乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2014-05-14: 细节已通知厂商并且等待厂商处理中 2014-05-19: 厂商已经主动忽略漏洞,细节向公众公开
赛迪网Cacti弱口令
http://115.182.21.54/账户名密码admin/admin
Apache EnvironmentVariable ValueHTTP_HOST 115.182.21.54HTTP_CONNECTION keep-aliveHTTP_ACCEPT text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8HTTP_USER_AGENT Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/29.0.1547.66 Safari/537.36 LBBROWSERHTTP_REFERER http://115.182.21.54/utilities.phpHTTP_ACCEPT_ENCODING gzip,deflate,sdchHTTP_ACCEPT_LANGUAGE zh-CN,zh;q=0.8HTTP_COOKIE Cacti=cc59ae3aa587fcb59462884f789a7fac; Hm_lvt_3d143f0a07b6487f65609d8411e5464f=1400067930; Hm_lpvt_3d143f0a07b6487f65609d8411e5464f=1400067985PATH /usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin:/root/binLD_LIBRARY_PATH /usr/local/apache/libSERVER_SIGNATURE no valueSERVER_SOFTWARE Apache/2.4.6 (Unix)SERVER_NAME 115.182.21.54SERVER_ADDR 115.182.21.54SERVER_PORT 80REMOTE_ADDR 36.248.194.119DOCUMENT_ROOT /usr/local/apache/htdocs/cactiREQUEST_SCHEME httpCONTEXT_PREFIX no valueCONTEXT_DOCUMENT_ROOT /usr/local/apache/htdocs/cactiSERVER_ADMIN [email protected]SCRIPT_FILENAME /usr/local/apache/htdocs/cacti/utilities.phpREMOTE_PORT 1579GATEWAY_INTERFACE CGI/1.1SERVER_PROTOCOL HTTP/1.1REQUEST_METHOD GETQUERY_STRING action=view_techREQUEST_URI /utilities.php?action=view_techSCRIPT_NAME /utilities.php
危害等级:无影响厂商忽略
忽略时间:2014-05-19 19:55
暂无