
Google Search Dork: ext:cgi inurl:editcgi.cgi inurl:file=
This was inspired by the K-Otic report. Only two results at time of writing. The cgi script lets you view any file on the system, including /etc/.. (guess it ;)http://www.k-otik.com/exploits/08242004.Axis.sh.php
ext:cgi inurl:editcgi.cgi inurl:file= Google Dork Source : ext:cgi inurl:editcgi.cgi inurl:file=