Jump to content

VOIDEYE


Emperio

Recommended Posts

I used this program called VOIDEYE to check if there are holes in my website and there are too many look at this list...

Started scanning http://www.xxxxxxxxxx.host.com

----------------------------------------

http://www.xxxxxxxxxx.host.com/cgi-bin/handler - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/test-cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/nph-test-cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/phf - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/phf.pp - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/phf.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/websendmail - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/php.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/php - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/perl.exe - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/wwwboard.pl - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/www-sql - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/view-source - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/AT-admin.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/wwwadmin.pl - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/formmail.pl - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/sendform.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/maillist.pl - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/iisadmpwd/achg.htr - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/iisadmpwd/aexp.htr - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/iisadmpwd/aexp2.htr - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/iisadmpwd/aexp2b.htr - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/iisadmpwd/aexp3.htr - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/iisadmpwd/aexp4.htr - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/iisadmpwd/aexp4b.htr - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/iisadmpwd/anot.htr - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/iisadmpwd/anot3.htr - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/msadc/Samples/SELECTOR/showcode.asp - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/_AuthChangeUrl? - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/_AuthChangeUrl? - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/....../autoexec.bat - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/_AuthChangeUrl? - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/scripts/fpcount.exe - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/scripts/cgimail.exe - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/scripts/tools/newdsn.exe - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/scripts/tools/getdrvs.exe - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/bnbform.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/survey.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/domcfg.nsf/?open - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/count.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/guestbook.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/aglimpse - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/finger?@localhost - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/jj - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/man.sh - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/webdist.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/wrap.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/handler.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/day5datacopier.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/day5datanotifier.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/pfdisplay.cgi - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/perl/files.pl - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/scripts/convert.bas - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/dumpenv.pl - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/upload.pl - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/session/adminlogin?RCpage=/sysadmin/index.stm - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/campas - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/textcounter.pl - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/view-source - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/webgais - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/htmlscript - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-win/uploader.exe - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-win/uploader.exe - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-dos/args.cmd - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-dos/args.bat - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/nph-publish - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cgi-bin/faxsurvey - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/~root - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/_vti_pvt/users.pwd - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/_vti_pvt/administrators.pwd - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/_vti_pvt/shtml.dll - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/_vti_pvt/shtml.exe - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cfdocs/expelval/openfile.cfm - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cfdocs/expelval/exprcalc.cfm - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cfdocs/expelval/displayopenedfile.cfm - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/cfdocs/expelval/sendmail.cfm - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/search97.vts - FOUND (200 OK)

http://www.xxxxxxxxxx.host.com/?PageServices - FOUND (200 OK)

 

 

Does this happen because i coded it some kind of way or is this because of the host or what?

Link to comment
https://forums.phpfreaks.com/topic/198544-voideye/
Share on other sites

I guess I'm not sure what you're asking ...

 

it's retuning a 200 code, which means that that page or file has been found okay... should it be doing something different?

 

I couldn't figure out what he's asking either. It looks like some bot that scans a webpage and reports executable files it finds? The mere presence of these files doesn't tell us whether or not a security vulnerability is present, however. It depends on what those scripts actually do and what their permissions are set to.

Link to comment
https://forums.phpfreaks.com/topic/198544-voideye/#findComment-1041992
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.