
Google Search Dork: intitle:"Index of /" modified php.exe
PHP installed as a cgi-bin on a Windows Apache server will allow an attacker to view arbitrary files on the hard disk, for example by requesting "/php/php.exe?c:\boot.ini."
intitle:"Index of /" modified php.exe Google Dork Source : intitle:"Index of /" modified php.exe