威胁情报&&CVE仓库送达!
2022-10-21 00:2:17 Author: 李白你好(查看原文) 阅读量:68 收藏

免责声明

由于传播、利用本公众号李白你好所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,公众号李白你好及作者不为此承担任何责任,一旦造成后果请自行承担!如有侵权烦请告知,我们会立即删除并致歉。谢谢!

01 恶意IP整理

攻击者IP整理,恶意IP建议封堵

138.197.129.239

179.43.139.202

64.39.111.157

64.39.111.231

46.101.142.167

216.127.168.148

134.192.245.60

39.111.111.111

173.82.57.59

167.99.144.251

41.214.134.202

35.173.166.147

188.166.164.3

139.162.80.45

157.245.96.95

143.110.245.139

165.22.219.213

208.64.228.19

159.89.173.74

200.98.129.174

103.144.8.105

103.144.8.117

109.248.6.93

8.142.133.44

16.35.218.7

02 CVE仓库

有新的CVE仓库送达!

描述:Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.
链接:https://github.com/SeanWrightSec/CVE-2022-42889-PoC
——————
描述:None
链接:https://github.com/trhacknon/CVE-2022-40684
——————
描述:None
链接:https://github.com/neerazz/CVE-2022-42889
——————
描述:Exploit of College Website v1.0 CMS - SQL injection
链接:https://github.com/lus33rr/CVE-2022-27414
——————
描述:Utilities for exploiting vulnerability CVE-2022-40684 (FortiOS / FortiProxy / FortiSwitchManager - Authentication bypass on administrative interface).
链接:https://github.com/und3sc0n0c1d0/CVE-2022-40684
——————
描述:Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)
链接:https://github.com/efchatz/easy-exploits
——————
描述:A fully automated, accurate, and extensive scanner for finding text4shell RCE CVE-2022-42889
链接:https://github.com/securekomodo/text4shell-scan

下面公众号专注CVE仓库推送,欢迎关注!

03 往期精彩

Xray_1.9.3_高级版

2022-10-18 有新的CVE仓库送达!

Windows 应急响应信息采集器

实战钓鱼-通过在线客服打穿内网(细节决定成败)

棋牌站注入到远程桌面

文章来源:网络安全情报攻防站

原文地址:https://t.zsxq.com/04NZbUZvR

如需转载本样式风格、字体版权请保留出处:李白你好


文章来源: http://mp.weixin.qq.com/s?__biz=MzkwMzMwODg2Mw==&mid=2247494588&idx=1&sn=ed0ca2d60380ad9e8337dc708804d249&chksm=c09a98ecf7ed11fadb2e929b03c2996348bc631a016d92a4393fadde6cf400b60fb8cf0f7ba5#rd
如有侵权请联系:admin#unsafe.sh