I. PHF Vulnerability
This PHF loophole seems to be the most classic, almost all articles will be introduced, you can execute the server commands, such as display
/ETC/PASSWD:
Lynx
cgi| Security | Security vulnerabilities CGI security vulnerability data Quick Check v1.0
Date: 2000-8-15
#############################################################################
This article is taken from a friend. This is not a precious
cgi| Security | Security Vulnerabilities 26
Type: Attack type
Name: webwho.pl
Risk Rating: Medium
Description: If you have webwho.pl this CGI script in your Web executable directory, the intruder will be able to use it to read and write any files
Shellshock vulnerability review and analysis test
0x00 vulnerability Overview
Many may have a deep memory of the Heartbleed Bug in the first half of 2014. In September 2014, another "destruction-level" vulnerability-Bash software security
After analyzing CGI interfaces for a period of time, I feel that various WEB interfaces have been analyzed for a period of time. I feel that various WEB servers are not very uniform with some variables and do not understand some security
The vulnerabilities of IIS in the second half of last year are endless, given the current widespread use of IIS, it is necessary to summarize the information collected.
1. Introduced
The method described here is mainly done through Port 80来,
CGI vulnerability Exploitation
CGI vulnerabilities are the easiest part for network administrators. I tested the vulnerabilities on this website,Let me briefly talk about some common vulnerabilities. General principle, solution. If not fully
cgi| Security | Security Vulnerabilities 51
Type: Attack type
Name: Search97.vts
Risk Rating: Medium
Description: This file will enable the intruder to read any files that the httpd user can read in your system.
Recommendation: Delete or remove
This article is taken from a friend. this is not a precious thing. if you pay attention to the collection, I believe many people will have more comprehensive and better information than this one. but for some reason. these materials have never been
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.