https://security.stackexchange.com/questions/68405/what-is-tmunblock-cgi-and-can-it-be-exploited-by-shellshock-linux-apache-w



hndUnblock.cgi

 

 
Line #1124 : 187.38.233.45 - - [15/Jan/2018:21:36:45 +0800] "GET /hndUnblock.cgi HTTP/1.1" 404 212

Line #1125 : 187.38.233.45 - - [15/Jan/2018:21:36:48 +0800] "GET /tmUnblock.cgi HTTP/1.1" 404 211

Line #1126 : 187.38.233.45 - - [15/Jan/2018:21:36:52 +0800] "GET /moo HTTP/1.1" 404 201

Line #1127 : 187.38.233.45 - - [15/Jan/2018:21:36:55 +0800] "GET / HTTP/1.1" 200 2073

Line #1128 : 187.38.233.45 - - [15/Jan/2018:21:36:58 +0800] "POST /getcfg.php HTTP/1.1" 404 208

Line #1129 : 187.38.233.45 - - [15/Jan/2018:21:37:04 +0800] "POST /getcfg.php HTTP/1.1" 404 208

 

 

h

posted @ 2018-01-15 22:51  papering  阅读(298)  评论(0编辑  收藏  举报