免责声明
由于传播、利用本公众号李白你好所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,公众号李白你好及作者不为此承担任何责任,一旦造成后果请自行承担!如有侵权烦请告知,我们会立即删除并致歉。谢谢!
01 恶意IP整理
攻击者IP整理,恶意IP建议封堵
138.197.129.239
179.43.139.202
64.39.111.157
64.39.111.231
46.101.142.167
216.127.168.148
134.192.245.60
39.111.111.111
173.82.57.59
167.99.144.251
41.214.134.202
35.173.166.147
188.166.164.3
139.162.80.45
157.245.96.95
143.110.245.139
165.22.219.213
208.64.228.19
159.89.173.74
200.98.129.174
103.144.8.105
103.144.8.117
109.248.6.93
8.142.133.44
16.35.218.7
02 CVE仓库
有新的CVE仓库送达!
描述:Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.
链接:https://github.com/SeanWrightSec/CVE-2022-42889-PoC
——————
描述:None
链接:https://github.com/trhacknon/CVE-2022-40684
——————
描述:None
链接:https://github.com/neerazz/CVE-2022-42889
——————
描述:Exploit of College Website v1.0 CMS - SQL injection
链接:https://github.com/lus33rr/CVE-2022-27414
——————
描述:Utilities for exploiting vulnerability CVE-2022-40684 (FortiOS / FortiProxy / FortiSwitchManager - Authentication bypass on administrative interface).
链接:https://github.com/und3sc0n0c1d0/CVE-2022-40684
——————
描述:Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)
链接:https://github.com/efchatz/easy-exploits
——————
描述:A fully automated, accurate, and extensive scanner for finding text4shell RCE CVE-2022-42889
链接:https://github.com/securekomodo/text4shell-scan
下面公众号专注CVE仓库推送,欢迎关注!
03 往期精彩
文章来源:网络安全情报攻防站
原文地址:https://t.zsxq.com/04NZbUZvR
如需转载本样式风格、字体版权,请保留出处:李白你好