Last Seen: 2025-04-25

GeneralInformation

mail.bapl.com.np
d-codetechnology.com
d-lifestyles.com.np
    mail.d-lifestyles.com.np
debajyotigroup.com
    career.debajyotigroup.com
    careerapi.debajyotigroup.com
    hrms.debajyotigroup.com
    monitor.debajyotigroup.com
    www.debajyotigroup.com
jeevee.com.np
    www.jeevee.com.np
multisys.com.np
    mail.multisys.com.np
    www.mail.multisys.com.np
vespa.com.np
    www.vespa.com.np
vmotosoco.com.np

WebTechnologies

25 / tcp
1124743570 | 2025-04-15T07:00:03.934940
80 / tcp
677579724 | 2025-04-25T23:48:00.452782
110 / tcp
-1283034168 | 2025-04-24T06:32:31.527132
143 / tcp
27672397 | 2025-04-22T16:42:35.770342
443 / tcp
-1239381833 | 2025-04-24T15:43:04.733047
465 / tcp
1124743570 | 2025-04-22T23:09:19.096275
587 / tcp
-1936557268 | 2025-04-10T01:08:57.418866
631 / tcp
260322425 | 2025-04-19T16:15:57.187683
993 / tcp
27672397 | 2025-04-23T12:09:41.380227
995 / tcp
-1283034168 | 2025-04-23T11:30:00.115293
8095 / tcp
-2114835504 | 2025-04-02T03:57:52.305741
10443 / tcp
-1454941180 | 2025-04-22T12:54:12.611975

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2023(1)
CVE-2023-44487
7.5The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
2021(2)
CVE-2021-23017
7.7A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVE-2021-3618
7.4ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.



Contact Us

Shodan ® - All rights reserved