSVDB-3514: /scgi-bin/vote.cgi: Mike's Vote CGI contained a bug which allowed arbitrary command execution (version 1.2), see http://freshmeat.net/projects/mikessurveycgi/
+ OSVDB-3515: /scgi-bin/quizme.cgi: Mike's Quiz Me! CGI contained a bug which allowed arbitrary command execution (version 0.5), see http://freshmeat.net/users/mikespice/
+ OSVDB-3568: /scgi-bin/sendform.cgi: This CGI by Rod Clark (v1.4.4 and below) may allow arbitrary file reading via email or allow spam to be sent. CVE-2002-0710. http://www.securityfocus.com/bid/5286.
+ OSVDB-4192: /scgi-bin/gettransbitmap: Sun Answerbook2 is vulnerable to a buffer overflow in the gettransbitmap CGI. All default CGIs should be disabled or removed, and Answerbook2 should be disabled if not being used.
+ OSVDB-4261: /scgi-bin/VsSetCookie.exe?: A flaw in VsSetCookie.exe may allow attackers to guess a correct user name & gain access to the Lucent system.
+ OSVDB-4301: /scgi-bin/Webnews.exe: Some versions of WebNews are vulnerable to a buffer overflow. See http://www.nextgenss.com/advisories/netwinnews.txt for more info.
+ OSVDB-4301: /scgi-bin/webnews.pl: WebNews may contain some default users in the binary: testweb/newstest, alwn3845/imaptest, alwi3845/wtest3452, testweb2/wtest4879
+ OSVDB-436: /scgi-bin/sensepost.exe?/c+dir: The presence of sensepost.exe indicates the system is/was vulnerable to a Unicode flaw and was compromised with a test script from SensePost. The sensepost.exe allows command execution (it is a copy of cmd.exe), as did the original unicode exploit (see ht
+ OSVDB-534: /scgi-bin/ustorekeeper.pl?command=goto&file=../../../../../../../../../../etc/passwd: ustorekeeper will display arbitrary files. CVE-2001-0466
+ OSVDB-5689: /scgi-bin/namazu.cgi: Namazu search engine found. Vulnerable to XSS attacks (fixed 2001-11-25). Attacker could write arbitrary files outside docroot (fixed 2000-01-26). http://www.cert.org/advisories/CA-2000-02.html.
+ OSVDB-5709: /scgi-bin/.nsconfig: Contains authorization information
+ OSVDB-6661: /scgi-bin/ion-p.exe?page=c:\winnt\repair\sam: Ion-P allows remote file retrieval.
+ OSVDB-6695: /scgi-bin/rwcgi60: Oracle report server reveals system information without authorization. See Oracle note 133957.1 - Restricting Access to the Reports Server Environment and Output
+ OSVDB-6695: /scgi-bin/rwcgi60/showenv: Oracle report server reveals system information without authorization. See Oracle note 133957.1 - Restricting Access to the Reports Server Environment and Output
+ OSVDB-6698: /scgi-bin/classifieds/classifieds.cgi: Mike's Classifieds CGI contains a bug that allows arbitrary command execution on the server (untested), see http://freshmeat.net/projects/myclassifieds/
+ OSVDB-6699: /scgi-bin/calendar/index.cgi: Mike's Calendar CGI contains a bug that allows arbitrary command execution (version 1.4), see http://freshmeat.net/projects/mycalendar/
+ OSVDB-38580: /scgi-bin/c32web.exe/GetImage?ImageName=CustomerEmail.txt.pdf : Cart32 contains a null byte directory traversal in the ImageName variable.

//The information contained within this publication is

//supplied "as-is"with no warranties or guarantees of fitness

//of use or otherwise.Bot24, Inc nor Bradley Sean Susser accepts

//responsibility for any damage caused by the use or misuse of

//this information

Show more