Hi guys,<br><br>running a scan against my apache web server shows that.<br><br>+ OSVDB-0: GET /scripts/banner.cgi : This CGI may allow attackers to read any file on the system.<br>+ OSVDB-0: GET /scripts/bannereditor.cgi : This CGI may allow attackers to read any file on the system.<br>
+ OSVDB-0: GET /sips/sipssys/users/a/admin/user : SIPS v0.2.2 allows user account info (including password) to be retrieved remotely.<br>+ OSVDB-0: GET /scripts/addbanner.cgi : This CGI may allow attackers to read any file on the system.<br>
+ OSVDB-0: GET /scripts/ans.pl?p=../../../../../usr/bin/id|&blah : Avenger's News System allows commands to be issued remotely.<br>+ OSVDB-0: GET /scripts/ans/ans.pl?p=../../../../../usr/bin/id|&blah : Avenger's News System allows commands to be issued remotely.<br>
+ OSVDB-0: GET /admentor/adminadmin.asp : Version 2.11 of AdMentor is vulnerable to SQL injection during login, in the style of: ' or =<br>+ OSVDB-0: GET /index.php?module=My_eGallery : My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection.<br>
+ OSVDB-0: GET /scripts/Count.cgi : This may allow attackers to execute arbitrary commands on the server<br>+ OSVDB-0: GET /isapi/count.pl? : AN HTTPd default script may allow writing over arbitrary files with a new content of '1', which could allow a trivial DoS. Append /../../../../../ctr.dll to replac<br>
e this file's contents, for example.<br>+ OSVDB-376: GET /admin/contextAdmin/contextAdmin.html : Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin.<br>+ OSVDB-3092: GET /cgi-bin/textcounter.pl : This might be interesting...<br>
+ OSVDB-13483: GET /adsamples/config/site.csc : Contains SQL username/password<br>+ OSVDB-3092: GET /advworks/equipment/catalog_type.asp : This might be interesting...<br>+ OSVDB-3092: GET /scripts/counter.exe : This might be interesting...<br>
+ OSVDB-3233: GET /scripts/fpcount.exe : Default FrontPage CGI found.<br><br><br>The thing is that none of these files exist on the server. <br><br>Any idea why this shows up ?<br><br>Best Regards,<br>Nick.<br>