Exploits: CGI / Webserver
goahead_xpl.txt goahead webserver is by default vulnerable to a couple remote exploits.
formail_xpl.txt /cgi-bin/formmail.pl has a hidden form filed that you can use to execute arbitrary commands as the uid of the webserver.
aolserver.txt AOLServer is vulnerable to a directory traversal exploit.
guestbx.txt guestbook by guestserver (/cgi-bin/guestbook/guestbook.cgi) is vulnerable to an input validation attack - xploit by enz00 of sin.
php-cgi-xpl.txt /cgi-bin/php.cgi is vulnerable to a simple input validation hole.
phcx.c certain php scripts are inherantly vulnerable - here's two .c scripts to exploit php.
w3-msql_xpl.txt the mini-sql web frontend (/cgi-bin/w3-msql) is vulnerable to a buffer overflow. This exploit will shoot an xterm back to you.
zeus_xpl.txt the Zeus webserver has multiple vulnerabilities, as does the Zeus administration web interface (port 9090).
sunjavaweb_xpl.txt sun’s java webserver has an administrative webpage that can be accessed by any remote user with this exploit.
countcgi_xpl.c /cgi-bin/count.cgi, a web counter shipped with apache, is vulnerable to a buffer overflow.
apachephf.txt the world renowned phf vulnerability (/cgi-bin/phf).
apachefinger.txt this web finger interface (/cgi-bin/finger)has two potential security holes.