美的某站命令执行/威胁内网

责声明">
漏洞标题 美的某站命令执行/威胁内网 相关厂商 midea.com 漏洞作者 凌零1 提交时间 2016-05-11 22:23 公开时间 2016-06-26 00:00 漏洞类型 命令执行 危害等…
Failure when receiving data from the peer http://172.16.12.52: 8080>> Apache Tomcat>> Apache-Coyote/1.1>>成功 http://172.16.12.53: 8080>> Apache Tomcat>> Apache-Coyote/1.1>>成功 http://172.16.12.59: 8081>> Apache Tomcat/7.0.63>> Apache-Coyote/1.1>>成功 http://172.16.12.60: 80>>登录>> nginx/1.8.0>>成功 http://172.16.12.73: 8080>> Apache Tomcat/7.0.63>> Apache-Coyote/1.1>>成功 http://172.16.12.74: 8081>> Apache Tomcat/7.0.65>> Apache-Coyote/1.1>>成功 http://172.16.12.74: 8080>> Apache Tomcat/7.0.65>> Apache-Coyote/1.1>>成功 http://172.16.12.78: 80>>在此处插入标题>> nginx/1.9.3>>成功 http://172.16.12.79: 80>>在此处插入标题>> nginx/1.9.3>>成功 http://172.16.12.83: 8080>>登录>> Apache-Coyote/1.1>>成功 http://172.16.12.85: 8088>>欢迎来到nginx!>> nginx/1.4.7>>成功 http://172.16.12.88: 8080>>登录>> Apache-Coyote/1.1>>成功 http://172.16.12.90: 8088>>欢迎来到nginx!>> nginx/1.4.7>>成功 http://172.16.12.59: 8080>> Apache Tomcat/7.0.63>> Apache-Coyote/1.1>>成功 Failure when receiving data from the peer http://172.16.12.150: 8088>> >> Jetty(6.1.26)>>成功 http://172.16.12.149: 8081>> >> Jetty(8.y.z-SNAPSHOT)>>成功 http://172.16.12.151: 8081>>爬行者的火花工作者151: 43218>> Jetty(8.y.z-SNAPSHOT)>>成功 http://172.16.12.152: 8081>> Sparkr工作者在crawl152: 40201>> Jetty(8.y.z-SNAPSHOT)>>成功 http://172.16.12.157: 80>> >> Apache/2.2.15(CentOS)>>成功 http://172.16.12.161: 80>>欢迎来到tengine!>> Tengine/1.5.2>>成功 http://172.16.12.162: 80>>欢迎来到tengine!>> Tengine/1.5.2>>成功 http://172.16.12.175: 80>> >> Apache/2.2.29(Unix)mod_ssl/2.2.29 OpenSSL/1.0.0-fips>>成功 http://172.16.12.188: 80>> Apache Tomcat/7.0.65>> Apache-Coyote/1.1>>成功 http://172.16.12.189: 80>> Apache Tomcat/7.0.65>> Apache-Coyote/1.1>>成功 http://172.16.12.190: 80>> Apache Tomcat/7.0.65>> Apache-Coyote/1.1>>成功 http://172.16.12.195: 80>>欢迎来到nginx!>> nginx>>成功 http://172.16.12.206: 80>> >> Apache-Coyote/1.1>>成功 Failure when receiving data from the peer http://172.16.12.234: 8081>>火花工人在mvxl1741: 46181>>码头(8.y.z-SNAPSHOT)>>成功 http://172.16.12.235: 8081>>火花工人在mvxl1742: 43937>>码头(8.y.z-SNAPSHOT)>>成功 http://172.16.12.236: 8081>>火花工人在mvxl1743: 54045>>码头(8.y.z-SNAPSHOT)>>成功 http://172.16.12.237: 8080>> Apache Tomcat/7.0.54>> Apache-Coyote/1.1>>成功 http://172.16.12.238: 8080>> Apache Tomcat/7.0.54>> Apache-Coyote/1.1>>成功 http://172.16.12.239: 8080>> Apache Tomcat/7.0.54>> Apache-Coyote/1.1>>成功 http://172.16.12.239: 8081>> Apache Tomcat/7.0.54>> Apache-Coyote/1.1>>成功 http://172.16.12.246: 8080>> Apache Tomcat/7.0.54>> Apache-Coyote/1.1>>成功 http://172.16.12.247: 8080>> Apache Tomcat/7.0.54>> Apache-Coyote/1.1>>成功 http://10.16.0.44: 80>>美的集团赛门铁克SEP反病毒部署网页>> Microsoft-IIS/7.5>>成功 http://10.16.0.55: 80>> >> Microsoft-IIS/8.5>>成功 http://172.16.16.21: 80>>?>> nginx/1.4.1>>成功 http://172.16.16.16: 8080>>产品登录屏幕>> Apache-Coyote/1.1>>成功 Failure when receiving data from the peer http://172.16.16.49: 8081>>经销商营销管理系统(官方环境)>> null>>成功 http://172.16.16.14: 80>> >> Microsoft-IIS/6.0>>成功 http://172.16.16.61: 80>> >> Microsoft-IIS/7.5>>成功 http://172.16.16.63: 80>> >> Apache>>成功 http://172.16.16.63: 8081>> 172.16.16.63 - />>Microsoft-IIS/6.0>>成功 http://172.16.16.52: 80>> >> Microsoft-IIS/6.0>>成功 http://172.16.16.72: 80>> >> Microsoft-IIS/5.0>>成功 http://172.16.16.70: 80>>? IT ??>> Microsoft-IIS/6.0>>成功 http://172.16.16.66: 80>> >> Microsoft-IIS/6.0>>成功 http://172.16.16.79: 8080>> Apache Tomcat>> Apache-Coyote/1.1>>成功 http://172.16.16.80: 80>>产品登录界面>> IBM_HTTP_Server>>成功 http://172.16.16.84: 80>> >> Serv-U/11.1.0.7>>成功 http://172.16.16.98: 8080>> >> Microsoft-IIS/5.0>>成功 http://172.16.16.79: 80>> >> Microsoft-IIS/6.0>>成功 http://172.16.16.102: 8080>> >> Apache-Coyote/1.1>>成功 http://172.16.16.81: 80>> >> Microsoft-IIS/6.0>>成功 Failure when receiving data from the peer http://172.16.16.128: 8080>>美丽的精品家电 - 精致的生活,只需一瞬间>> Apache/2.2.14(Win32)D */2 mod_ssl/2.2.14 OpenSSL/0.9.8l mod_autoindex_color PHP/5.3。 1 mod_apreq2-20090110/2.7.1 mod_perl/2.0.4 Perl/v5.10.1>>成功 http://172.16.16.128: 80>>美丽的精品家电 - 精致的生活,触摸的>> Apache/2.2.14(Win32)D */2 mod_ssl/2.2.14 OpenSSL/0.9.8l mod_autoindex_color PHP/5.3。 1 mod_apreq2-20090110/2.7.1 mod_perl/2.0.4 Perl/v5.10.1>>成功 http://172.16.16.134: 80>> (正式环境)Welling Holdings供应链管理平台>> null>>成功 http://172.16.16.131: 80>> 172.16.16.131 - />>Microsoft-IIS/6.0>>成功 http://172.16.16.141: 80>> >> Apache-Coyote/1.1>>成功 http://172.16.16.142: 80>>中国营销总部销售管理平台>> null>>成功 http://172.16.16.154: 80>> JX01 ???>> Apache-Coyote/1.1>>成功 http://172.16.16.152: 80>> Midea Group EAM(机电) - 测试环境>> Resin/3.0.22>>成功 http://172.16.16.158: 80>> Midea Real Estate>> Microsoft-IIS/6.0>>成功 http://172.16.16.165: 8080>> >> Apache-Coyote/1.1>>成功 http://172.16.16.166: 80>> Apache Tomcat>> Apache-Coyote/1.1>>成功 Failure when receiving data from the peer http://172.16.16.204: 80>> >> Apache/2.2.17(Win32)>>成功 http://172.16.16.205: 80>> >> Apache/2.2.17(Win32)>>成功 http://172.16.16.208: 80>> >> Microsoft-IIS/6.0>>成功 http://172.16.16.210: 80>>美的外部赛门铁克防病毒部署网络>> Microsoft-IIS/7.5>>成功 http://172.16.16.212: 80>> >> IBM_HTTP_Server>>成功 http://172.16.16.212: 8080>> Apache Tomcat/7.0.54>> Apache-Coyote/1.1>>成功 http://172.16.16.214: 80>> Ando Zhitongbao>> Apache-Coyote/1.1>>成功 http://172.16.16.215: 80>> Apache Tomcat>> Apache-Coyote/1.1>>成功 http://172.16.16.215: 8080>> Apache Tomcat/5.0.28>> Apache-Coyote/1.1>>成功 http://172.16.16.185: 80>> >> Microsoft-IIS/6.0>>成功 http://172.16.16.229: 80>> >> Microsoft-IIS/6.0>>成功 http://172.16.16.184: 80>> >> Microsoft-IIS/6.0>>成功 http://172.16.16.240: 80>>?>> nginx/1.4.1>>成功 http://172.16.16.241: 80>> >> null>>成功 http://172.16.16.241: 8080>> >> null>>成功 Failure when receiving data from the peer
  • 发表于 2016-07-17 08:00
  • 阅读 ( 426 )
  • 分类:黑客技术

你可能感兴趣的文章

相关问题

0 条评论

请先 登录 后评论
不写代码的码农
黑客

2107 篇文章

作家榜 »

  1. 黑客 2107 文章