WARNING: Illegal reflective access by ysoserial.payloads.CommonsCollections5 (file:/aa/tools/Medusa/Tool/ysoserial.jar) to field javax.management.BadAttributeValueExpException.val
WARNING: Please consider reporting this to the maintainers of ysoserial.payloads.CommonsCollections5
WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
WARNING: All illegal access operations will be denied in a future release
2021-01-02 19:57:02,550 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:Struts2RemoteCodeExecutionVulnerability59 || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:02,550 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: list index out of range
2021-01-02 19:57:02,982 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:Struts2RemoteCodeExecutionVulnerability61 || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:02,983 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: list index out of range
2021-01-02 19:57:03,710 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:OneCaitongElectronicProcurementSystemUploadsArbitraryFiles2 || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:03,710 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: 'latin-1' codec can't encode characters in position 260-261: Body ('提交') is not valid Latin-1. Use body.encode('utf-8') if you want to send it encoded in UTF-8.
2021-01-02 19:57:03,982 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:B2BbuilderHeadSQLInjectionVulnerability || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:03,983 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: Value for header {Accept: ('text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',)} must be of type str or bytes, not <class 'tuple'>
2021-01-02 19:57:04,763 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:PhpwebArbitraryFileUploadVulnerability || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:04,763 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: 'NoneType' object has no attribute 'group'
2021-01-02 19:57:05,106 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:CsCMSSQLInjectionVulnerability || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:05,106 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: Failed to parse: http://192.168.1.1:9090%s/index.php/dance/so/key/?key=%252527)%20%2561%256E%2564%201=2%20union%20%2573%2565%256C%2565%2563%2574%201,md5(1231231234),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42%23
2021-01-02 19:57:06,482 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:EnableQArbitraryFileUploadVulnerability || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:06,482 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: 'latin-1' codec can't encode characters in position 282-283: Body ('提交') is not valid Latin-1. Use body.encode('utf-8') if you want to send it encoded in UTF-8.
2021-01-02 19:57:06,923 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:EmlogSQLInjectionVulnerability || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:06,923 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: Failed to parse: http://192.168.1.1:9090content/plugins/kl_album/kl_album_ajax_do.php
2021-01-02 19:57:07,632 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:CitrixGatewayPathTraversalVulnerability || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:07,632 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: Value for header {Content-Type: ('application/x-www-form-urlencoded',)} must be of type str or bytes, not <class 'tuple'>
2021-01-02 19:57:07,663 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:Struts2RemoteCodeExecutionVulnerability1 || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:07,663 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: HTTPConnectionPool(host='192.168.1.1', port=9090): Max retries exceeded with url: / (Caused by ConnectTimeoutError(<urllib3.connection.HTTPConnection object at 0x10f601e80>, 'Connection to 192.168.1.1 timed out. (connect timeout=5)'))
2021-01-02 19:57:07,837 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:NginxDirectoryTraversalVulnerability || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:07,837 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: HTTPConnectionPool(host='192.168.1.1', port=9090): Max retries exceeded with url: /files../ (Caused by ConnectTimeoutError(<urllib3.connection.HTTPConnection object at 0x110f313a0>, 'Connection to 192.168.1.1 timed out. (connect timeout=5)'))
2021-01-02 19:57:07,942 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:SeeyouSystemFrameworkVulnerability || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:07,942 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: can only concatenate list (not "str") to list
2021-01-02 19:57:07,942 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:SeeyouSystemFrameworkVulnerability || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:07,942 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: can only concatenate list (not "str") to list
2021-01-02 19:57:07,971 - /aa/tools/Medusa/ClassCongregation.py[line:449] - INFO: Plugin Name:SolrRemoteCodeExecutionVulnerability2 || Target Url:http://192.168.1.1:9090
2021-01-02 19:57:07,971 - /aa/tools/Medusa/ClassCongregation.py[line:450] - WARNING: Expecting value: line 1 column 1 (char 0)