120.26.201.85

Regular View Raw Data Timeline

GeneralInformation

Country China
City Hangzhou
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024(72)
CVE-2024-40898
7.5SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue. 
CVE-2024-38477
7.5null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CVE-2024-38476
9.8Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CVE-2024-38474
9.8Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI. Users are recommended to upgrade to version 2.4.60, which fixes this issue. Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.
CVE-2024-25117
6.8php-svg-lib is a scalable vector graphics (SVG) file parsing/rendering library. Prior to version 0.5.2, php-svg-lib fails to validate that font-family doesn't contain a PHAR url, which might leads to RCE on PHP < 8.0, and doesn't validate if external references are allowed. This might leads to bypass of restrictions or RCE on projects that are using it, if they do not strictly revalidate the fontName that is passed by php-svg-lib. The `Style::fromAttributes(`), or the `Style::parseCssStyle()` should check the content of the `font-family` and prevents it to use a PHAR url, to avoid passing an invalid and dangerous `fontName` value to other libraries. The same check as done in the `Style::fromStyleSheets` might be reused. Libraries using this library as a dependency might be vulnerable to some bypass of restrictions, or even remote code execution, if they do not double check the value of the `fontName` that is passed by php-svg-lib. Version 0.5.2 contains a fix for this issue.
CVE-2024-21247
3.8Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data as well as unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).
CVE-2024-21241
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21239
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21238
5.3Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.39 and prior, 8.4.1 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21237
2.2Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).
CVE-2024-21236
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21231
3.1Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).
CVE-2024-21230
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21219
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21218
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21213
4.2Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).
CVE-2024-21212
4.4Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Health Monitor). Supported versions that are affected are 8.0.39 and prior and 8.4.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21207
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.38 and prior, 8.4.1 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21203
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21201
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21200
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21199
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21198
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21197
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21196
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21194
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21193
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21173
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21171
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21166
5.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H).
CVE-2024-21165
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 8.0.37 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21163
5.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
CVE-2024-21162
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21160
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21159
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21157
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.36 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21142
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21137
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21135
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21134
4.3Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
CVE-2024-21130
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21129
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21127
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21125
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21102
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21101
2.2Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.33 and prior, 7.6.29 and prior, 8.0.36 and prior and 8.3.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N).
CVE-2024-21096
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
CVE-2024-21090
7.5Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 8.3.0 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21087
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21069
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21062
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21061
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plug-in). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21056
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21055
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21051
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21050
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21049
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-21047
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-20996
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-20985
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-20983
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-20981
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-20977
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-20973
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-20971
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-20969
5.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
CVE-2024-20967
5.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
CVE-2024-20965
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-20963
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-20961
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2024-6763
3.7Eclipse Jetty is a lightweight, highly scalable, Java-based web server and Servlet engine . It includes a utility class, HttpURI, for URI/URL parsing. The HttpURI class does insufficient validation on the authority segment of a URI. However the behaviour of HttpURI differs from the common browsers in how it handles a URI that would be considered invalid if fully validated against the RRC. Specifically HttpURI and the browser may differ on the value of the host extracted from an invalid URI and thus a combination of Jetty and a vulnerable browser may be vulnerable to a open redirect attack or to a SSRF attack if the URI is used after passing validation checks.
CVE-2024-0727
5.5Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
2023(43)
CVE-2023-45725
5.7Design document functions which receive a user http request object may expose authorization or session cookie headers of the user who accesses the document. These design document functions are: *   list *   show *   rewrite *   update An attacker can leak the session component using an HTML-like output, insert the session as an external resource (such as an image), or store the credential in a _local document with an "update" function. For the attack to succeed the attacker has to be able to insert the design documents into the database, then manipulate a user to access a function from that design document. Workaround: Avoid using design documents from untrusted sources which may attempt to access or manipulate request object's headers
CVE-2023-44487
7.5The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2023-31122
7.5Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.
CVE-2023-30800
7.5The web server used by MikroTik RouterOS version 6 is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the server's heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted. The issue was fixed in RouterOS 6.49.10 stable. RouterOS version 7 is not affected.
CVE-2023-30799
9.1MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.
CVE-2023-26268
4.4Design documents with matching document IDs, from databases on the same cluster, may share a mutable Javascript environment when using these design document functions: * validate_doc_update * list * filter * filter views (using view functions as filters) * rewrite * update This doesn't affect map/reduce or search (Dreyfus) index functions. Users are recommended to upgrade to a version that is no longer affected by this issue (Apache CouchDB 3.3.2 or 3.2.3). Workaround: Avoid using design documents from untrusted sources which may attempt to cache or store data in the Javascript environment.
CVE-2023-26049
2.4Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue.
CVE-2023-26048
5.3Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).
CVE-2023-25690
9.8Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
CVE-2023-22115
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22114
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22113
2.7Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).
CVE-2023-22112
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22111
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22110
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22104
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22103
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22097
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22092
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22084
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.43 and prior, 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22079
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22078
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22070
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22068
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22066
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22065
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22064
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22059
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22032
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22007
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.41 and prior and 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-21982
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-21980
7.1Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 5.7.41 and prior and 8.0.32 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H).
CVE-2023-21977
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-21976
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-21972
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-5678
5.3Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
CVE-2023-3817
5.3Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
CVE-2023-2650
6.5Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(n^2) with 'n' being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer's certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.
CVE-2023-0466
5.3The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.
CVE-2023-0465
5.3Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
CVE-2023-0464
7.5A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
CVE-2023-0286
7.4There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
CVE-2023-0215
7.5The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.
2022(26)
CVE-2022-45315
9.8Mikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp process. This vulnerability allows attackers to execute arbitrary code via a crafted packet.
CVE-2022-45313
8.8Mikrotik RouterOs before stable v7.5 was discovered to contain an out-of-bounds read in the hotspot process. This vulnerability allows attackers to execute arbitrary code via a crafted nova message.
CVE-2022-37436
5.3Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
CVE-2022-36760
9.0Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.
CVE-2022-36522
6.5Mikrotik RouterOs through stable v6.48.3 was discovered to contain an assertion failure in the component /advanced-tools/nova/bin/netwatch. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
CVE-2022-31813
9.8Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
CVE-2022-31629
6.5In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
CVE-2022-31628
2.3In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
CVE-2022-30556
7.5Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
CVE-2022-29404
7.5In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
CVE-2022-28615
9.1Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
CVE-2022-28614
5.3The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
CVE-2022-28330
5.3Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module.
CVE-2022-26377
7.5Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
CVE-2022-24706
9.8In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.
CVE-2022-23943
9.8Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
CVE-2022-22721
9.1If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-22720
9.8Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling
CVE-2022-22719
7.5A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-4900
6.2A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.
CVE-2022-4304
5.9A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.
CVE-2022-2068
9.8In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).
CVE-2022-2048
7.5In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
CVE-2022-2047
2.7In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario.
CVE-2022-1292
9.8The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
CVE-2022-0778
7.5The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
2021(24)
CVE-2021-44790
9.8A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
CVE-2021-40438
9.0A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVE-2021-39275
9.8ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVE-2021-38295
7.3In Apache CouchDB, a malicious user with permission to create documents in a database is able to attach a HTML attachment to a document. If a CouchDB admin opens that attachment in a browser, e.g. via the CouchDB admin interface Fauxton, any JavaScript code embedded in that HTML attachment will be executed within the security context of that admin. A similar route is available with the already deprecated _show and _list functionality. This privilege escalation vulnerability allows an attacker to add or remove data in any database or make configuration changes. This issue affected Apache CouchDB prior to 3.1.2
CVE-2021-36614
6.5Mikrotik RouterOs before stable 6.48.2 suffers from a memory corruption vulnerability in the tr069-client process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2021-36613
6.5Mikrotik RouterOs before stable 6.48.2 suffers from a memory corruption vulnerability in the ptp process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2021-34798
7.5Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVE-2021-34428
2.9For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
CVE-2021-32792
3.1mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, there is an XSS vulnerability in when using `OIDCPreservePost On`.
CVE-2021-32791
5.9mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.
CVE-2021-32786
4.7mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression.
CVE-2021-32785
5.3mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it again and lead to an uncontrolled format string bug. Initial assessment shows that this bug does not appear to allow gaining arbitrary code execution, but can reliably provoke a denial of service by repeatedly crashing the Apache workers. This bug has been corrected in version 2.4.9 by performing argument interpolation only once, using the `hiredis` API. As a workaround, this vulnerability can be mitigated by setting `OIDCCacheEncrypt` to `on`, as cache keys are cryptographically hashed before use when this option is enabled.
CVE-2021-32761
7.5Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote code execution. The vulnerability involves changing the default `proto-max-bulk-len` configuration parameter to a very large value and constructing specially crafted commands bit commands. This problem only affects Redis on 32-bit platforms, or compiled as a 32-bit binary. Redis versions 5.0.`3m 6.0.15, and 6.2.5 contain patches for this issue. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `proto-max-bulk-len` configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.
CVE-2021-28169
5.3For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
CVE-2021-26691
9.8In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
CVE-2021-26690
7.5Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
CVE-2021-23841
5.9The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
CVE-2021-23840
7.5Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
CVE-2021-21285
6.5In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.
CVE-2021-21284
6.8In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
CVE-2021-4160
5.9There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. For the 1.0.2 release it is addressed in git commit 6fc1aaaf3 that is available to premium support customers only. It will be made available in 1.0.2zc when it is released. The issue only affects OpenSSL on MIPS platforms. Fixed in OpenSSL 3.0.1 (Affected 3.0.0). Fixed in OpenSSL 1.1.1m (Affected 1.1.1-1.1.1l). Fixed in OpenSSL 1.0.2zc-dev (Affected 1.0.2-1.0.2zb).
CVE-2021-3712
7.4ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
CVE-2021-3470
5.3A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.
CVE-2021-3014
6.1In MikroTik RouterOS through 2021-01-04, the hotspot login page is vulnerable to reflected XSS via the target parameter.
2020(34)
CVE-2020-35452
7.3Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow
CVE-2020-27534
5.3util/binfmt_misc/check.go in Builder in Docker Engine before 19.03.9 calls os.OpenFile with a potentially unsafe qemu-check temporary pathname, constructed with an empty first argument in an ioutil.TempDir call.
CVE-2020-27216
7.0In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
CVE-2020-20267
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/resolver process. An authenticated remote attacker can cause a Denial of Service due to invalid memory access.
CVE-2020-20266
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/dot1x process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20265
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /ram/pckg/wireless/nova/bin/wireless process. An authenticated remote attacker can cause a Denial of Service due via a crafted packet.
CVE-2020-20264
6.5Mikrotik RouterOs before 6.47 (stable tree) in the /ram/pckg/advanced-tools/nova/bin/netwatch process. An authenticated remote attacker can cause a Denial of Service due to a divide by zero error.
CVE-2020-20262
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from an assertion failure vulnerability in the /ram/pckg/security/nova/bin/ipsec process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.
CVE-2020-20254
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20253
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from a divison by zero vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service due to a divide by zero error.
CVE-2020-20252
6.5Mikrotik RouterOs before stable version 6.47 suffers from a memory corruption vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20250
6.5Mikrotik RouterOs before stable version 6.47 suffers from a memory corruption vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). NOTE: this is different from CVE-2020-20253 and CVE-2020-20254. All four vulnerabilities in the /nova/bin/lcdstat process are discussed in the CVE-2020-20250 github.com/cq674350529 reference.
CVE-2020-20249
6.5Mikrotik RouterOs before stable 6.47 suffers from a memory corruption vulnerability in the resolver process. By sending a crafted packet, an authenticated remote attacker can cause a Denial of Service.
CVE-2020-20247
6.5Mikrotik RouterOs before 6.46.5 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/traceroute process. An authenticated remote attacker can cause a Denial of Service due via the loop counter variable.
CVE-2020-20230
6.5Mikrotik RouterOs before stable 6.47 suffers from an uncontrolled resource consumption in the sshd process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU.
CVE-2020-20225
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from an assertion failure vulnerability in the /nova/bin/user process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.
CVE-2020-20221
6.5Mikrotik RouterOs before 6.44.6 (long-term tree) suffers from an uncontrolled resource consumption vulnerability in the /nova/bin/cerm process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU.
CVE-2020-20220
6.5Mikrotik RouterOs prior to stable 6.47 suffers from a memory corruption vulnerability in the /nova/bin/bfd process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20217
6.5Mikrotik RouterOs before 6.47 (stable tree) suffers from an uncontrolled resource consumption vulnerability in the /nova/bin/route process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU.
CVE-2020-20021
7.5An issue discovered in MikroTik Router v6.46.3 and earlier allows attacker to cause denial of service via misconfiguration in the SSH daemon.
CVE-2020-17518
7.5Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master.
CVE-2020-14147
7.7An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
CVE-2020-13938
5.5Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows
CVE-2020-11985
5.3IP address spoofing when proxying using mod_remoteip and mod_rewrite For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.
CVE-2020-11579
7.5An issue was discovered in Chadha PHPKB 9.0 Enterprise Edition. installer/test-connection.php (part of the installation process) allows a remote unauthenticated attacker to disclose local files on hosts running PHP before 7.2.16, or on hosts where the MySQL ALLOW LOCAL DATA INFILE option is enabled.
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-10364
7.5The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management.
CVE-2020-7656
6.1jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.
CVE-2020-1971
5.9The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
CVE-2020-1968
3.7The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
CVE-2020-1960
4.7A vulnerability in Apache Flink (1.1.0 to 1.1.5, 1.2.0 to 1.2.1, 1.3.0 to 1.3.3, 1.4.0 to 1.4.2, 1.5.0 to 1.5.6, 1.6.0 to 1.6.4, 1.7.0 to 1.7.2, 1.8.0 to 1.8.3, 1.9.0 to 1.9.2, 1.10.0) where, when running a process with an enabled JMXReporter, with a port configured via metrics.reporter.reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker's control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data.
CVE-2020-1934
5.3In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.
CVE-2020-1927
6.1In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
2019(36)
CVE-2019-17567
5.3Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
CVE-2019-16884
7.5runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
CVE-2019-16160
7.5An integer underflow in the SMB server of MikroTik RouterOS before 6.45.5 allows remote unauthenticated attackers to crash the service.
CVE-2019-15055
6.5MikroTik RouterOS through 6.44.5 and 6.45.x through 6.45.3 improperly handles the disk name, which allows authenticated users to delete arbitrary files. Attackers can exploit this vulnerability to reset credential storage, which allows them access to the management interface as an administrator without authentication.
CVE-2019-13955
6.5Mikrotik RouterOS before 6.44.5 (long-term release tree) is vulnerable to stack exhaustion. By sending a crafted HTTP request, an authenticated remote attacker can crash the HTTP server via recursive parsing of JSON. Malicious code cannot be injected.
CVE-2019-13954
6.5Mikrotik RouterOS before 6.44.5 (long-term release tree) is vulnerable to memory exhaustion. By sending a crafted HTTP request, an authenticated remote attacker can crash the HTTP server and in some circumstances reboot the system. Malicious code cannot be injected.
CVE-2019-13509
7.5In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.
CVE-2019-13074
7.5A vulnerability in the FTP daemon on MikroTik routers through 6.44.3 could allow remote attackers to exhaust all available memory, causing the device to reboot because of uncontrolled resource management.
CVE-2019-11358
6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2019-10247
5.3In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.
CVE-2019-10098
6.1In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.
CVE-2019-10092
6.1In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
CVE-2019-9641
9.8An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.
CVE-2019-9639
7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.
CVE-2019-9638
7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len.
CVE-2019-9637
7.5An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
CVE-2019-9024
7.5An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.
CVE-2019-9023
9.8An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.
CVE-2019-9021
9.8An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.
CVE-2019-9020
9.8An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.
CVE-2019-6977
8.8gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
CVE-2019-5736
8.6runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
CVE-2019-3981
3.7MikroTik Winbox 3.20 and below is vulnerable to man in the middle attacks. A man in the middle can downgrade the client's authentication protocol and recover the user's username and MD5 hashed password.
CVE-2019-3979
7.5RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below are vulnerable to a DNS unrelated data attack. The router adds all A records to its DNS cache even when the records are unrelated to the domain that was queried. Therefore, a remote attacker controlled DNS server can poison the router's DNS cache via malicious responses with additional and untrue records.
CVE-2019-3978
7.5RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow remote unauthenticated attackers to trigger DNS queries via port 8291. The queries are sent from the router to a server of the attacker's choice. The DNS responses are cached by the router, potentially resulting in cache poisoning
CVE-2019-3977
7.5RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below insufficiently validate where upgrade packages are download from when using the autoupgrade feature. Therefore, a remote attacker can trick the router into "upgrading" to an older version of RouterOS and possibly reseting all the system's usernames and passwords.
CVE-2019-3976
8.8RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below are vulnerable to an arbitrary directory creation vulnerability via the upgrade package's name field. If an authenticated user installs a malicious package then a directory could be created and the developer shell could be enabled.
CVE-2019-3943
8.1MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12 and below, and Testing 6.44beta75 and below are vulnerable to an authenticated, remote directory traversal via the HTTP or Winbox interfaces. An authenticated, remote attack can use this vulnerability to read and write files outside of the sandbox directory (/rw/disk).
CVE-2019-3924
7.5MikroTik RouterOS before 6.43.12 (stable) and 6.42.12 (long-term) is vulnerable to an intermediary vulnerability. The software will execute user defined network requests to both WAN and LAN clients. A remote unauthenticated attacker can use this vulnerability to bypass the router's firewall or for general network scanning activities.
CVE-2019-1563
3.7In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
CVE-2019-1559
5.9If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
CVE-2019-1552
3.3OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be '/usr/local'. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of 'C:/usr/local', which may be world writable, which enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
CVE-2019-1551
5.3There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
CVE-2019-1547
4.7Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
CVE-2019-0220
5.3A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
CVE-2019-0217
7.5In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
2018(42)
CVE-2018-20783
7.5In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c.
CVE-2018-19520
8.8An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management.
CVE-2018-19396
7.5ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
CVE-2018-19395
7.5ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
CVE-2018-17199
7.5In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.
CVE-2018-17188
7.2Prior to CouchDB version 2.3.0, CouchDB allowed for runtime-configuration of key components of the database. In some cases, this lead to vulnerabilities where CouchDB admin users could access the underlying operating system as the CouchDB user. Together with other vulnerabilities, it allowed full system entry for unauthenticated users. Rather than waiting for new vulnerabilities to be discovered, and fixing them as they come up, the CouchDB development team decided to make changes to avoid this entire class of vulnerabilities.
CVE-2018-17082
6.1The Apache2 component in PHP before 5.6.38, 7.0.x before 7.0.32, 7.1.x before 7.1.22, and 7.2.x before 7.2.10 allows XSS via the body of a "Transfer-Encoding: chunked" request, because the bucket brigade is mishandled in the php_handler function in sapi/apache2handler/sapi_apache2.c.
CVE-2018-15514
8.8HandleRequestAsync in Docker for Windows before 18.06.0-ce-rc3-win68 (edge) and before 18.06.0-ce-win72 (stable) deserialized requests over the \\.\pipe\dockerBackend named pipe without verifying the validity of the deserialized .NET objects. This would allow a malicious user in the "docker-users" group (who may not otherwise have administrator access) to escalate to administrator privileges.
CVE-2018-15132
7.5An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
CVE-2018-14883
7.5An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
CVE-2018-14851
5.5exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
CVE-2018-14847
9.1MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
CVE-2018-12453
7.5Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.
CVE-2018-12326
8.4Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
CVE-2018-11769
7.2CouchDB administrative users before 2.2.0 can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows a CouchDB admin user to gain arbitrary remote code execution, bypassing CVE-2017-12636 and CVE-2018-8007.
CVE-2018-11219
9.8An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
CVE-2018-11218
9.8Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
CVE-2018-10549
8.8An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
CVE-2018-10548
7.5An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
CVE-2018-10547
6.1An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
CVE-2018-10546
7.5An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
CVE-2018-10545
4.7An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
CVE-2018-8007
7.2Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user that CouchDB runs under, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows an existing CouchDB admin user to gain arbitrary remote code execution, bypassing already disclosed CVE-2017-12636. Mitigation: All users should upgrade to CouchDB releases 1.7.2 or 2.1.2.
CVE-2018-7584
9.8In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
CVE-2018-7445
9.8A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.
CVE-2018-5951
7.5An issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size of 1 byte and sending it to an IPv6 address of a RouterOS box with IP Protocol 97 will cause RouterOS to reboot imminently. All versions of RouterOS that supports EoIPv6 are vulnerable to this attack.
CVE-2018-5712
6.1An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.
CVE-2018-5711
5.5gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
CVE-2018-5407
4.7Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
CVE-2018-1312
9.8In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
CVE-2018-1303
7.5A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.
CVE-2018-1302
5.9When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.
CVE-2018-1301
5.9A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
CVE-2018-1283
5.3In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
CVE-2018-1159
6.5Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory corruption vulnerability. An authenticated remote attacker can crash the HTTP server by rapidly authenticating and disconnecting.
CVE-2018-1158
6.5Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a stack exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server via recursive parsing of JSON.
CVE-2018-1157
6.5Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server and in some circumstances reboot the system via a crafted HTTP POST request.
CVE-2018-1156
8.8Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to stack buffer overflow through the license upgrade interface. This vulnerability could theoretically allow a remote authenticated attacker execute arbitrary code on the system.
CVE-2018-0739
6.5Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
CVE-2018-0737
5.9The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
CVE-2018-0734
5.9The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
CVE-2018-0732
7.5During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
2017(32)
CVE-2017-20149
9.8The Mikrotik RouterOS web server allows memory corruption in releases before Stable 6.38.5 and Long-term 6.37.5, aka Chimay-Red. A remote and unauthenticated user can trigger the vulnerability by sending a crafted HTTP request. An attacker can use this vulnerability to execute arbitrary code on the affected system, as exploited in the wild in mid-2017 and later.
CVE-2017-16642
7.5In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
CVE-2017-15715
8.1In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
CVE-2017-15710
7.5In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.
CVE-2017-12933
9.8The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
CVE-2017-12868
9.8The secureCompare method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.13 and earlier, when used with PHP before 5.6, allows attackers to conduct session fixation attacks or possibly bypass authentication by leveraging missing character conversions before an XOR operation.
CVE-2017-12636
7.2CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.
CVE-2017-12635
9.8Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.
CVE-2017-11628
7.8In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
CVE-2017-11147
9.1In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
CVE-2017-11145
7.5In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.
CVE-2017-11144
7.5In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.
CVE-2017-11143
7.5In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
CVE-2017-11142
7.5In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.
CVE-2017-9798
7.5Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
CVE-2017-9788
9.1In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
CVE-2017-9735
7.5Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
CVE-2017-9226
9.8An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
CVE-2017-9224
9.8An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.
CVE-2017-8923
9.8The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
CVE-2017-7963
7.5The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating "There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.
CVE-2017-7890
6.5The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.
CVE-2017-7679
9.8In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
CVE-2017-7658
9.8In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.
CVE-2017-7657
9.8In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.
CVE-2017-7656
7.5In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.
CVE-2017-7272
7.4PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
CVE-2017-3738
5.9There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.
CVE-2017-3737
5.9OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.
CVE-2017-3736
6.5There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.
CVE-2017-3735
5.3While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
CVE-2017-3167
9.8In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
2016(75)
CVE-2016-10712
7.5In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.
CVE-2016-10517
7.4networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port).
CVE-2016-10397
7.5In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).
CVE-2016-10161
7.5The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call.
CVE-2016-10159
7.5Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive.
CVE-2016-10158
7.5The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1.
CVE-2016-9935
9.8The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.
CVE-2016-9934
7.5ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted serialized data in a wddxPacket XML document, as demonstrated by a PDORow string.
CVE-2016-9933
7.5Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.
CVE-2016-9138
9.8PHP through 5.6.27 and 7.x through 7.0.12 mishandles property modification during __wakeup processing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data, as demonstrated by Exception::__toString with DateInterval::__wakeup.
CVE-2016-9137
9.8Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.
CVE-2016-8743
7.5Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
CVE-2016-8670
9.8Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.
CVE-2016-8612
4.3Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process.
CVE-2016-7478
7.5Zend/zend_exceptions.c in PHP, possibly 5.x before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (infinite loop) via a crafted Exception object in serialized data, a related issue to CVE-2015-8876.
CVE-2016-7418
7.5The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service (invalid pointer access and out-of-bounds read) or possibly have unspecified other impact via an incorrect boolean element in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
CVE-2016-7417
9.8ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.
CVE-2016-7416
7.5ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x before 7.0.11 does not properly restrict the locale length provided to the Locale class in the ICU library, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a MessageFormatter::formatMessage call with a long first argument.
CVE-2016-7414
9.8The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.
CVE-2016-7413
9.8Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call.
CVE-2016-7412
8.1ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata.
CVE-2016-7411
9.8ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles object-deserialization failures, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an unserialize call that references a partially constructed object.
CVE-2016-7132
7.5ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray element inside a boolean element, leading to incorrect pop processing.
CVE-2016-7131
7.5ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via a malformed wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a tag that lacks a < (less than) character.
CVE-2016-7130
7.5The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid base64 binary value, as demonstrated by a wddx_deserialize call that mishandles a binary element in a wddxPacket XML document.
CVE-2016-7129
9.8The php_wddx_process_data function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via an invalid ISO 8601 time value, as demonstrated by a wddx_deserialize call that mishandles a dateTime element in a wddxPacket XML document.
CVE-2016-7128
5.3The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset that exceeds the file size, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image.
CVE-2016-7127
9.8The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate gamma values, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by providing different signs for the second and third arguments.
CVE-2016-7126
9.8The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value in the third argument.
CVE-2016-7125
7.5ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
CVE-2016-7124
9.8ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call.
CVE-2016-6297
8.8Integer overflow in the php_stream_zip_opener function in ext/zip/zip_stream.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted zip:// URL.
CVE-2016-6296
9.8Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.
CVE-2016-6295
9.8ext/snmp/snmp.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via crafted serialized data, a related issue to CVE-2016-5773.
CVE-2016-6294
9.8The locale_accept_from_http function in ext/intl/locale/locale_methods.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument.
CVE-2016-6292
6.5The exif_process_user_comment function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted JPEG image.
CVE-2016-6291
9.8The exif_process_IFD_in_MAKERNOTE function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds array access and memory corruption), obtain sensitive information from process memory, or possibly have unspecified other impact via a crafted JPEG image.
CVE-2016-6290
9.8ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.
CVE-2016-6289
7.8Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive.
CVE-2016-6288
9.8The php_url_parse_ex function in ext/standard/url.c in PHP before 5.5.38 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via vectors involving the smart_str data type.
CVE-2016-6174
8.1applications/core/modules/front/system/content.php in Invision Power Services IPS Community Suite (aka Invision Power Board, IPB, or Power Board) before 4.1.13, when used with PHP before 5.4.24 or 5.5.x before 5.5.8, allows remote attackers to execute arbitrary code via the content_class parameter.
CVE-2016-5773
9.8php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data containing a ZipArchive object.
CVE-2016-5772
9.8Double free vulnerability in the php_wddx_process_data function in wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted XML data that is mishandled in a wddx_deserialize call.
CVE-2016-5771
9.8spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.
CVE-2016-5770
9.8Integer overflow in the SplFileObject::fread function in spl_directory.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer argument, a related issue to CVE-2016-5096.
CVE-2016-5769
9.8Multiple integer overflows in mcrypt.c in the mcrypt extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted length value, related to the (1) mcrypt_generic and (2) mdecrypt_generic functions.
CVE-2016-5768
9.8Double free vulnerability in the _php_mb_regex_ereg_replace_exec function in php_mbregex.c in the mbstring extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by leveraging a callback exception.
CVE-2016-5767
8.8Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
CVE-2016-5766
8.8Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.
CVE-2016-5399
7.8The bzread function in ext/bz2/bz2.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted bz2 archive.
CVE-2016-5387
8.1The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
CVE-2016-5114
9.1sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstrated by a long URI in a configuration with custom REQUEST_URI logging.
CVE-2016-5096
8.6Integer overflow in the fread function in ext/standard/file.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer in the second argument.
CVE-2016-5095
8.6Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.
CVE-2016-5094
8.6Integer overflow in the php_html_entities function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from the htmlspecialchars function.
CVE-2016-5093
8.6The get_icu_value_internal function in ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\0' character, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted locale_get_primary_language call.
CVE-2016-4975
6.1Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).
CVE-2016-4543
9.8The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
CVE-2016-4542
9.8The exif_process_IFD_TAG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not properly construct spprintf arguments, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
CVE-2016-4541
9.8The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.
CVE-2016-4540
9.8The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.
CVE-2016-4539
9.8The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero.
CVE-2016-4538
9.8The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 modifies certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.
CVE-2016-4537
9.8The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer for the scale argument, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.
CVE-2016-4343
8.8The phar_make_dirstream function in ext/phar/dirstream.c in PHP before 5.6.18 and 7.x before 7.0.3 mishandles zero-size ././@LongLink files, which allows remote attackers to cause a denial of service (uninitialized pointer dereference) or possibly have unspecified other impact via a crafted TAR archive.
CVE-2016-4342
8.8ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive.
CVE-2016-4070
7.5Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not).
CVE-2016-3185
7.1The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c.
CVE-2016-3171
8.1Drupal 6.x before 6.38, when used with PHP before 5.4.45, 5.5.x before 5.5.29, or 5.6.x before 5.6.13, might allow remote attackers to execute arbitrary code via vectors related to session data truncation.
CVE-2016-3142
8.2The phar_parse_zipfile function in zip.c in the PHAR extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location.
CVE-2016-3141
9.8Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
CVE-2016-2554
9.8Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive.
CVE-2016-2161
7.5In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
CVE-2016-1903
9.1The gdImageRotateInterpolated function in ext/gd/libgd/gd_interpolation.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a large bgd_color argument to the imagerotate function.
CVE-2016-0736
7.5In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
2015(74)
CVE-2015-9253
6.5An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
CVE-2015-9251
6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
CVE-2015-8994
7.5An issue was discovered in PHP 5.x and 7.x, when the configuration uses apache2handler/mod_php or php-fpm with OpCache enabled. With 5.x after 5.6.28 or 7.x after 7.0.13, the issue is resolved in a non-default configuration with the opcache.validate_permission=1 setting. The vulnerability details are as follows. In PHP SAPIs where PHP interpreters share a common parent process, Zend OpCache creates a shared memory object owned by the common parent during initialization. Child PHP processes inherit the SHM descriptor, using it to cache and retrieve compiled script bytecode ("opcode" in PHP jargon). Cache keys vary depending on configuration, but filename is a central key component, and compiled opcode can generally be run if a script's filename is known or can be guessed. Many common shared-hosting configurations change EUID in child processes to enforce privilege separation among hosted users (for example using mod_ruid2 for the Apache HTTP Server, or php-fpm user settings). In these scenarios, the default Zend OpCache behavior defeats script file permissions by sharing a single SHM cache among all child PHP processes. PHP scripts often contain sensitive information: Think of CMS configurations where reading or running another user's script usually means gaining privileges to the CMS database.
CVE-2015-8935
6.1The sapi_header_op function in main/SAPI.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 supports deprecated line folding without considering browser compatibility, which allows remote attackers to conduct cross-site scripting (XSS) attacks against Internet Explorer by leveraging (1) %0A%20 or (2) %0D%0A%20 mishandling in the header function.
CVE-2015-8879
7.5The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table.
CVE-2015-8877
7.5The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function.
CVE-2015-8876
9.8Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not validate certain Exception objects, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data.
CVE-2015-8874
7.5Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call.
CVE-2015-8873
7.5Stack consumption vulnerability in Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to cause a denial of service (segmentation fault) via recursive method calls.
CVE-2015-8867
7.5The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
CVE-2015-8865
7.3The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file.
CVE-2015-8838
5.9ext/mysqlnd/mysqlnd.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 uses a client SSL option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
CVE-2015-8835
9.8The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not properly retrieve keys, which allows remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c.
CVE-2015-8080
7.5Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
CVE-2015-7804
6.8Off-by-one error in the phar_parse_zipfile function in ext/phar/zip.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (uninitialized pointer dereference and application crash) by including the / filename in a .zip PHAR archive.
CVE-2015-7803
6.8The phar_get_entry_data function in ext/phar/util.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that does not exist.
CVE-2015-6838
7.5The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation after the principal argument loop, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837.
CVE-2015-6837
7.5The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation during initial error checking, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838.
CVE-2015-6836
7.3The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
CVE-2015-6835
9.8The session deserializer in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 mishandles multiple php_var_unserialize calls, which allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted session content.
CVE-2015-6834
9.8Multiple use-after-free vulnerabilities in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 allow remote attackers to execute arbitrary code via vectors related to (1) the Serializable interface, (2) the SplObjectStorage class, and (3) the SplDoublyLinkedList class, which are mishandled during unserialization.
CVE-2015-6833
7.5Directory traversal vulnerability in the PharData class in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call.
CVE-2015-6832
7.3Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
CVE-2015-6831
7.3Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.
CVE-2015-6497
8.8The create function in app/code/core/Mage/Catalog/Model/Product/Api/V2.php in Magento Community Edition (CE) before 1.9.2.1 and Enterprise Edition (EE) before 1.14.2.1, when used with PHP before 5.4.24 or 5.5.8, allows remote authenticated users to execute arbitrary PHP code via the productData parameter to index.php/api/v2_soap.
CVE-2015-5590
7.3Stack-based buffer overflow in the phar_fix_filepath function in ext/phar/phar.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value, as demonstrated by mishandling of an e-mail attachment by the imap PHP extension.
CVE-2015-5589
9.8The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted TAR archive that is mishandled in a Phar::convertToData call.
CVE-2015-4644
7.5The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not validate token extraction for table names, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352.
CVE-2015-4643
9.8Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022.
CVE-2015-4642
9.8The escapeshellarg function in ext/standard/exec.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 on Windows allows remote attackers to execute arbitrary OS commands via a crafted string to an application that accepts command-line arguments for a call to the PHP system function.
CVE-2015-4605
7.5The mcopy function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly restrict a certain offset value, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a "Python script text executable" rule.
CVE-2015-4604
7.5The mget function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly maintain a certain pointer relationship, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a "Python script text executable" rule.
CVE-2015-4603
9.8The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
CVE-2015-4602
9.8The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
CVE-2015-4601
9.8PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600.
CVE-2015-4600
9.8The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.
CVE-2015-4599
9.8The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
CVE-2015-4598
6.5PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.
CVE-2015-4335
10Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.
CVE-2015-4148
5.0The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.
CVE-2015-4147
7.5The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a "type confusion" issue.
CVE-2015-4116
9.8Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP before 5.5.27 and 5.6.x before 5.6.11 allows remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation.
CVE-2015-4026
7.5The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
CVE-2015-4025
7.5PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
CVE-2015-4024
5.0Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
CVE-2015-4022
7.5Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
CVE-2015-4021
5.0The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.
CVE-2015-3416
7.5The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
CVE-2015-3415
7.5The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
CVE-2015-3414
7.5SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
CVE-2015-3412
5.3PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.
CVE-2015-3411
6.5PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.
CVE-2015-3330
6.8The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via pipelined HTTP requests that result in a "deconfigured interpreter."
CVE-2015-3329
7.5Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
CVE-2015-3307
7.5The phar_parse_metadata function in ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (heap metadata corruption) or possibly have unspecified other impact via a crafted tar archive.
CVE-2015-3185
4.3The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
CVE-2015-3184
5.0mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.
CVE-2015-3183
5.0The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
CVE-2015-3152
5.9Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
CVE-2015-2787
7.5Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.
CVE-2015-2783
5.8ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.
CVE-2015-2348
5.0The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
CVE-2015-2331
7.5Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.
CVE-2015-2326
5.5The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".
CVE-2015-2325
7.8The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
CVE-2015-2305
6.8Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
CVE-2015-2301
7.5Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.
CVE-2015-1352
5.0The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP through 5.6.7 does not validate token extraction for table names, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.
CVE-2015-1351
7.5Use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c in the OPcache extension in PHP through 5.6.7 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
CVE-2015-0273
7.5Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allow remote attackers to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function.
CVE-2015-0235
10Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
CVE-2015-0232
6.8The exif_process_unicode function in ext/exif/exif.c in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image.
CVE-2015-0231
7.5Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.
CVE-2015-0228
5.0The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.
2014(46)
CVE-2014-9912
9.8The get_icu_disp_value_src_php function in ext/intl/locale/locale_methods.c in PHP before 5.3.29, 5.4.x before 5.4.30, and 5.5.x before 5.5.14 does not properly restrict calls to the ICU uresbund.cpp component, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a locale_get_display_name call with a long first argument.
CVE-2014-9767
4.3Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive.
CVE-2014-9709
5.0The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.
CVE-2014-9705
7.5Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.
CVE-2014-9653
7.5readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.
CVE-2014-9652
5.0The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
CVE-2014-9427
7.5sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.
CVE-2014-9426
7.3The apprentice_load function in libmagic/apprentice.c in the Fileinfo component in PHP through 5.6.4 attempts to perform a free operation on a stack-based character array, which allows remote attackers to cause a denial of service (memory corruption or application crash) or possibly have unspecified other impact via unknown vectors. NOTE: this is disputed by the vendor because the standard erealloc behavior makes the free operation unreachable
CVE-2014-9425
7.5Double free vulnerability in the zend_ts_hash_graceful_destroy function in zend_ts_hash.c in the Zend Engine in PHP through 5.5.20 and 5.6.x through 5.6.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
CVE-2014-8142
7.5Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.
CVE-2014-8109
4.3mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.
CVE-2014-5459
3.6The PEAR_REST class in REST.php in PEAR in PHP through 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.
CVE-2014-5120
6.4gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.
CVE-2014-4721
2.6The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.
CVE-2014-4698
4.6Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments.
CVE-2014-4670
4.6Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.
CVE-2014-4049
5.1Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.
CVE-2014-3981
3.3acinclude.m4, as used in the configure script in PHP 5.5.13 and earlier, allows local users to overwrite arbitrary files via a symlink attack on the /tmp/phpglibccheck file.
CVE-2014-3710
5.0The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
CVE-2014-3670
6.8The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function.
CVE-2014-3669
7.5Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value.
CVE-2014-3668
5.0Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation.
CVE-2014-3597
6.8Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP before 5.4.32 and 5.5.x before 5.5.16 allow remote DNS servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted DNS record, related to the dns_get_record function and the dn_expand function. NOTE: this issue exists because of an incomplete fix for CVE-2014-4049.
CVE-2014-3587
4.3Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1571.
CVE-2014-3581
5.0The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.
CVE-2014-3538
5.0file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345.
CVE-2014-3523
5.0Memory leak in the winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default AcceptFilter is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted requests.
CVE-2014-3515
7.5The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.
CVE-2014-3487
4.3The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
CVE-2014-3480
4.3The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
CVE-2014-3479
4.3The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.
CVE-2014-3478
5.0Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.
CVE-2014-2497
4.3The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.
CVE-2014-2270
4.3softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
CVE-2014-2020
5.0ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check data types, which might allow remote attackers to obtain sensitive information by using a (1) string or (2) array data type in place of a numeric data type, as demonstrated by an imagecrop function call with a string for the x dimension value, a different vulnerability than CVE-2013-7226.
CVE-2014-1943
5.0Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
CVE-2014-0238
5.0The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long.
CVE-2014-0237
5.0The cdf_unpack_summary_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (performance degradation) by triggering many file_printf calls.
CVE-2014-0236
7.5file before 5.18, as used in the Fileinfo component in PHP before 5.6.0, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a zero root_storage value in a CDF file, related to cdf.c and readcdf.c.
CVE-2014-0231
5.0The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
CVE-2014-0226
6.8Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
CVE-2014-0207
4.3The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.
CVE-2014-0185
7.2sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
CVE-2014-0118
4.3The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
CVE-2014-0117
4.3The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.
CVE-2014-0098
5.0The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
2013(18)
CVE-2013-7458
3.3linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, which allows local users to obtain sensitive information by reading the file.
CVE-2013-7456
7.6gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.1.1, as used in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7, allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted image that is mishandled by the imagescale function.
CVE-2013-7345
5.0The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.
CVE-2013-7327
6.8The gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check return values, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via invalid imagecrop arguments that lead to use of a NULL pointer as a return value, a different vulnerability than CVE-2013-7226.
CVE-2013-6712
5.0The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification.
CVE-2013-6501
4.6The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.
CVE-2013-6438
5.0The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.
CVE-2013-6420
7.5The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.
CVE-2013-5704
5.0The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."
CVE-2013-4365
7.5Heap-based buffer overflow in the fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.9 for the Apache HTTP Server allows remote attackers to have an unspecified impact via unknown vectors.
CVE-2013-4352
4.3The cache_invalidate function in modules/cache/cache_storage.c in the mod_cache module in the Apache HTTP Server 2.4.6, when a caching forward proxy is enabled, allows remote HTTP servers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger a missing hostname value.
CVE-2013-4248
4.3The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
CVE-2013-4113
6.8ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.
CVE-2013-3735
7.5The Zend Engine in PHP before 5.4.16 RC1, and 5.5.0 before RC2, does not properly determine whether a parser error occurred, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted function definition, as demonstrated by an attack within a shared web-hosting environment. NOTE: the vendor's http://php.net/security-note.php page says "for critical security situations you should be using OS-level security by running multiple web servers each as their own user id.
CVE-2013-2765
5.0The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2013-0942
4.3Cross-site scripting (XSS) vulnerability in EMC RSA Authentication Agent 7.1 before 7.1.1 for Web for Internet Information Services, and 7.1 before 7.1.1 for Web for Apache, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2013-0941
2.1EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
2012(5)
CVE-2012-6708
6.1jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
CVE-2012-4360
4.3Cross-site scripting (XSS) vulnerability in the mod_pagespeed module 0.10.19.1 through 0.10.22.4 for the Apache HTTP Server allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2012-4001
5.0The mod_pagespeed module before 0.10.22.6 for the Apache HTTP Server does not properly verify its host name, which allows remote attackers to trigger HTTP requests to arbitrary hosts via unspecified vectors, as demonstrated by requests to intranet servers.
CVE-2012-3526
5.0The reverse proxy add forward module (mod_rpaf) 0.5 and 0.6 for the Apache HTTP Server allows remote attackers to cause a denial of service (server or application crash) via multiple X-Forwarded-For headers in a request.
CVE-2012-1171
5.0The libxml RSHUTDOWN function in PHP 5.x allows remote attackers to bypass the open_basedir protection mechanism and read arbitrary files via vectors involving a stream_close method call during use of a custom stream wrapper.
2011(3)
CVE-2011-4718
6.8Session fixation vulnerability in the Sessions subsystem in PHP before 5.5.2 allows remote attackers to hijack web sessions by specifying a session ID.
CVE-2011-2688
7.5SQL injection vulnerability in mysql/mysql-auth.pl in the mod_authnz_external module 3.2.5 and earlier for the Apache HTTP Server allows remote attackers to execute arbitrary SQL commands via the user field.
CVE-2011-1176
4.3The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
2009(6)
CVE-2009-3767
4.3libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
CVE-2009-3766
6.8mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
CVE-2009-3765
6.8mutt_ssl.c in mutt 1.5.19 and 1.5.20, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
CVE-2009-2299
5.0The Artofdefence Hyperguard Web Application Firewall (WAF) module before 2.5.5-11635, 3.0 before 3.0.3-11636, and 3.1 before 3.1.1-11637, a module for the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via an HTTP request with a large Content-Length value but no POST data.
CVE-2009-1390
6.8Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS certificate in the chain is accepted instead of verifying the entire chain, which allows remote attackers to spoof trusted servers via a man-in-the-middle attack.
CVE-2009-0796
2.6Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.
2007(2)
CVE-2007-4723
7.5Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page.
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
2006(1)
CVE-2006-20001
7.5A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier.

OpenPorts

11131517192021222325263738434953667079808182838488919293949598101102104110111113119121135143154175179180195211221222234263264285311340343385389400427442443444447448451461465480487502503513515541548554555556587591593631636646666685689700771772777782789800801805809811830853873880885886887888902943947990992993994995998100010021013102210231024102610271028105010631080109911101111111911531188119011931195120012341235125012831290129112931311133713431355136513661370138814001414143314461450145114521454145514581460147115001521155715771588159916041605172317411820183318831901191119251926193519471950195119521953195419551958195919621965196619671969197019711972197519761977197919801981198219841986198719881989200020012002200320082010201220162022204820492052205320542056205820592060206320642066206720692070207220782079208120822083208620872090209520962100210121032108210921112121212221262130213421502154218121952196220122022222222422262232225022712323232723322344234523622375237623792404242324352443245524802525254825492550255225542555255725582559256025612562256625672568256925722599260126022628265027012761276228062850299530003001300230053006300730083011301330173018301930203021302230483049305030513052305530563061306230633064306530683072307430773078308030813082308330843086308730883090309130923093309430953096309831003101310231033104310531063108311031123113311531163118311931203121312231243125312831363137313831413145314631473148314931503152315331543155315731583160316131623163316431683170317131723173317431773178317931803182318331843186318731883190319131923193319431963197319832003211325632603268326932993301330633073310333733413345334933523365338833893402340334043405340634093479349835243541354235503551355335583563356735693570357236893690374937803790379137923793383838413842391039533954400040024022402340404042406340644072408040954100410341044117414841504155415941604172419042004242424442504282430043214333434443694400440144314432443344344435443644384443444444474451445544574459446344774488450045024506451045234524452845304531454345674602464346464664473447474782478648214840484848994911493349494993500050015002500450055006500750095010501150225025507050805083509351005119512051225123513051355140517252015209522252245226522752295230523152325233523452355236523752395241524252445245524652485249525052525253525652575258525952605264526652675268526952715272527652775279528053215357540054315432543554405443545654945500554255435555555655575558556055675568559155925593559455965597559956005601560256045605560756135614562056305640567156735678568056965698572158005801585358585901590559065907590859095910591259155916591959205938598459855986598759885990599159945995599759986000600160026003600460066008601060116022605060616080608161006102613461616363637964006405644364646482648865056510651165126543655065566560656565906601660366056633665066536662666466666667666866866688669766996700675567796789688769557000700170027004700670117013701570167018702570707071707870797080708170827084708670877102710571707171717272187325734874017403743474417443746574737474750075107537754775487603763476577676770077737776777777797782779978017822787879007979798979998000800180058006800880098010801280148016801780188020802180228024802680288030803580368038804080418043804580478049805080518052805380548055805680578058805980608061806480658066806780688069807080718072807380748075807680778078807980808081808280838084808580868087808980908092809680978098809981078109811081128114811681178121812381248125812681298130813281338136813781398140814181468147814881498154815681588159816081628163816481658166817181728174817681778178818081818182818681888189819081918192819381958196819781998200820382228230823682378239824382488251825282808282828382858291830083198333833483508382838383848401840284038404840584068409841084128413841684178419842084218422842384248425842784308431843284338436844084428443844484468447844884498451845284538456845884598461846384658467847084738475848084818482848484888493849485008501850385048513851485198521852385248526852885298532853385408543854485458548854985508551855485588560856285638564856585678575857685788579858385848585858885898590859285948596859986008602860686078622863786408641864986638666868687008701870287038704870787238724872887318733874387668767877187798782878487888791880088048805880688078808880988108812881388148815881688208825882688298830883288338834883788398840884588468848885088558856885788588859886088628863886488678869887088728878888088818882888488868887888888898899890089028906890889138915891689808990899390009001900290039005900690079009901090159016901790189020902190259032903390349036903790399040904190429043904490459046904790509051905290549057905990609061906290649065907090719072907390749075907690779078908090829083908990909091909290949095909991009102910391049107910891099111911291139114911591189119912091229124912591269128913091319133913591369137914091439147915091519152915391559156916091619164916591669169917391749175917791789181918291839184918591879189919191929194919791989199920092029203920492059206920792089209921092119213921592179220922292369241924292449246925292569257927392839289929192959299930093019303930493069308931093119312931593339345935193539376938793899398941894419443945494559458946594809488950195109515953095329553959596009611965896749682969096969710973497439754976197659773979798009802980498119869987698859898989999029909992399269928993099399943994499559977998199919997999899991000010001100031000510006100071000810009100101001110012100141001510019100201002110024100261002710028100291003010034100351003810039100401004110045100471004810050100511005210066100711007510080100811008210083100841008610087100891009010093101001018110200102011020510209102101022510240102431024910250102511025410283103481039010393103971039810443104441044510477105331055410810108921089410909109111093410935109361100011001110071111211180112101121111288113001137111401114341148011596116011168011701120001200112016120191205612084120881210312104121061210712111121121211312115121161211712120121211212212124121261212712128121291213012131121341213612137121381213912141121421214312144121451214612147121481215012151121531215412156121581215912161121621216312165121661216812169121701217112173121741217712178121801218112184121871218812189121911219212193121941219612198122041220512206122071220812209122101221212222122231222512226122271223112232122331223612237122411224312251122531225412255122561225812259122601226112263122641226512266122671227112273122741227912280122821228312285122861228712288122891229012292122941229512296123011230212303123041230612307123111231512317123181232212323123241232512328123301233112333123351233712341123431234412345123461234712348123491235112353123541235512356123571235812360123611236212363123651237112372123741237612377123781238012381123831238412386123871238812390123921239612397124001240412406124071240812410124111241212415124171241812420124231242412425124261242712428124291243312434124361243712438124391244012442124441244812449124501245112454124551245712458124591246212463124651246712469124701247512478124791248012481124831248412485124861248712488124891249012491124931249412495124981250112503125051250612507125081250912510125111251212514125181251912520125211252312524125251252612527125291253012532125381253912540125441254512547125491255112554125551255912560125631256412567125681257012572125731257412575125771257812580125811258212583125851258912590126011261512980130821312813380135791402414026140821408414104141301414714265144001440214404144071482514880148951489714905150001500115002150061501815038150441508415123154431550215503155041555515588156721567315831160001600216003160041600616007160081601016011160121601316014160151601616018160201602116022160241602516026160271602816030160311603316035160361603716038160391604016041160421604316045160471605016051160521605416055160571605816059160611606216067160681606916072160731607416075160771607816080160841608516086160891609116092160941609816101161031631116316164001640216404164431646416666168001699216993170001702017070170821710017102171821718417443177711777617778177801800018001180021800418006180081800918010180121801418018180191802018021180221802718029180301803118033180341803718038180411804418045180471805018051180521805318054180561805718058180591806218063180641806518066180691807018071180751807718078180791808118082180831808718088180901809218093180941809518101181021810318105181081810918110181111818118182182001822518239182451836818553187651880218888190001901419015190171902219071190821909019091191001923319776199021993019998199992000020010200202003020053200602007020080200822008420090201002010720150201842020020201202562032520440204432050020512205472088020892208942090021001210022102521082210832120021230212312123321234212362123721239212402124121242212442124521247212482125021251212532125421255212562125721258212592126021261212642126521266212682126921273212742127621277212782127921280212822128321284212852128621287212882128921290212922129421295212962129721298212992130121302213032130521306213072130821312213132131421315213172131921321213222132321325213262132721357213792138121443215152193522000220692208222084221032220622222224032255623023230842318223424240842418124245244422500025001250032500425005250072501025082250842510525565257822665626657270152701627017270362710527571280012801528017284432881829984300013000230003300053000930010300113001330015300173002130022300233002730050300833010130106301113011230120301213012230222303013030330322304223044330468304733050130522306223070030701307183072230822308923089430922310223112231210312223132231337313803142231444315223162231722318223192232022320803212232202322223230332322324003242232443325223262232722327643280032822329223302233060331223322233322333383338933422335223362233722338223392234022341223422234225344223450034522347223482234922350003500235022351013512235153352223524035250352513532235422355223555435559355603562235722358223592236022362223642236501365053652236622367223692236983370223712237215372223732237422374433752237622377223777737822380223808038122382223832238333385203852238622387223882238922390013912239222393223952239822399224000040001400224002940070401224022240322404714052240622408924102241122415224179441800418224202242122422224223542420424224242442922430084308043200433224342243522436224372243922440224410044122441584422244300443014430344304443054430644307443084431044320443334433644337443404434144345443504436544399444104442044422444444450044510445204481844922450004500145002450034500545039451114512245222453224552245667456684567745786457884582145822459224602246122468624700047080473224752247534476224780847822479224798447990480014800248012480134801848019480224810048222483224842248522488994908049121491524915349200494434950249592496824968449686496884969049692496944976750000500025000350005500065000750008500105001250013500145002250042500505007050073500805010050101501065010750113501225016050202504435050050580507775099550996509975099851007511065120051235514345144352010520225220052230523115253652869528815293152951530225341353482534855380654022541385432754490545455492254984550005505555081552005522255350554225544255443554705547555481554905552255553555545572255822570225777857780577825778657787578225800058122582225832258378584225852258532586035882258922590125902259122592225932259522600006000160010600216003060099612346161361616616176161962078620806286563210632566326063443636766447764671646836500065432
11 / tcp
-98713449 | 2025-03-26T04:30:10.614971
13 / tcp
-98713449 | 2025-03-25T19:50:33.598471
15 / tcp
-2031469209 | 2025-03-26T05:19:56.157017
17 / tcp
-2031469209 | 2025-03-26T19:25:21.298763
19 / tcp
-98713449 | 2025-03-26T22:31:33.549770
20 / tcp
-98713449 | 2025-03-23T09:22:10.699022
21 / tcp
-1709955968 | 2025-03-27T01:15:22.103942
22 / tcp
-1897272419 | 2025-03-26T22:01:22.634502
23 / tcp
470668955 | 2025-03-25T19:17:02.812119
25 / tcp
786525225 | 2025-03-26T15:21:24.213125
26 / tcp
872027731 | 2025-03-26T16:25:22.073069
37 / tcp
-98713449 | 2025-03-25T12:40:01.017064
38 / tcp
-2031469209 | 2025-03-23T12:11:40.175845
43 / tcp
-98713449 | 2025-03-25T08:46:01.810954
49 / tcp
-2031469209 | 2025-03-26T18:13:37.441021
53 / tcp
-98713449 | 2025-03-26T19:36:33.036706
66 / tcp
-2031469209 | 2025-03-23T11:38:53.786735
70 / tcp
-98713449 | 2025-03-26T07:06:43.399677
79 / tcp
-98713449 | 2025-03-26T07:30:30.888468
80 / tcp
1699731995 | 2025-03-25T21:37:30.892457
81 / tcp
-1971901369 | 2025-03-26T10:10:46.420773
82 / tcp
115161356 | 2025-03-25T18:06:35.155798
83 / tcp
-1971901369 | 2025-03-26T06:44:07.382491
84 / tcp
870917816 | 2025-03-26T17:51:20.637167
88 / tcp
-1971901369 | 2025-03-26T05:58:07.985794
91 / tcp
-2031469209 | 2025-03-23T00:56:12.640678
92 / tcp
-98713449 | 2025-03-22T07:30:50.368321
93 / tcp
-2031469209 | 2025-03-10T09:38:40.691126
94 / tcp
-2031469209 | 2025-02-26T19:24:27.986110
95 / tcp
-98713449 | 2025-03-22T12:11:30.411196
98 / tcp
-98713449 | 2025-03-22T17:53:18.502801
101 / tcp
-98713449 | 2025-03-23T16:31:23.244053
102 / tcp
-623041173 | 2025-03-26T19:44:21.642341
104 / tcp
-98713449 | 2025-03-26T22:42:52.487799
110 / tcp
-776469200 | 2025-03-26T20:31:15.916252
111 / tcp
-2031469209 | 2025-03-26T06:59:30.520292
113 / tcp
-98713449 | 2025-03-25T19:34:02.909562
119 / tcp
-98713449 | 2025-03-26T03:44:00.623428
121 / tcp
-98713449 | 2025-03-23T00:38:27.398388
135 / tcp
-98713449 | 2025-03-08T12:27:59.906227
143 / tcp
-1687578356 | 2025-03-27T01:30:12.031550
154 / tcp
-98713449 | 2025-03-15T20:20:39.032462
175 / tcp
-2031469209 | 2025-03-26T20:09:21.207075
179 / tcp
-98713449 | 2025-03-27T03:20:25.312314
180 / tcp
-2031469209 | 2025-03-08T12:07:33.449594
195 / tcp
-98713449 | 2025-03-26T06:38:12.567195
211 / tcp
-98713449 | 2025-03-22T15:55:46.673668
221 / tcp
-2031469209 | 2025-03-25T17:18:07.157741
222 / tcp
-1995513033 | 2025-03-23T22:30:11.419468
234 / tcp
-98713449 | 2025-03-16T15:13:19.888446
263 / tcp
-98713449 | 2025-03-22T05:28:20.957170
264 / tcp
-2031469209 | 2025-03-26T12:14:18.977516
285 / tcp
-2031469209 | 2025-03-22T07:11:23.442890
311 / tcp
411540654 | 2025-03-25T13:13:12.214648
340 / tcp
-98713449 | 2025-03-22T03:33:12.806778
343 / tcp
-2031469209 | 2025-03-24T04:24:43.021018
385 / tcp
-98713449 | 2025-02-28T23:34:07.956399
389 / tcp
-2031469209 | 2025-03-26T19:35:47.790187
400 / tcp
-2031469209 | 2025-03-23T15:49:17.918379
427 / tcp
-1453395553 | 2025-03-26T18:17:28.835595
442 / tcp
-98713449 | 2025-03-05T03:14:42.953587
443 / tcp
2092923223 | 2025-03-12T08:03:27.305687
444 / tcp
-1454941180 | 2025-03-26T01:45:57.550747
447 / tcp
-98713449 | 2025-03-24T04:48:16.721155
448 / tcp
-98713449 | 2025-03-23T16:52:45.328843
451 / tcp
-98713449 | 2025-03-22T03:26:20.900967
461 / tcp
-98713449 | 2025-03-12T17:39:02.467884
465 / tcp
-98713449 | 2025-03-27T01:22:31.850565
480 / tcp
-98713449 | 2025-03-06T15:47:54.330206
487 / tcp
-2031469209 | 2025-03-14T13:31:29.986775
502 / tcp
1102142821 | 2025-03-27T03:35:45.887080
503 / tcp
-98713449 | 2025-03-26T17:10:56.699021
513 / tcp
-2031469209 | 2025-03-27T00:51:41.935969
515 / tcp
-2031469209 | 2025-03-26T22:07:47.577936
541 / tcp
-98713449 | 2025-03-26T09:26:47.858023
548 / tcp
-2031469209 | 2025-03-26T12:04:57.642915
554 / tcp
-2031469209 | 2025-03-26T09:24:40.986105
555 / tcp
-98713449 | 2025-03-24T01:05:28.801266
556 / tcp
-98713449 | 2025-03-11T08:01:58.382091
587 / tcp
-2031469209 | 2025-03-25T18:38:32.609085
591 / tcp
-98713449 | 2025-03-23T08:27:03.126206
593 / tcp
-98713449 | 2025-03-26T21:38:33.628036
631 / tcp
998037014 | 2025-03-25T19:39:44.822879
636 / tcp
998037014 | 2025-03-26T10:13:38.270730
646 / tcp
998037014 | 2025-03-22T07:03:48.335776
666 / tcp
-2031469209 | 2025-03-27T00:13:37.061428
685 / tcp
-98713449 | 2025-03-22T02:01:58.963644
689 / tcp
-98713449 | 2025-03-22T19:23:42.428414
700 / tcp
-2031469209 | 2025-03-22T03:54:07.734130
771 / tcp
-98713449 | 2025-03-26T02:28:24.568468
772 / tcp
-98713449 | 2025-03-22T23:11:17.503196
777 / tcp
-98713449 | 2025-03-22T16:41:20.901222
782 / tcp
-98713449 | 2025-03-23T06:33:33.865304
789 / tcp
-2031469209 | 2025-03-27T00:54:47.290989
800 / tcp
-98713449 | 2025-03-23T08:03:47.414437
801 / tcp
-98713449 | 2025-03-23T05:54:09.265467
805 / tcp
-98713449 | 2025-03-23T08:40:05.470371
809 / tcp
-98713449 | 2025-03-24T04:08:32.403215
811 / tcp
-98713449 | 2025-03-24T09:35:22.070347
830 / tcp
-2031469209 | 2025-03-22T02:30:16.590247
853 / tcp
-98713449 | 2025-03-23T13:46:38.050204
873 / tcp
-98713449 | 2025-03-26T17:19:20.252547
880 / tcp
-98713449 | 2025-03-22T19:28:17.569934
885 / tcp
-2031469209 | 2025-03-18T07:07:13.447022
886 / tcp
-98713449 | 2025-03-17T02:20:18.077323
887 / tcp
-2031469209 | 2025-03-22T08:37:51.443452
888 / tcp
-98713449 | 2025-03-22T13:35:21.322304
902 / tcp
-2031469209 | 2025-03-27T00:15:03.207833
943 / tcp
-98713449 | 2025-03-22T19:33:03.025240
947 / tcp
-98713449 | 2025-02-27T03:18:10.324276
990 / tcp
-2031469209 | 2025-03-22T19:13:34.943455
992 / tcp
-2031469209 | 2025-03-26T00:21:51.457084
993 / tcp
-2031469209 | 2025-03-27T02:16:25.203635
994 / tcp
-98713449 | 2025-03-22T06:17:02.873398
995 / tcp
-2031469209 | 2025-03-26T09:48:40.266494
998 / tcp
-2031469209 | 2025-03-22T05:31:04.770388
1000 / tcp
-98713449 | 2025-03-23T11:27:09.534164
1002 / tcp
-98713449 | 2025-03-05T04:09:03.577384
1013 / tcp
-98713449 | 2025-03-23T02:24:24.975346
1022 / tcp
-2031469209 | 2025-03-23T14:39:45.379288
1023 / tcp
-1195952228 | 2025-03-27T02:07:42.086946
1024 / tcp
-98713449 | 2025-03-26T13:52:30.337199
1026 / tcp
-1723522812 | 2025-03-23T17:46:38.105735
1027 / tcp
-98713449 | 2025-03-23T08:01:01.312437
1028 / tcp
-2031469209 | 2025-03-23T10:18:51.570065
1050 / tcp
-98713449 | 2025-03-22T17:03:37.164784
1063 / tcp
-2031469209 | 2025-03-22T04:17:49.796659
1080 / tcp
1121074672 | 2025-03-27T02:41:52.627473
1099 / tcp
1143634665 | 2025-03-26T10:54:02.694309
1110 / tcp
-98713449 | 2025-03-22T18:34:23.180962
1111 / tcp
-2031469209 | 2025-03-23T12:09:59.240705
1119 / tcp
-2031469209 | 2025-03-24T00:37:08.206317
1153 / tcp
-98713449 | 2025-03-26T11:14:59.467804
1188 / tcp
-2031469209 | 2025-03-23T01:35:05.182629
1190 / tcp
-98713449 | 2025-03-22T03:24:05.024287
1193 / tcp
-2031469209 | 2025-03-15T06:03:49.927043
1195 / tcp
-2031469209 | 2025-03-22T13:01:18.860438
1200 / tcp
-2031469209 | 2025-03-26T15:08:41.534134
1234 / tcp
-597069886 | 2025-03-26T23:42:02.101343
1235 / tcp
-98713449 | 2025-03-23T09:59:57.669208
1250 / tcp
-98713449 | 2025-03-18T19:48:07.588819
1283 / tcp
-98713449 | 2025-03-22T23:51:30.801035
1290 / tcp
-98713449 | 2025-03-22T05:56:06.816189
1291 / tcp
-98713449 | 2025-03-22T05:35:43.840406
1293 / tcp
-2031469209 | 2025-03-24T01:45:33.151756
1311 / tcp
-98713449 | 2025-03-27T02:00:35.583982
1337 / tcp
-2135552085 | 2025-03-26T17:41:37.423598
1343 / tcp
-98713449 | 2025-03-15T21:06:58.812087
1355 / tcp
-2031469209 | 2025-02-27T01:07:53.698405
1365 / tcp
-2031469209 | 2025-03-22T13:26:19.700740
1366 / tcp
-2031469209 | 2025-03-23T01:26:34.744060
1370 / tcp
-98713449 | 2025-03-22T11:56:19.172476
1388 / tcp
-2031469209 | 2025-03-23T03:58:20.918908
1400 / tcp
-2031469209 | 2025-03-26T05:52:23.463249
1414 / tcp
-98713449 | 2025-03-27T00:21:04.248570
1433 / tcp
1339473574 | 2025-03-27T03:44:17.324915
1446 / tcp
-2031469209 | 2025-03-22T04:07:26.279108
1450 / tcp
-98713449 | 2025-03-23T00:57:44.112125
1451 / tcp
-98713449 | 2025-03-24T02:55:32.574021
1452 / tcp
-2031469209 | 2025-03-23T08:59:04.463517
1454 / tcp
-2031469209 | 2025-03-23T21:07:57.908574
1455 / tcp
-98713449 | 2025-03-23T00:09:09.442620
1458 / tcp
-2031469209 | 2025-03-23T08:48:24.571431
1460 / tcp
-98713449 | 2025-03-22T02:21:25.982548
1471 / tcp
-98713449 | 2025-03-26T21:41:13.096548
1500 / tcp
-2031469209 | 2025-03-22T13:32:14.340399
1521 / tcp
-98713449 | 2025-03-26T23:15:47.388717
1557 / tcp
-98713449 | 2025-03-23T16:25:23.516742
1577 / tcp
-2031469209 | 2025-03-26T16:50:02.744314
1588 / tcp
-98713449 | 2025-03-22T22:40:56.238196
1599 / tcp
-2031469209 | 2025-03-27T03:51:37.032466
1604 / tcp
-2031469209 | 2025-03-26T20:27:15.525274
1605 / tcp
-2031469209 | 2025-03-23T02:39:11.408452
1723 / tcp
-98713449 | 2025-03-26T21:58:58.851202
1741 / tcp
-98713449 | 2025-03-27T02:13:04.538110
1820 / tcp
-2031469209 | 2025-03-23T00:27:45.738496
1833 / tcp
-2031469209 | 2025-03-22T02:25:56.047694
1883 / tcp
-98713449 | 2025-03-24T18:42:26.048445
1901 / tcp
-2031469209 | 2025-03-23T19:19:51.800512
1911 / tcp
-2031469209 | 2025-03-26T18:43:58.938128
1925 / tcp
-98713449 | 2025-03-26T02:26:48.161961
1926 / tcp
1094048410 | 2025-03-26T18:10:56.873913
1935 / tcp
-98713449 | 2025-03-26T23:24:01.094833
1947 / tcp
-98713449 | 2025-03-22T08:21:56.736709
1950 / tcp
-98713449 | 2025-03-22T03:05:55.582868
1951 / tcp
-98713449 | 2025-03-22T20:40:44.783239
1952 / tcp
-98713449 | 2025-03-23T04:38:55.326063
1953 / tcp
-98713449 | 2025-03-22T06:56:31.147012
1954 / tcp
-2031469209 | 2025-03-24T02:24:01.067799
1955 / tcp
-2031469209 | 2025-03-22T16:47:14.677307
1958 / tcp
-98713449 | 2025-03-22T09:09:38.497227
1959 / tcp
-98713449 | 2025-03-22T12:14:37.921690
1962 / tcp
-2031469209 | 2025-03-26T04:35:27.633966
1965 / tcp
-2031469209 | 2025-03-22T05:54:17.162377
1966 / tcp
-98713449 | 2025-03-23T00:04:46.664968
1967 / tcp
-2031469209 | 2025-03-23T06:11:46.688606
1969 / tcp
-98713449 | 2025-03-24T03:27:17.285640
1970 / tcp
-2031469209 | 2025-03-22T11:44:16.779503
1971 / tcp
-98713449 | 2025-03-21T17:55:07.782215
1972 / tcp
-98713449 | 2025-03-24T04:26:43.842039
1975 / tcp
-98713449 | 2025-03-23T10:09:28.320874
1976 / tcp
-2031469209 | 2025-03-24T00:20:19.971722
1977 / tcp
-98713449 | 2025-03-23T06:29:55.500476
1979 / tcp
-98713449 | 2025-03-23T11:55:05.202589
1980 / tcp
-98713449 | 2025-03-23T16:45:59.386203
1981 / tcp
-98713449 | 2025-03-22T04:16:42.961478
1982 / tcp
-2031469209 | 2025-03-22T06:10:56.587283
1984 / tcp
-98713449 | 2025-03-08T15:37:19.597530
1986 / tcp
-98713449 | 2025-03-26T00:56:11.231055
1987 / tcp
-2031469209 | 2025-03-23T22:55:11.989872
1988 / tcp
-845604421 | 2025-03-22T01:24:55.721525
1989 / tcp
-98713449 | 2025-03-20T21:41:47.074720
2000 / tcp
-2031469209 | 2025-03-26T18:07:09.156495
2001 / tcp
-2031469209 | 2025-03-22T09:00:38.774868
2002 / tcp
-98713449 | 2025-03-26T20:40:20.544805
2003 / tcp
-98713449 | 2025-03-26T23:26:23.702557
2008 / tcp
-98713449 | 2025-03-14T04:05:38.788910
2010 / tcp
-2031469209 | 2025-03-22T03:14:38.956525
2012 / tcp
-98713449 | 2025-03-23T22:24:18.279702
2016 / tcp
-98713449 | 2025-03-23T16:28:21.018035
2022 / tcp
-336938356 | 2025-03-22T04:01:51.104760
2048 / tcp
-98713449 | 2025-03-22T06:35:28.055325
2049 / tcp
1500500966 | 2025-03-23T04:44:29.822647
2052 / tcp
-98713449 | 2025-03-23T23:40:30.043667
2053 / tcp
-98713449 | 2025-03-24T02:43:42.649733
2054 / tcp
-98713449 | 2025-03-26T00:59:37.908284
2056 / tcp
-98713449 | 2025-03-23T07:48:05.642535
2058 / tcp
-2031469209 | 2025-03-22T21:29:04.194985
2059 / tcp
-2031469209 | 2025-03-22T12:26:12.042547
2060 / tcp
-2031469209 | 2025-03-22T10:24:11.346287
2063 / tcp
-2031469209 | 2025-03-24T01:08:17.913421
2064 / tcp
-2031469209 | 2025-03-25T17:33:33.876895
2066 / tcp
-98713449 | 2025-03-23T20:03:45.991034
2067 / tcp
-98713449 | 2025-03-27T02:45:36.312504
2069 / tcp
-2031469209 | 2025-03-22T12:39:37.366405
2070 / tcp
-98713449 | 2025-03-20T11:42:48.932476
2072 / tcp
-98713449 | 2025-03-22T04:55:23.957964
2078 / tcp
-98713449 | 2025-03-23T23:13:52.789756
2079 / tcp
-98713449 | 2025-03-23T03:30:14.338620
2081 / tcp
-98713449 | 2025-03-26T22:04:56.838333
2082 / tcp
-98713449 | 2025-03-26T14:47:00.142299
2083 / tcp
411540654 | 2025-03-27T00:47:11.893089
2086 / tcp
-1475755397 | 2025-03-26T11:42:56.567229
2087 / tcp
-1475755397 | 2025-03-27T01:40:14.652159
2090 / tcp
-1291629541 | 2025-03-22T06:43:08.237852
2095 / tcp
-98713449 | 2025-03-23T07:07:19.654525
2096 / tcp
-98713449 | 2025-03-23T09:42:24.682434
2100 / tcp
-2031469209 | 2025-03-25T16:50:38.958456
2101 / tcp
-2031469209 | 2025-03-22T19:52:13.111605
2103 / tcp
-98713449 | 2025-03-10T01:25:18.056391
2108 / tcp
-98713449 | 2025-03-23T00:20:00.144886
2109 / tcp
-2031469209 | 2025-02-26T05:47:44.686389
2111 / tcp
-98713449 | 2025-03-23T15:30:21.660062
2121 / tcp
-98713449 | 2025-03-25T15:19:04.423241
2122 / tcp
-98713449 | 2025-03-23T15:55:17.032316
2126 / tcp
-98713449 | 2025-03-24T01:15:30.824577
2130 / tcp
-98713449 | 2025-03-23T06:30:52.962113
2134 / tcp
-98713449 | 2025-03-23T13:30:37.573269
2150 / tcp
-2031469209 | 2025-03-22T09:19:45.561627
2154 / tcp
-2031469209 | 2025-03-25T16:33:07.879663
2181 / tcp
-98713449 | 2025-03-27T03:01:07.847539
2195 / tcp
-98713449 | 2025-03-23T13:37:59.486841
2196 / tcp
-2031469209 | 2025-03-08T20:23:00.929833
2201 / tcp
-98713449 | 2025-03-23T04:10:05.074665
2202 / tcp
877793063 | 2025-03-24T16:25:35.191247
2222 / tcp
-1587252351 | 2025-03-27T03:00:51.590134
2224 / tcp
-98713449 | 2025-03-22T15:57:14.733391
2226 / tcp
-2031469209 | 2025-02-28T05:55:08.863610
2232 / tcp
-2031469209 | 2025-03-22T04:01:59.845671
2250 / tcp
-98713449 | 2025-03-11T21:30:04.381356
2271 / tcp
-98713449 | 2025-03-17T07:57:00.453276
2323 / tcp
2067031044 | 2025-03-26T07:19:01.397195
2327 / tcp
-98713449 | 2025-03-22T06:13:55.493337
2332 / tcp
-98713449 | 2025-03-27T01:14:06.189648
2344 / tcp
-98713449 | 2025-03-23T06:14:25.510540
2345 / tcp
-98713449 | 2025-03-26T09:16:13.396858
2362 / tcp
-98713449 | 2025-03-23T02:01:07.821224
2375 / tcp
-98713449 | 2025-03-26T21:33:19.339712
2376 / tcp
1094048410 | 2025-03-26T15:09:28.055582
2379 / tcp
-98713449 | 2025-03-25T13:14:36.355281
2404 / tcp
-1863726365 | 2025-03-27T01:00:04.878577
2423 / tcp
-98713449 | 2025-03-22T14:19:17.582865
2435 / tcp
-98713449 | 2025-03-22T13:12:03.125562
2443 / tcp
-98713449 | 2025-03-23T12:17:25.682366
2455 / tcp
-2031469209 | 2025-03-25T07:54:25.219340
2480 / tcp
1500500966 | 2025-02-25T21:10:19.991627
2525 / tcp
-98713449 | 2025-03-22T03:17:04.157474
2548 / tcp
-98713449 | 2025-03-16T21:47:28.841061
2549 / tcp
-98713449 | 2025-03-14T09:13:05.848284
2550 / tcp
-98713449 | 2025-03-20T12:28:54.697466
2552 / tcp
-2031469209 | 2025-03-24T01:12:11.559216
2554 / tcp
-98713449 | 2025-03-22T23:53:38.219732
2555 / tcp
-98713449 | 2025-03-23T22:10:52.375803
2557 / tcp
-98713449 | 2025-03-24T01:01:00.570096
2558 / tcp
-2031469209 | 2025-03-22T21:39:38.220928
2559 / tcp
-2031469209 | 2025-03-23T04:50:50.200852
2560 / tcp
-98713449 | 2025-03-12T12:34:58.745645
2561 / tcp
-2031469209 | 2025-03-24T03:49:59.101606
2562 / tcp
-98713449 | 2025-03-23T13:14:26.270482
2566 / tcp
-98713449 | 2025-03-23T21:29:00.786127
2567 / tcp
-98713449 | 2025-02-28T06:48:17.729946
2568 / tcp
-98713449 | 2025-03-15T07:04:15.090764
2569 / tcp
-98713449 | 2025-03-23T16:00:48.779625
2572 / tcp
-98713449 | 2025-02-28T10:40:38.476684
2599 / tcp
-98713449 | 2025-03-24T00:06:05.913372
2601 / tcp
-98713449 | 2025-02-25T04:08:13.136468
2602 / tcp
-2031469209 | 2025-03-22T17:29:49.131480
2650 / tcp
-2031469209 | 2025-03-26T23:33:42.184933
2701 / tcp
-98713449 | 2025-03-24T01:11:23.978450
2761 / tcp
-2031469209 | 2025-03-27T02:09:35.217211
2762 / tcp
-2031469209 | 2025-03-26T17:56:25.947936
2806 / tcp
-98713449 | 2025-03-24T04:03:58.371528
2850 / tcp
-98713449 | 2025-03-11T09:11:16.152527
2995 / tcp
-98713449 | 2025-03-22T10:59:50.623783
3000 / tcp
-291974457 | 2025-03-27T00:22:04.871880
3001 / tcp
411540654 | 2025-03-26T23:40:00.595651
3002 / tcp
-98713449 | 2025-02-26T11:28:15.178180
3005 / tcp
-2031469209 | 2025-03-23T10:26:00.725069
3006 / tcp
-2031469209 | 2025-03-12T13:33:32.241778
3007 / tcp
-98713449 | 2025-03-26T02:07:59.323492
3008 / tcp
-98713449 | 2025-03-23T10:02:48.161661
3011 / tcp
-98713449 | 2025-03-23T18:06:40.527316
3013 / tcp
-98713449 | 2025-03-23T11:12:48.692203
3017 / tcp
-2031469209 | 2025-03-22T14:54:39.643690
3018 / tcp
-2031469209 | 2025-03-23T17:13:15.988117
3019 / tcp
-98713449 | 2025-03-22T03:04:47.430865
3020 / tcp
-98713449 | 2025-03-23T07:38:10.984499
3021 / tcp
-2031469209 | 2025-03-10T01:46:52.216162
3022 / tcp
-2031469209 | 2025-03-22T21:31:53.219317
3048 / tcp
-98713449 | 2025-03-23T05:44:17.314235
3049 / tcp
-98713449 | 2025-03-05T03:19:16.082372
3050 / tcp
-2031469209 | 2025-03-25T23:43:53.880816
3051 / tcp
-98713449 | 2025-03-23T05:49:00.390063
3052 / tcp
-2031469209 | 2025-03-23T15:11:39.372649
3055 / tcp
-98713449 | 2025-03-23T12:27:33.104042
3056 / tcp
-98713449 | 2025-03-23T20:36:08.361411
3061 / tcp
-2031469209 | 2025-03-22T16:21:59.982240
3062 / tcp
-98713449 | 2025-03-24T04:39:15.182015
3063 / tcp
-2031469209 | 2025-03-23T15:43:17.958380
3064 / tcp
-98713449 | 2025-03-22T10:32:51.161391
3065 / tcp
-2031469209 | 2025-03-22T13:04:19.488274
3068 / tcp
-98713449 | 2025-03-25T00:50:25.158170
3072 / tcp
-98713449 | 2025-03-23T01:47:18.755594
3074 / tcp
-2031469209 | 2025-03-04T19:23:19.104471
3077 / tcp
-2031469209 | 2025-03-16T15:27:40.123858
3078 / tcp
-2031469209 | 2025-03-09T05:48:19.660637
3080 / tcp
-2031469209 | 2025-03-26T03:54:34.229747
3081 / tcp
-98713449 | 2025-03-24T04:10:04.149329
3082 / tcp
-2031469209 | 2025-02-27T19:07:34.891119
3083 / tcp
-98713449 | 2025-03-24T01:22:33.849466
3084 / tcp
-2031469209 | 2025-03-24T01:09:48.256086
3086 / tcp
-98713449 | 2025-03-22T21:12:48.872450
3087 / tcp
-98713449 | 2025-03-11T09:58:25.355763
3088 / tcp
-98713449 | 2025-03-24T03:58:43.273265
3090 / tcp
-2031469209 | 2025-03-23T11:32:48.715110
3091 / tcp
-2031469209 | 2025-03-24T03:28:40.654612
3092 / tcp
-2031469209 | 2025-03-23T18:21:22.920785
3093 / tcp
-98713449 | 2025-03-22T10:17:35.801670
3094 / tcp
-98713449 | 2025-03-23T11:53:36.045023
3095 / tcp
-98713449 | 2025-03-22T06:18:52.618752
3096 / tcp
-98713449 | 2025-03-22T20:54:16.897571
3098 / tcp
-2031469209 | 2025-03-23T22:20:18.968461
3100 / tcp
-98713449 | 2025-03-22T09:13:54.582566
3101 / tcp
-98713449 | 2025-03-22T16:38:38.397278
3102 / tcp
-98713449 | 2025-03-22T07:14:13.336928
3103 / tcp
-2031469209 | 2025-03-24T03:32:57.012749
3104 / tcp
-98713449 | 2025-03-22T12:22:04.808990
3105 / tcp
-2031469209 | 2025-03-22T06:29:51.216664
3106 / tcp
-2031469209 | 2025-03-23T04:34:12.177978
3108 / tcp
-98713449 | 2025-03-22T23:21:51.601982
3110 / tcp
-2031469209 | 2025-03-22T04:01:47.175525
3112 / tcp
-98713449 | 2025-03-23T17:19:01.007127
3113 / tcp
-98713449 | 2025-03-04T22:09:22.085929
3115 / tcp
-98713449 | 2025-03-23T03:16:07.439093
3116 / tcp
-98713449 | 2025-03-24T03:14:03.905610
3118 / tcp
-2031469209 | 2025-03-23T04:12:29.232084
3119 / tcp
-2031469209 | 2025-03-23T04:52:11.207293
3120 / tcp
-98713449 | 2025-03-22T05:40:11.782412
3121 / tcp
-98713449 | 2025-03-23T16:24:10.378162
3122 / tcp
-98713449 | 2025-03-22T19:25:49.847547
3124 / tcp
-98713449 | 2025-03-23T15:31:23.910190
3125 / tcp
-98713449 | 2025-03-23T11:15:07.524832
3128 / tcp
-98713449 | 2025-03-26T02:01:07.516707
3136 / tcp
-98713449 | 2025-03-11T03:09:35.475496
3137 / tcp
-98713449 | 2025-03-23T22:47:58.138581
3138 / tcp
-98713449 | 2025-03-23T07:51:01.498712
3141 / tcp
-98713449 | 2025-03-23T19:51:49.349073
3145 / tcp
-98713449 | 2025-03-22T08:24:43.950636
3146 / tcp
-98713449 | 2025-03-23T23:53:59.089656
3147 / tcp
-98713449 | 2025-03-23T19:50:52.962945
3148 / tcp
-98713449 | 2025-03-23T07:00:01.937452
3149 / tcp
-2031469209 | 2025-03-23T05:59:55.281090
3150 / tcp
-98713449 | 2025-03-23T19:58:09.772731
3152 / tcp
-98713449 | 2025-03-13T11:27:21.838143
3153 / tcp
-98713449 | 2025-03-22T08:49:48.897745
3154 / tcp
-2031469209 | 2025-03-23T07:31:45.071908
3155 / tcp
-98713449 | 2025-03-22T08:10:06.664329
3157 / tcp
-98713449 | 2025-03-23T16:06:50.129105
3158 / tcp
-98713449 | 2025-03-23T23:44:26.682823
3160 / tcp
-2031469209 | 2025-03-23T03:24:49.596228
3161 / tcp
-98713449 | 2025-03-24T00:28:33.364530
3162 / tcp
-98713449 | 2025-03-16T12:26:22.327624
3163 / tcp
-98713449 | 2025-03-22T15:32:50.877034
3164 / tcp
-98713449 | 2025-03-23T09:28:20.306140
3168 / tcp
-98713449 | 2025-03-22T19:46:07.169689
3170 / tcp
-2031469209 | 2025-03-22T15:22:02.125239
3171 / tcp
-98713449 | 2025-03-23T05:49:45.645590
3172 / tcp
-2031469209 | 2025-03-22T09:05:15.683802
3173 / tcp
-98713449 | 2025-03-22T19:43:24.469471
3174 / tcp
-98713449 | 2025-03-06T04:12:58.695169
3177 / tcp
-98713449 | 2025-03-23T16:35:40.796860
3178 / tcp
-98713449 | 2025-03-23T00:38:36.782940
3179 / tcp
-2031469209 | 2025-03-23T20:11:17.238889
3180 / tcp
-2031469209 | 2025-02-28T12:03:33.576822
3182 / tcp
-2031469209 | 2025-03-23T03:55:11.774234
3183 / tcp
-98713449 | 2025-03-23T01:20:05.596912
3184 / tcp
-2031469209 | 2025-03-26T09:36:36.302932
3186 / tcp
-98713449 | 2025-03-23T01:31:16.915990
3187 / tcp
-2031469209 | 2025-03-09T21:09:36.092741
3188 / tcp
-2031469209 | 2025-03-22T04:29:05.191637
3190 / tcp
-98713449 | 2025-03-22T10:48:21.818414
3191 / tcp
-98713449 | 2025-03-22T04:21:22.228087
3192 / tcp
-98713449 | 2025-03-23T22:09:49.847086
3193 / tcp
-98713449 | 2025-03-22T03:55:14.135665
3194 / tcp
-98713449 | 2025-03-22T15:45:07.810968
3196 / tcp
-2031469209 | 2025-03-22T17:09:18.708179
3197 / tcp
-98713449 | 2025-03-23T18:22:25.703449
3198 / tcp
-2031469209 | 2025-03-23T20:41:40.539105
3200 / tcp
-98713449 | 2025-03-23T17:52:25.791575
3211 / tcp
-98713449 | 2025-03-23T17:36:30.240714
3256 / tcp
411540654 | 2025-03-14T19:00:54.523223
3260 / tcp
-2031469209 | 2025-03-27T03:58:23.036428
3268 / tcp
-2031469209 | 2025-03-26T00:07:10.028724
3269 / tcp
-2031469209 | 2025-03-27T02:30:54.896556
3299 / tcp
-98713449 | 2025-03-27T03:32:46.743686
3301 / tcp
-98713449 | 2025-03-26T19:50:18.377131
3306 / tcp
-740155298 | 2025-03-26T22:23:27.258064
3307 / tcp
1781453205 | 2025-03-23T11:03:24.629928
3310 / tcp
-98713449 | 2025-03-27T02:22:29.057077
3337 / tcp
-98713449 | 2025-03-22T04:33:20.268971
3341 / tcp
-2031469209 | 2025-03-23T21:09:34.451730
3345 / tcp
-2031469209 | 2025-03-12T12:52:29.430328
3349 / tcp
-98713449 | 2025-03-22T10:24:02.216691
3352 / tcp
-98713449 | 2025-03-22T13:14:36.677121
3365 / tcp
-2031469209 | 2025-03-22T14:49:10.558741
3388 / tcp
-98713449 | 2025-03-26T19:03:40.177105
3389 / tcp
-681648404 | 2025-03-26T12:31:25.928914
3402 / tcp
-2031469209 | 2025-03-22T12:05:11.964937
3403 / tcp
-2031469209 | 2025-03-22T13:53:53.108326
3404 / tcp
-98713449 | 2025-03-26T00:50:41.858016
3405 / tcp
-98713449 | 2025-03-06T18:29:28.397856
3406 / tcp
-2031469209 | 2025-03-23T07:29:22.499956
3409 / tcp
-98713449 | 2025-02-28T19:34:02.668065
3479 / tcp
-2031469209 | 2025-03-23T18:33:07.312626
3498 / tcp
-2031469209 | 2025-03-22T06:22:03.140127
3524 / tcp
-2031469209 | 2025-03-22T20:11:41.272313
3541 / tcp
-2031469209 | 2025-03-26T07:44:42.174499
3542 / tcp
-2031469209 | 2025-03-26T13:50:21.504828
3550 / tcp
-98713449 | 2025-03-23T13:07:34.466809
3551 / tcp
-98713449 | 2025-03-25T14:40:31.796457
3553 / tcp
-98713449 | 2025-03-23T18:31:04.478963
3558 / tcp
-98713449 | 2025-03-22T09:59:48.144446
3563 / tcp
-98713449 | 2025-03-25T09:02:56.039097
3567 / tcp
-98713449 | 2025-02-25T23:15:35.665364
3569 / tcp
-2031469209 | 2025-03-22T21:22:54.774269
3570 / tcp
-2031469209 | 2025-03-22T05:46:20.956055
3572 / tcp
-98713449 | 2025-03-13T08:11:20.873782
3689 / tcp
-98713449 | 2025-03-27T00:07:47.084757
3690 / tcp
-2031469209 | 2025-03-15T12:27:31.739422
3749 / tcp
-98713449 | 2025-03-26T17:37:03.927809
3780 / tcp
411540654 | 2025-03-25T23:38:02.361829
3790 / tcp
411540654 | 2025-03-26T01:51:55.531528
3791 / tcp
-98713449 | 2025-03-23T21:39:46.376553
3792 / tcp
-98713449 | 2025-03-22T14:09:12.200363
3793 / tcp
-98713449 | 2025-03-23T19:37:40.374347
3838 / tcp
-2031469209 | 2025-03-22T15:05:05.128361
3841 / tcp
-98713449 | 2025-03-23T21:18:13.714646
3842 / tcp
-98713449 | 2025-03-23T16:32:26.584905
3910 / tcp
-2031469209 | 2025-03-22T14:16:08.167767
3953 / tcp
-98713449 | 2025-03-23T09:38:00.268201
3954 / tcp
-98713449 | 2025-03-23T06:56:37.315564
4000 / tcp
-98713449 | 2025-03-25T12:34:25.858091
4002 / tcp
-98713449 | 2025-03-23T03:20:31.731091
4022 / tcp
-597069886 | 2025-03-27T02:47:57.444208
4023 / tcp
-2031469209 | 2025-02-28T22:48:37.552357
4040 / tcp
-98713449 | 2025-03-25T05:47:47.345668
4042 / tcp
-98713449 | 2025-03-23T11:59:36.405781
4063 / tcp
-98713449 | 2025-03-26T07:45:19.464562
4064 / tcp
-2031469209 | 2025-03-26T20:32:31.229210
4072 / tcp
-2031469209 | 2025-03-24T01:57:13.194928
4080 / tcp
-2031469209 | 2025-03-23T07:11:51.164324
4095 / tcp
-98713449 | 2025-03-23T04:55:31.657366
4100 / tcp
-98713449 | 2025-03-10T14:22:07.607383
4103 / tcp
-98713449 | 2025-03-23T08:47:41.025573
4104 / tcp
-2031469209 | 2025-03-23T11:42:47.226667
4117 / tcp
-98713449 | 2025-03-23T00:03:04.480110
4148 / tcp
-98713449 | 2025-03-23T08:43:10.947246
4150 / tcp
-2031469209 | 2025-03-26T23:55:35.370456
4155 / tcp
-2031469209 | 2025-03-24T03:15:20.243262
4159 / tcp
-98713449 | 2025-03-23T00:50:50.974771
4160 / tcp
-2031469209 | 2025-03-23T06:10:10.526678
4172 / tcp
-98713449 | 2025-03-24T09:37:10.034119
4190 / tcp
-98713449 | 2025-03-24T03:31:17.561404
4200 / tcp
-98713449 | 2025-03-23T02:44:01.233088
4242 / tcp
-151615138 | 2025-03-27T03:44:21.508488
4244 / tcp
-98713449 | 2025-03-06T00:06:23.014813
4250 / tcp
-98713449 | 2025-03-22T13:27:34.787922
4282 / tcp
-2031469209 | 2025-03-17T02:22:34.574837
4300 / tcp
-98713449 | 2025-03-20T23:53:40.916498
4321 / tcp
-98713449 | 2025-03-26T01:56:17.550557
4333 / tcp
-98713449 | 2025-03-23T19:21:40.436461
4344 / tcp
-98713449 | 2025-02-28T04:29:27.979925
4369 / tcp
-98713449 | 2025-03-26T00:03:30.116995
4400 / tcp
-2031469209 | 2025-03-21T06:39:04.568794
4401 / tcp
-2031469209 | 2025-03-23T11:17:00.864629
4431 / tcp
-98713449 | 2025-03-22T21:05:35.697565
4432 / tcp
-2031469209 | 2025-03-23T05:20:00.450816
4433 / tcp
864306896 | 2025-03-26T04:15:11.672451
4434 / tcp
1094048410 | 2025-03-26T22:48:19.174560
4435 / tcp
-98713449 | 2025-03-17T08:35:47.730457
4436 / tcp
-2031469209 | 2025-03-08T22:01:03.573290
4438 / tcp
-98713449 | 2025-03-23T12:51:12.871786
4443 / tcp
1059152961 | 2025-03-27T04:00:49.338840
4447 / tcp
-2031469209 | 2025-03-22T16:48:50.038938
4451 / tcp
-98713449 | 2025-03-22T01:41:53.927601
4455 / tcp
-98713449 | 2025-03-23T01:18:18.173990
4457 / tcp
-2031469209 | 2025-03-23T23:44:42.572060
4459 / tcp
-98713449 | 2025-03-24T01:32:26.632221
4463 / tcp
-98713449 | 2025-03-22T08:00:43.848465
4477 / tcp
-98713449 | 2025-03-22T14:36:02.128839
4488 / tcp
-98713449 | 2025-03-23T10:29:38.184265
4500 / tcp
-2031469209 | 2025-03-26T23:36:18.819859
4502 / tcp
-98713449 | 2025-03-23T22:25:39.881332
4506 / tcp
-98713449 | 2025-03-26T21:09:32.887787
4510 / tcp
-98713449 | 2025-03-24T07:58:51.077291
4523 / tcp
-98713449 | 2025-03-01T01:47:07.007264
4524 / tcp
-98713449 | 2025-03-24T23:56:40.438833
4528 / tcp
-2031469209 | 2025-03-23T12:05:51.790855
4530 / tcp
-98713449 | 2025-03-22T16:53:15.259156
4531 / tcp
-2031469209 | 2025-03-22T14:26:27.203025
4543 / tcp
-2031469209 | 2025-03-23T12:57:09.797123
4567 / tcp
-2031469209 | 2025-03-26T05:42:59.810419
4602 / tcp
-2031469209 | 2025-03-19T12:35:59.939671
4643 / tcp
-98713449 | 2025-03-23T02:12:23.703391
4646 / tcp
-98713449 | 2025-03-22T14:40:13.068760
4664 / tcp
-2031469209 | 2025-03-26T07:52:20.154983
4734 / tcp
-2031469209 | 2025-03-22T10:51:04.220764
4747 / tcp
-98713449 | 2025-03-23T02:08:13.665686
4782 / tcp
-2031469209 | 2025-03-25T15:03:16.417031
4786 / tcp
-1478571435 | 2025-03-26T02:01:49.478683
4821 / tcp
-98713449 | 2025-03-22T23:02:19.707879
4840 / tcp
-98713449 | 2025-03-26T20:44:58.787976
4848 / tcp
-2031469209 | 2025-03-26T20:00:15.205480
4899 / tcp
-98713449 | 2025-03-26T09:05:32.145947
4911 / tcp
-98713449 | 2025-03-26T08:04:45.478248
4933 / tcp
-98713449 | 2025-03-22T16:56:05.322899
4949 / tcp
-2031469209 | 2025-03-25T09:57:45.786282
4993 / tcp
-98713449 | 2025-02-27T12:21:06.403339
5000 / tcp
1561587376 | 2025-03-26T09:29:49.712419
5002 / tcp
-98713449 | 2025-02-28T09:45:43.981351
5004 / tcp
-2031469209 | 2025-03-22T04:40:52.696395
5005 / tcp
-2031469209 | 2025-03-26T15:30:33.183957
5006 / tcp
411540654 | 2025-03-26T22:53:32.735347
5007 / tcp
-98713449 | 2025-03-26T04:14:48.827680
5009 / tcp
-98713449 | 2025-03-26T07:27:02.469596
5010 / tcp
-2031469209 | 2025-03-25T23:31:37.456932
5011 / tcp
-98713449 | 2025-03-23T06:03:00.475408
5022 / tcp
-1237317262 | 2025-03-23T04:49:27.032001
5025 / tcp
-2031469209 | 2025-03-27T00:31:33.290189
5070 / tcp
-98713449 | 2025-03-22T12:02:18.651043
5080 / tcp
-98713449 | 2025-03-24T00:25:22.056854
5083 / tcp
-98713449 | 2025-03-22T21:46:55.391271
5093 / tcp
-98713449 | 2025-03-23T22:21:42.799570
5100 / tcp
-98713449 | 2025-03-23T04:01:36.130532
5119 / tcp
-98713449 | 2025-03-22T10:02:35.082086
5120 / tcp
-98713449 | 2025-03-22T17:46:01.143415
5122 / tcp
-98713449 | 2025-03-24T00:13:33.526508
5123 / tcp
-98713449 | 2025-03-24T04:28:51.366161
5130 / tcp
-98713449 | 2025-03-22T08:54:37.768898
5135 / tcp
-98713449 | 2025-03-22T02:42:46.886054
5140 / tcp
-98713449 | 2025-03-22T02:54:56.495083
5172 / tcp
411540654 | 2025-03-27T03:46:23.493847
5201 / tcp
-2031469209 | 2025-03-26T21:05:18.108894
5209 / tcp
-2031469209 | 2025-03-23T19:15:43.056126
5222 / tcp
-2031469209 | 2025-03-26T19:36:50.788945
5224 / tcp
-98713449 | 2025-03-22T19:30:13.532158
5226 / tcp
-2031469209 | 2025-03-20T06:06:35.945027
5227 / tcp
-98713449 | 2025-03-22T19:00:10.651477
5229 / tcp
-98713449 | 2025-03-23T09:37:03.599020
5230 / tcp
-98713449 | 2025-03-23T00:33:41.801019
5231 / tcp
-2031469209 | 2025-03-24T00:59:34.256112
5232 / tcp
-2031469209 | 2025-03-24T02:07:11.655580
5233 / tcp
-98713449 | 2025-03-23T17:37:59.351532
5234 / tcp
-98713449 | 2025-03-23T10:36:22.065465
5235 / tcp
-2031469209 | 2025-03-23T06:04:34.744808
5236 / tcp
-2031469209 | 2025-02-25T23:05:54.911170
5237 / tcp
-2031469209 | 2025-03-22T10:57:09.917956
5239 / tcp
-2031469209 | 2025-03-23T13:32:10.643686
5241 / tcp
-98713449 | 2025-03-23T04:02:52.967827
5242 / tcp
-2031469209 | 2025-03-18T21:41:24.380310
5244 / tcp
-2031469209 | 2025-02-25T16:52:19.043257
5245 / tcp
-2031469209 | 2025-03-22T17:22:48.095402
5246 / tcp
-2031469209 | 2025-03-23T06:39:30.354403
5248 / tcp
-2031469209 | 2025-03-22T19:35:57.735501
5249 / tcp
-2031469209 | 2025-03-24T02:53:38.520385
5250 / tcp
-98713449 | 2025-03-22T20:32:12.436074
5252 / tcp
-98713449 | 2025-03-22T19:03:07.775878
5253 / tcp
-98713449 | 2025-03-23T07:49:44.869859
5256 / tcp
-98713449 | 2025-03-24T04:35:49.535038
5257 / tcp
-2031469209 | 2025-03-23T14:49:11.364677
5258 / tcp
-98713449 | 2025-03-26T18:06:43.316768
5259 / tcp
-98713449 | 2025-03-23T22:05:17.316728
5260 / tcp
-2031469209 | 2025-03-22T17:25:30.149520
5264 / tcp
-98713449 | 2025-03-04T05:00:47.010610
5266 / tcp
-2031469209 | 2025-03-23T01:49:09.184329
5267 / tcp
-98713449 | 2025-03-15T09:23:52.483919
5268 / tcp
-98713449 | 2025-03-13T05:06:19.627779
5269 / tcp
-2031469209 | 2025-03-26T14:45:34.337951
5271 / tcp
-98713449 | 2025-03-22T06:47:22.717930
5272 / tcp
-98713449 | 2025-03-22T09:11:02.649793
5276 / tcp
-2031469209 | 2025-03-23T18:08:10.534412
5277 / tcp
-98713449 | 2025-03-23T10:11:38.199051
5279 / tcp
-98713449 | 2025-03-25T12:10:24.577621
5280 / tcp
-98713449 | 2025-03-22T08:12:15.043393
5321 / tcp
-2031469209 | 2025-03-23T13:23:31.631268
5357 / tcp
-98713449 | 2025-03-26T04:49:38.476607
5400 / tcp
-98713449 | 2025-03-23T10:41:02.147138
5431 / tcp
-2031469209 | 2025-03-22T12:37:45.530307
5432 / tcp
-726790289 | 2025-03-25T18:08:36.601718
5435 / tcp
-98713449 | 2025-03-26T22:27:08.780060
5440 / tcp
-98713449 | 2025-03-22T19:34:25.371182
5443 / tcp
-2031469209 | 2025-03-22T16:05:00.463318
5456 / tcp
-98713449 | 2025-03-22T21:43:49.187294
5494 / tcp
-2031469209 | 2025-03-22T03:57:02.125464
5500 / tcp
-98713449 | 2025-03-22T15:15:55.821939
5542 / tcp
-2031469209 | 2025-03-22T16:06:43.854823
5543 / tcp
-2031469209 | 2025-03-23T12:48:10.832221
5555 / tcp
1675216947 | 2025-03-21T21:14:56.696168
5556 / tcp
-98713449 | 2025-03-23T03:02:47.508650
5557 / tcp
-98713449 | 2025-03-22T23:50:03.492705
5558 / tcp
-2031469209 | 2025-03-22T07:54:33.234183
5560 / tcp
-98713449 | 2025-03-25T14:04:19.161086
5567 / tcp
-2031469209 | 2025-03-22T20:12:14.555413
5568 / tcp
-98713449 | 2025-03-23T12:30:28.137445
5591 / tcp
-2031469209 | 2025-03-23T03:40:23.169773
5592 / tcp
-2031469209 | 2025-03-23T09:29:21.552059
5593 / tcp
-98713449 | 2025-03-22T06:09:52.776359
5594 / tcp
-2031469209 | 2025-03-23T14:10:22.866958
5596 / tcp
-98713449 | 2025-03-14T02:36:55.610849
5597 / tcp
-98713449 | 2025-03-24T02:45:11.643914
5599 / tcp
-98713449 | 2025-03-22T02:14:00.402866
5600 / tcp
-98713449 | 2025-03-23T11:22:39.663867
5601 / tcp
997310454 | 2025-03-26T12:42:42.950804
5602 / tcp
-2031469209 | 2025-03-23T09:45:34.616030
5604 / tcp
-2031469209 | 2025-03-13T14:56:55.951610
5605 / tcp
-98713449 | 2025-03-24T04:11:36.197605
5607 / tcp
-98713449 | 2025-03-22T13:45:33.770377
5613 / tcp
-98713449 | 2025-03-22T04:58:58.183229
5614 / tcp
-2031469209 | 2025-03-22T06:41:26.963108
5620 / tcp
-98713449 | 2025-03-22T06:06:42.471033
5630 / tcp
-98713449 | 2025-02-26T10:10:04.468618
5640 / tcp
-2031469209 | 2025-03-23T18:18:32.422633
5671 / tcp
-2031469209 | 2025-03-20T23:06:50.280356
5673 / tcp
-98713449 | 2025-03-22T02:40:45.059436
5678 / tcp
1561587376 | 2025-03-22T16:32:48.623278
5680 / tcp
-98713449 | 2025-03-22T10:41:01.355009
5696 / tcp
-2031469209 | 2025-03-23T19:59:29.857904
5698 / tcp
-98713449 | 2025-03-23T09:19:39.425939
5721 / tcp
-2031469209 | 2025-03-23T18:34:11.004532
5800 / tcp
-98713449 | 2025-03-27T02:27:48.414785
5801 / tcp
-2031469209 | 2025-03-27T03:49:54.996805
5853 / tcp
-2031469209 | 2025-03-23T13:49:38.692580
5858 / tcp
-98713449 | 2025-03-27T00:33:16.654556
5901 / tcp
-98713449 | 2025-03-26T04:03:21.827117
5905 / tcp
-2031469209 | 2025-03-22T04:12:24.752251
5906 / tcp
-98713449 | 2025-03-22T05:38:44.030241
5907 / tcp
-2031469209 | 2025-03-26T09:02:09.593355
5908 / tcp
-2031469209 | 2025-03-23T09:25:24.972132
5909 / tcp
-98713449 | 2025-03-22T23:42:35.109247
5910 / tcp
-2031469209 | 2025-03-24T00:26:32.381774
5912 / tcp
-98713449 | 2025-03-23T05:31:22.751504
5915 / tcp
-2031469209 | 2025-03-11T08:29:56.046495
5916 / tcp
-2031469209 | 2025-03-23T21:38:18.875856
5919 / tcp
-98713449 | 2025-03-22T07:44:05.613281
5920 / tcp
-2031469209 | 2025-03-23T20:02:47.746045
5938 / tcp
-2031469209 | 2025-03-27T01:33:58.321669
5984 / tcp
-453886593 | 2025-03-27T02:56:15.717670
5985 / tcp
-427937664 | 2025-03-27T00:36:53.583618
5986 / tcp
-148406134 | 2025-03-26T08:17:58.167964
5987 / tcp
-2031469209 | 2025-03-23T00:27:09.169277
5988 / tcp
-98713449 | 2025-03-22T22:14:55.772688
5990 / tcp
-98713449 | 2025-03-23T00:36:15.969859
5991 / tcp
-98713449 | 2025-03-22T04:21:25.773895
5994 / tcp
-98713449 | 2025-03-26T16:47:10.740350
5995 / tcp
-98713449 | 2025-03-23T13:42:22.935831
5997 / tcp
-98713449 | 2025-03-23T09:47:00.368946
5998 / tcp
-98713449 | 2025-03-23T12:52:20.671295
6000 / tcp
-98713449 | 2025-03-26T05:11:16.718045
6001 / tcp
-2031469209 | 2025-03-26T16:35:10.959182
6002 / tcp
-98713449 | 2025-03-24T21:49:32.469980
6003 / tcp
-2031469209 | 2025-03-22T21:20:26.611712
6004 / tcp
-2031469209 | 2025-03-22T16:44:10.757580
6006 / tcp
-98713449 | 2025-03-24T03:26:03.599470
6008 / tcp
-98713449 | 2025-03-22T14:04:36.439170
6010 / tcp
-98713449 | 2025-03-22T17:21:30.512469
6011 / tcp
-98713449 | 2025-03-13T22:59:04.640839
6022 / tcp
-98713449 | 2025-03-23T04:38:43.720720
6050 / tcp
-98713449 | 2025-03-23T20:55:38.279190
6061 / tcp
-98713449 | 2025-03-23T22:12:25.273468
6080 / tcp
-98713449 | 2025-03-26T19:16:53.198223
6081 / tcp
-98713449 | 2025-03-23T05:35:34.076659
6100 / tcp
-98713449 | 2025-03-22T13:25:33.749855
6102 / tcp
-98713449 | 2025-03-22T17:47:27.545806
6134 / tcp
-2031469209 | 2025-03-16T10:44:22.492835
6161 / tcp
-2031469209 | 2025-03-22T18:45:15.930620
6363 / tcp
-98713449 | 2025-03-23T03:14:20.733679
6379 / tcp
-1963419546 | 2025-03-26T21:03:07.892641
6400 / tcp
-2031469209 | 2025-03-26T22:30:39.814125
6405 / tcp
-98713449 | 2025-03-23T21:54:53.045360
6443 / tcp
411540654 | 2025-03-26T20:34:37.511949
6464 / tcp
-2031469209 | 2025-02-27T14:38:32.708145
6482 / tcp
-98713449 | 2025-03-22T15:29:57.627156
6488 / tcp
-2031469209 | 2025-03-24T00:44:28.886153
6505 / tcp
-98713449 | 2025-03-26T17:47:33.693355
6510 / tcp
-98713449 | 2025-03-22T14:37:21.590896
6511 / tcp
-98713449 | 2025-03-24T00:43:08.487377
6512 / tcp
-98713449 | 2025-03-23T15:12:51.174138
6543 / tcp
-98713449 | 2025-03-22T15:00:41.934293
6550 / tcp
-98713449 | 2025-03-22T03:36:36.069205
6556 / tcp
-2031469209 | 2025-03-22T07:08:14.277110
6560 / tcp
-98713449 | 2025-03-22T18:22:34.799408
6565 / tcp
-98713449 | 2025-03-09T19:11:31.712433
6590 / tcp
-98713449 | 2025-03-22T10:26:44.967696
6601 / tcp
-98713449 | 2025-03-22T23:09:17.220241
6603 / tcp
-2031469209 | 2025-03-24T03:00:49.626352
6605 / tcp
-98713449 | 2025-03-23T15:37:21.901219
6633 / tcp
-98713449 | 2025-03-26T18:24:04.397599
6650 / tcp
-98713449 | 2025-03-22T04:45:22.999931
6653 / tcp
-2031469209 | 2025-03-26T07:08:29.266391
6662 / tcp
-98713449 | 2025-03-24T02:01:34.572909
6664 / tcp
-98713449 | 2025-03-27T02:40:17.150523
6666 / tcp
-98713449 | 2025-03-25T15:15:09.039152
6667 / tcp
-98713449 | 2025-03-26T15:18:55.016570
6668 / tcp
-98713449 | 2025-03-26T20:07:31.307439
6686 / tcp
-98713449 | 2025-03-22T05:57:11.686978
6688 / tcp
-98713449 | 2025-03-23T07:24:40.115147
6697 / tcp
-98713449 | 2025-03-27T01:26:21.354430
6699 / tcp
-2031469209 | 2025-03-22T07:02:12.148659
6700 / tcp
-98713449 | 2025-03-22T16:43:05.379340
6755 / tcp
-98713449 | 2025-03-20T18:24:04.622288
6779 / tcp
-2031469209 | 2025-03-23T16:33:37.546540
6789 / tcp
-2031469209 | 2025-03-22T12:17:40.076062
6887 / tcp
-98713449 | 2025-03-26T19:23:00.770457
6955 / tcp
-98713449 | 2025-03-12T02:45:16.743219
7000 / tcp
-2031469209 | 2025-03-23T00:23:14.661891
7001 / tcp
-1514911176 | 2025-03-26T08:30:23.800233
7002 / tcp
-98713449 | 2025-03-22T19:38:52.870872
7004 / tcp
-2031469209 | 2025-03-10T22:05:53.925061
7006 / tcp
-98713449 | 2025-03-23T01:32:37.990796
7011 / tcp
-2031469209 | 2025-03-23T02:56:47.044538
7013 / tcp
-98713449 | 2025-03-22T23:44:16.216125
7015 / tcp
-2031469209 | 2025-03-23T04:58:15.767179
7016 / tcp
-2031469209 | 2025-03-22T16:36:46.030241
7018 / tcp
-98713449 | 2025-03-22T12:31:01.360802
7025 / tcp
-98713449 | 2025-03-23T22:37:54.569560
7070 / tcp
-98713449 | 2025-03-23T13:20:42.086953
7071 / tcp
1094048410 | 2025-03-26T23:46:38.008219
7078 / tcp
-98713449 | 2025-03-26T01:02:42.807729
7079 / tcp
-98713449 | 2025-03-23T12:13:01.906204
7080 / tcp
-98713449 | 2025-03-23T17:02:53.343389
7081 / tcp
-98713449 | 2025-03-22T16:12:40.680665
7082 / tcp
-2031469209 | 2025-03-24T01:38:16.921881
7084 / tcp
-2031469209 | 2025-03-24T00:10:54.475889
7086 / tcp
-2031469209 | 2025-03-23T07:10:31.228483
7087 / tcp
-2031469209 | 2025-03-23T09:16:39.867037
7102 / tcp
-2031469209 | 2025-03-23T00:21:22.830570
7105 / tcp
-98713449 | 2025-03-05T19:02:48.679292
7170 / tcp
-2031469209 | 2025-03-22T12:45:16.374887
7171 / tcp
-98713449 | 2025-03-26T02:15:31.521898
7172 / tcp
-98713449 | 2025-03-23T20:46:45.804576
7218 / tcp
-98713449 | 2025-03-26T12:28:31.916769
7325 / tcp
-2031469209 | 2025-03-24T00:10:18.817630
7348 / tcp
-98713449 | 2025-03-23T23:37:30.807789
7401 / tcp
-2031469209 | 2025-03-22T01:41:10.964154
7403 / tcp
-2031469209 | 2025-03-23T00:03:16.780236
7434 / tcp
1094048410 | 2025-03-27T03:29:21.967661
7441 / tcp
-2031469209 | 2025-03-23T16:13:59.932655
7443 / tcp
411540654 | 2025-03-26T22:11:50.070509
7465 / tcp
-98713449 | 2025-03-19T11:41:35.109717
7473 / tcp
-2031469209 | 2025-03-23T19:02:18.568037
7474 / tcp
2105495716 | 2025-03-27T03:53:34.941637
7500 / tcp
-2031469209 | 2025-03-09T21:37:51.791866
7510 / tcp
-2031469209 | 2025-03-22T02:54:16.132117
7537 / tcp
-98713449 | 2025-03-23T02:05:20.567539
7547 / tcp
430537855 | 2025-03-25T18:46:21.100459
7548 / tcp
1094048410 | 2025-03-26T18:47:20.888321
7603 / tcp
-98713449 | 2025-03-12T20:46:08.307288
7634 / tcp
-98713449 | 2025-03-25T16:53:55.834483
7657 / tcp
-98713449 | 2025-03-26T15:02:12.150008
7676 / tcp
-2031469209 | 2025-03-20T15:57:10.616403
7700 / tcp
-2031469209 | 2025-03-22T20:28:48.456219
7773 / tcp
-2031469209 | 2025-03-11T14:01:25.860364
7776 / tcp
-2031469209 | 2025-03-23T19:03:33.670925
7777 / tcp
-2031469209 | 2025-03-26T20:44:11.468066
7779 / tcp
-2031469209 | 2025-03-27T02:37:06.246121
7782 / tcp
-98713449 | 2025-03-24T01:43:25.602129
7799 / tcp
-98713449 | 2025-03-16T19:56:52.176359
7801 / tcp
-98713449 | 2025-03-22T07:35:02.181194
7822 / tcp
-98713449 | 2025-03-14T23:01:51.786988
7878 / tcp
-98713449 | 2025-03-23T08:14:13.814294
7900 / tcp
-2031469209 | 2025-03-23T22:53:57.254379
7979 / tcp
-98713449 | 2025-03-23T14:36:52.339498
7989 / tcp
-98713449 | 2025-03-26T01:58:47.083742
7999 / tcp
-2031469209 | 2025-03-24T02:25:38.373273
8000 / tcp
870917816 | 2025-03-27T01:48:59.123772
8001 / tcp
-1971901369 | 2025-03-26T11:52:28.099872
8005 / tcp
-864955752 | 2025-03-22T11:45:46.779940
8006 / tcp
-2051325842 | 2025-03-24T04:44:46.236878
8008 / tcp
-1971901369 | 2025-03-26T02:05:29.284943
8010 / tcp
-1971901369 | 2025-03-26T22:55:19.510706
8012 / tcp
-2031469209 | 2025-03-23T06:52:36.646532
8014 / tcp
-98713449 | 2025-03-22T13:03:07.785460
8016 / tcp
-98713449 | 2025-03-23T01:41:58.962001
8017 / tcp
-2031469209 | 2025-03-22T18:25:20.742891
8018 / tcp
-2031469209 | 2025-03-23T18:10:43.086169
8020 / tcp
-98713449 | 2025-03-22T08:52:08.414647
8021 / tcp
-98713449 | 2025-03-24T00:38:14.025118
8022 / tcp
2097313022 | 2025-03-27T00:27:54.388132
8024 / tcp
-98713449 | 2025-03-23T22:02:10.215558
8026 / tcp
-98713449 | 2025-03-23T15:56:22.031803
8028 / tcp
-2031469209 | 2025-03-25T06:06:16.434122
8030 / tcp
-2031469209 | 2025-03-23T20:05:15.895313
8035 / tcp
-98713449 | 2025-03-23T07:23:06.606636
8036 / tcp
-98713449 | 2025-03-23T12:21:55.845369
8038 / tcp
-2031469209 | 2025-03-23T09:42:26.598889
8040 / tcp
-2031469209 | 2025-03-26T01:54:35.241763
8041 / tcp
-98713449 | 2025-03-24T02:58:16.319872
8043 / tcp
-98713449 | 2025-03-23T04:11:13.616994
8045 / tcp
-2031469209 | 2025-03-23T13:02:44.940748
8047 / tcp
-98713449 | 2025-03-22T22:47:21.829188
8049 / tcp
-2031469209 | 2025-03-23T08:31:22.416986
8050 / tcp
-98713449 | 2025-03-22T02:09:01.967462
8051 / tcp
414005480 | 2025-03-23T21:32:07.551923
8052 / tcp
-98713449 | 2025-02-26T06:20:55.791350
8053 / tcp
-2031469209 | 2025-03-22T16:35:21.266146
8054 / tcp
-98713449 | 2025-03-23T16:10:47.302732
8055 / tcp
-98713449 | 2025-03-11T15:18:51.917364
8056 / tcp
-98713449 | 2025-03-23T01:39:00.902019
8057 / tcp
-2031469209 | 2025-03-22T09:57:09.139786
8058 / tcp
-2031469209 | 2025-03-25T04:05:57.240712
8059 / tcp
-98713449 | 2025-03-22T17:34:21.651192
8060 / tcp
-98713449 | 2025-03-26T20:13:31.773364
8061 / tcp
-98713449 | 2025-03-22T19:07:47.852516
8064 / tcp
-2031469209 | 2025-03-21T22:13:23.277088
8065 / tcp
-98713449 | 2025-03-22T17:06:25.916319
8066 / tcp
-98713449 | 2025-03-23T00:07:59.356866
8067 / tcp
-2031469209 | 2025-03-23T11:44:42.221446
8068 / tcp
-2031469209 | 2025-03-24T01:21:06.979268
8069 / tcp
-98713449 | 2025-03-27T02:04:07.884460
8070 / tcp
-2031469209 | 2025-03-19T13:00:21.020127
8071 / tcp
-98713449 | 2025-03-24T02:21:30.745895
8072 / tcp
-98713449 | 2025-03-22T12:21:09.949320
8073 / tcp
-98713449 | 2025-03-22T13:22:08.822579
8074 / tcp
-98713449 | 2025-03-23T18:38:47.519765
8075 / tcp
-2031469209 | 2025-03-23T01:09:36.996263
8076 / tcp
-98713449 | 2025-03-22T17:35:45.741826
8077 / tcp
-2031469209 | 2025-03-23T12:42:25.854226
8078 / tcp
-98713449 | 2025-03-22T13:47:02.159778
8079 / tcp
-98713449 | 2025-03-22T08:29:12.491801
8080 / tcp
-1805871619 | 2025-03-26T19:46:34.581539
8081 / tcp
-1011628131 | 2025-03-26T14:49:55.245742
8082 / tcp
-864955752 | 2025-03-22T17:45:12.047442
8084 / tcp
-207704745 | 2025-03-12T01:29:51.829869
8086 / tcp
-1971901369 | 2025-03-26T09:52:52.308300
8089 / tcp
-820836009 | 2025-03-26T23:18:40.819918
8090 / tcp
1685468267 | 2025-03-27T01:30:10.304841
8092 / tcp
-98713449 | 2025-03-23T21:56:27.699777
8096 / tcp
-98713449 | 2025-03-23T15:46:36.009534
8097 / tcp
-98713449 | 2025-03-04T22:44:41.334224
8098 / tcp
-2031469209 | 2025-03-26T23:59:01.643625
8099 / tcp
-704785880 | 2025-03-25T23:48:11.990633
8107 / tcp
-98713449 | 2025-03-23T08:37:28.895387
8109 / tcp
-98713449 | 2025-03-23T09:39:53.219760
8110 / tcp
-2031469209 | 2025-03-22T20:49:42.211711
8112 / tcp
-2031469209 | 2025-03-26T20:13:07.797105
8114 / tcp
-98713449 | 2025-03-22T01:46:44.476205
8116 / tcp
-2031469209 | 2025-03-10T20:03:08.136756
8117 / tcp
-98713449 | 2025-03-22T11:38:53.759589
8121 / tcp
-2031469209 | 2025-03-23T19:46:32.883796
8123 / tcp
-98713449 | 2025-03-26T21:46:06.303631
8124 / tcp
-98713449 | 2025-03-24T01:06:31.516947
8125 / tcp
-98713449 | 2025-03-25T11:31:57.582852
8126 / tcp
-98713449 | 2025-03-27T00:03:14.667428
8129 / tcp
-98713449 | 2025-03-23T09:31:16.857659
8130 / tcp
-98713449 | 2025-03-23T09:09:31.276722
8132 / tcp
-2031469209 | 2025-03-22T21:04:30.071074
8133 / tcp
-2031469209 | 2025-03-23T03:34:32.078698
8136 / tcp
-98713449 | 2025-03-22T16:00:34.388359
8137 / tcp
-98713449 | 2025-03-22T07:28:04.409361
8139 / tcp
411540654 | 2025-03-26T04:18:21.745420
8140 / tcp
411540654 | 2025-03-26T13:40:04.025941
8141 / tcp
-98713449 | 2025-03-26T01:03:35.935494
8146 / tcp
-2031469209 | 2025-03-22T11:20:50.571698
8147 / tcp
-98713449 | 2025-03-22T15:51:32.322622
8148 / tcp
-2031469209 | 2025-03-22T10:46:28.731182
8149 / tcp
-98713449 | 2025-03-23T19:02:44.764570
8154 / tcp
-98713449 | 2025-03-23T01:30:59.869580
8156 / tcp
-2031469209 | 2025-03-24T03:11:17.041086
8158 / tcp
-98713449 | 2025-03-22T13:59:42.479635
8159 / tcp
-98713449 | 2025-03-24T01:16:55.345407
8160 / tcp
-98713449 | 2025-03-22T05:08:56.053342
8162 / tcp
-98713449 | 2025-03-23T08:50:24.787567
8163 / tcp
-98713449 | 2025-03-23T14:26:18.403502
8164 / tcp
-2031469209 | 2025-03-23T08:48:52.741563
8165 / tcp
-2031469209 | 2025-03-23T15:05:19.019103
8166 / tcp
-98713449 | 2025-03-22T03:39:19.057158
8171 / tcp
-2031469209 | 2025-03-23T06:08:35.549696
8172 / tcp
-98713449 | 2025-02-26T13:40:09.404351
8174 / tcp
-98713449 | 2025-03-23T01:33:32.771624
8176 / tcp
-2031469209 | 2025-03-24T02:28:16.897530
8177 / tcp
-2031469209 | 2025-03-23T08:32:59.702867
8178 / tcp
-2031469209 | 2025-03-22T02:00:11.652262
8180 / tcp
-98713449 | 2025-03-23T11:48:47.157627
8181 / tcp
1869133119 | 2025-03-25T08:33:03.452119
8182 / tcp
-98713449 | 2025-03-22T10:34:18.832034
8186 / tcp
-2031469209 | 2025-03-23T11:40:25.218616
8188 / tcp
-2031469209 | 2025-03-26T15:16:38.545968
8189 / tcp
-98713449 | 2025-03-22T12:03:24.482005
8190 / tcp
-2031469209 | 2025-02-28T12:55:43.964550
8191 / tcp
-98713449 | 2025-03-27T03:39:40.544107
8192 / tcp
-98713449 | 2025-03-22T19:47:42.705700
8193 / tcp
-98713449 | 2025-03-22T20:46:27.946651
8195 / tcp
-98713449 | 2025-03-22T21:09:48.457476
8196 / tcp
-98713449 | 2025-03-24T01:41:01.104860
8197 / tcp
-98713449 | 2025-03-23T11:19:50.729666
8199 / tcp
-2031469209 | 2025-03-22T18:54:19.406980
8200 / tcp
-98713449 | 2025-03-27T02:54:09.933536
8203 / tcp
-2031469209 | 2025-03-23T12:04:29.633309
8222 / tcp
-98713449 | 2025-03-22T03:12:00.745996
8230 / tcp
-2031469209 | 2025-03-24T00:30:50.802523
8236 / tcp
-2031469209 | 2025-03-22T13:39:33.589908
8237 / tcp
-98713449 | 2025-03-23T02:31:42.379322
8239 / tcp
-98713449 | 2025-03-07T12:23:29.780573
8243 / tcp
-2031469209 | 2025-03-22T03:44:52.666328
8248 / tcp
-2031469209 | 2025-03-23T20:40:17.562666
8251 / tcp
-98713449 | 2025-03-23T06:58:05.498632
8252 / tcp
-98713449 | 2025-03-23T16:07:53.894329
8280 / tcp
-2031469209 | 2025-03-22T03:33:30.511623
8282 / tcp
-98713449 | 2025-03-23T13:52:53.098426
8283 / tcp
-98713449 | 2025-03-22T11:37:03.365378
8285 / tcp
-2031469209 | 2025-03-24T01:48:40.080831
8291 / tcp
1191162421 | 2025-03-27T03:15:44.996030
8300 / tcp
-98713449 | 2025-03-22T14:14:55.359940
8319 / tcp
-2031469209 | 2025-03-23T06:45:21.597236
8333 / tcp
-98713449 | 2025-03-26T22:04:02.806478
8334 / tcp
-98713449 | 2025-03-26T23:34:09.572322
8350 / tcp
-98713449 | 2025-03-23T13:04:27.600206
8382 / tcp
-2031469209 | 2025-03-23T16:27:00.421515
8383 / tcp
-98713449 | 2025-03-24T02:15:42.327510
8384 / tcp
-98713449 | 2025-03-24T01:39:47.215231
8401 / tcp
-2031469209 | 2025-03-11T03:30:27.761906
8402 / tcp
-98713449 | 2025-03-06T08:59:02.403301
8403 / tcp
-98713449 | 2025-03-23T21:44:17.542814
8404 / tcp
-98713449 | 2025-03-24T04:48:39.099695
8405 / tcp
-2031469209 | 2025-03-23T07:03:57.324147
8406 / tcp
-2031469209 | 2025-03-24T01:35:38.525106
8409 / tcp
-98713449 | 2025-03-24T00:35:29.792723
8410 / tcp
-98713449 | 2025-03-22T11:02:59.769675
8412 / tcp
-2031469209 | 2025-03-23T06:46:51.133982
8413 / tcp
-2031469209 | 2025-03-22T21:59:40.873910
8416 / tcp
-98713449 | 2025-03-23T09:58:19.426072
8417 / tcp
-98713449 | 2025-03-22T21:45:41.160368
8419 / tcp
-98713449 | 2025-03-23T10:45:28.194493
8420 / tcp
-98713449 | 2025-03-23T00:28:33.384568
8421 / tcp
-98713449 | 2025-03-23T11:05:00.296139
8422 / tcp
-98713449 | 2025-03-22T09:48:45.820917
8423 / tcp
-98713449 | 2025-03-22T08:31:52.048944
8424 / tcp
-2031469209 | 2025-03-23T09:32:26.598107
8425 / tcp
-98713449 | 2025-03-22T07:41:10.503136
8427 / tcp
-98713449 | 2025-03-22T03:06:16.543225
8430 / tcp
-98713449 | 2025-03-26T12:30:54.605336
8431 / tcp
-2031469209 | 2025-03-23T08:51:36.490651
8432 / tcp
-98713449 | 2025-02-27T19:05:44.487911
8433 / tcp
-98713449 | 2025-03-22T03:29:26.438166
8436 / tcp
-98713449 | 2025-03-24T10:51:07.636947
8440 / tcp
-98713449 | 2025-03-22T05:01:44.938992
8442 / tcp
-98713449 | 2025-03-22T07:38:18.757449
8443 / tcp
289054181 | 2025-03-12T02:55:43.824788
8444 / tcp
-98713449 | 2025-03-24T01:19:48.195455
8446 / tcp
-98713449 | 2025-03-22T03:09:55.334454
8447 / tcp
-98713449 | 2025-03-25T14:10:26.644456
8448 / tcp
-2031469209 | 2025-03-22T14:28:41.646249
8449 / tcp
-98713449 | 2025-03-23T15:01:09.120173
8451 / tcp
-98713449 | 2025-03-23T08:13:05.492591
8452 / tcp
-2031469209 | 2025-03-23T15:15:49.083515
8453 / tcp
-98713449 | 2025-03-23T12:45:05.265352
8456 / tcp
-2031469209 | 2025-03-20T10:23:01.737895
8458 / tcp
-98713449 | 2025-03-17T22:04:45.413924
8459 / tcp
-98713449 | 2025-03-22T01:36:52.044255
8461 / tcp
-2031469209 | 2025-03-22T20:05:25.791135
8463 / tcp
-98713449 | 2025-03-22T21:50:16.381395
8465 / tcp
-98713449 | 2025-03-17T20:31:59.308420
8467 / tcp
-98713449 | 2025-03-23T04:08:22.510691
8470 / tcp
-98713449 | 2025-03-23T20:44:52.194619
8473 / tcp
-98713449 | 2025-03-24T03:53:08.112086
8475 / tcp
-2031469209 | 2025-03-20T10:58:17.696725
8480 / tcp
-98713449 | 2025-03-24T01:55:29.295311
8481 / tcp
-98713449 | 2025-03-22T09:15:31.626308
8482 / tcp
-98713449 | 2025-03-07T18:13:09.454491
8484 / tcp
-98713449 | 2025-03-23T23:00:24.382059
8488 / tcp
-2031469209 | 2025-03-23T09:15:08.508590
8493 / tcp
-98713449 | 2025-03-23T09:07:51.858635
8494 / tcp
-2031469209 | 2025-03-09T13:22:33.394054
8500 / tcp
411540654 | 2025-03-26T01:42:38.751506
8501 / tcp
-98713449 | 2025-02-25T18:29:31.973982
8503 / tcp
-2031469209 | 2025-03-22T23:14:44.726933
8504 / tcp
-98713449 | 2025-03-22T07:48:33.734741
8513 / tcp
-98713449 | 2025-03-23T07:02:59.444435
8514 / tcp
-98713449 | 2025-03-23T18:59:34.006088
8519 / tcp
-2031469209 | 2025-03-23T08:19:59.964697
8521 / tcp
-98713449 | 2025-03-22T06:52:20.895479
8523 / tcp
-2031469209 | 2025-03-22T19:11:57.142693
8524 / tcp
-98713449 | 2025-03-22T07:55:52.950061
8526 / tcp
-98713449 | 2025-03-22T15:07:58.752120
8528 / tcp
-98713449 | 2025-03-23T06:53:51.643134
8529 / tcp
-98713449 | 2025-03-22T05:49:30.534727
8532 / tcp
-2031469209 | 2025-03-22T19:31:05.690043
8533 / tcp
-98713449 | 2025-03-23T19:30:19.753761
8540 / tcp
-2031469209 | 2025-03-23T03:27:32.014982
8543 / tcp
-2031469209 | 2025-03-24T03:45:49.834130
8544 / tcp
-2031469209 | 2025-03-23T04:49:37.660688
8545 / tcp
-1341732464 | 2025-03-27T03:12:08.932925
8548 / tcp
-2031469209 | 2025-03-23T00:35:40.029083
8549 / tcp
-98713449 | 2025-03-24T20:50:13.741733
8550 / tcp
-2031469209 | 2025-03-23T10:07:22.893717
8551 / tcp
-98713449 | 2025-03-26T08:29:42.822578
8554 / tcp
-98713449 | 2025-03-26T02:07:43.178828
8558 / tcp
-2031469209 | 2025-03-23T14:35:16.425115
8560 / tcp
-98713449 | 2025-03-25T21:30:25.088426
8562 / tcp
-2031469209 | 2025-03-23T21:23:18.144296
8563 / tcp
-98713449 | 2025-03-22T18:18:20.948337
8564 / tcp
-98713449 | 2025-03-23T21:47:12.524713
8565 / tcp
-2031469209 | 2025-03-22T02:14:12.294385
8567 / tcp
-2031469209 | 2025-03-18T11:05:20.525664
8575 / tcp
-98713449 | 2025-03-26T00:08:48.950023
8576 / tcp
-98713449 | 2025-03-23T14:07:25.366681
8578 / tcp
-98713449 | 2025-03-23T00:57:47.586687
8579 / tcp
-98713449 | 2025-03-22T21:21:29.361607
8583 / tcp
-2031469209 | 2025-03-22T15:52:48.744452
8584 / tcp
-98713449 | 2025-03-16T16:03:00.253478
8585 / tcp
-2031469209 | 2025-03-04T14:26:41.604505
8588 / tcp
-2031469209 | 2025-03-26T00:48:53.860557
8589 / tcp
-2031469209 | 2025-03-23T07:35:11.501242
8590 / tcp
-2031469209 | 2025-03-23T02:55:34.742942
8592 / tcp
-2031469209 | 2025-03-15T19:56:48.075231
8594 / tcp
-98713449 | 2025-02-27T13:45:32.586330
8596 / tcp
-2031469209 | 2025-03-23T01:01:03.079573
8599 / tcp
-2031469209 | 2025-02-25T10:13:41.232438
8600 / tcp
-2031469209 | 2025-03-22T17:28:04.655044
8602 / tcp
-2031469209 | 2025-03-22T06:53:14.767677
8606 / tcp
-98713449 | 2025-03-22T23:21:47.148334
8607 / tcp
-98713449 | 2025-03-23T11:34:11.437648
8622 / tcp
-2031469209 | 2025-03-23T22:31:33.231208
8637 / tcp
-2031469209 | 2025-03-22T12:35:21.813244
8640 / tcp
-98713449 | 2025-03-22T02:58:50.175378
8641 / tcp
-2031469209 | 2025-03-22T19:10:44.238643
8649 / tcp
-98713449 | 2025-03-26T07:38:45.015035
8663 / tcp
-2031469209 | 2025-03-24T02:11:33.910402
8666 / tcp
-98713449 | 2025-03-22T11:10:37.984168
8686 / tcp
-1058385585 | 2025-03-23T02:24:00.971003
8700 / tcp
-98713449 | 2025-03-06T15:56:20.585739
8701 / tcp
-2031469209 | 2025-03-19T06:20:34.630382
8702 / tcp
-98713449 | 2025-03-20T03:59:21.798179
8703 / tcp
-98713449 | 2025-03-24T04:43:02.068580
8704 / tcp
-98713449 | 2025-03-23T21:00:23.993726
8707 / tcp
-98713449 | 2025-03-22T09:52:32.253969
8723 / tcp
-98713449 | 2025-03-24T00:56:07.397423
8724 / tcp
-98713449 | 2025-03-23T09:23:47.157684
8731 / tcp
-98713449 | 2025-03-25T00:39:09.470427
8733 / tcp
-98713449 | 2025-03-23T20:24:00.173857
8743 / tcp
-98713449 | 2025-03-23T01:57:56.311512
8766 / tcp
-98713449 | 2025-03-22T20:37:29.071046
8767 / tcp
-98713449 | 2025-03-22T06:03:34.496487
8771 / tcp
-98713449 | 2025-03-23T08:55:49.853481
8779 / tcp
-98713449 | 2025-03-24T04:21:49.432953
8782 / tcp
-98713449 | 2025-03-22T16:50:41.987076
8784 / tcp
-98713449 | 2025-03-22T07:46:55.117823
8788 / tcp
-2031469209 | 2025-03-05T06:42:45.598225
8791 / tcp
-98713449 | 2025-03-22T10:37:00.824835
8800 / tcp
-98713449 | 2025-03-26T05:47:25.870129
8804 / tcp
-98713449 | 2025-03-04T23:33:37.090295
8805 / tcp
-98713449 | 2025-03-22T09:25:49.705521
8806 / tcp
-98713449 | 2025-03-14T05:09:20.247267
8807 / tcp
-98713449 | 2025-03-22T09:36:41.906314
8808 / tcp
-98713449 | 2025-03-22T03:11:04.847265
8809 / tcp
-98713449 | 2025-03-23T03:51:01.461798
8810 / tcp
-2031469209 | 2025-03-23T11:37:29.036753
8812 / tcp
-98713449 | 2025-03-23T11:28:34.975978
8813 / tcp
-98713449 | 2025-03-22T20:07:02.560775
8814 / tcp
-98713449 | 2025-03-22T05:25:30.173458
8815 / tcp
-98713449 | 2025-03-24T00:28:23.434242
8816 / tcp
-98713449 | 2025-03-22T05:20:44.665919
8820 / tcp
-98713449 | 2025-03-22T07:39:25.776465
8825 / tcp
-98713449 | 2025-03-23T18:39:55.098976
8826 / tcp
-98713449 | 2025-03-22T17:07:45.612901
8829 / tcp
-2031469209 | 2025-02-27T17:29:36.231106
8830 / tcp
-2031469209 | 2025-03-23T21:01:47.035251
8832 / tcp
-98713449 | 2025-03-15T17:00:36.878590
8833 / tcp
-2031469209 | 2025-03-22T15:06:28.708827
8834 / tcp
411540654 | 2025-03-27T01:30:08.117231
8837 / tcp
-98713449 | 2025-03-11T22:37:33.734524
8839 / tcp
-98713449 | 2025-03-13T14:22:14.216482
8840 / tcp
-98713449 | 2025-03-23T12:35:09.261698
8845 / tcp
-2031469209 | 2025-03-14T20:04:46.647463
8846 / tcp
-98713449 | 2025-03-23T18:56:09.101430
8848 / tcp
-2031469209 | 2025-03-23T17:17:25.579703
8850 / tcp
-2031469209 | 2025-03-23T14:38:22.881113
8855 / tcp
-98713449 | 2025-03-24T04:05:40.192517
8856 / tcp
-98713449 | 2025-03-22T02:51:09.997324
8857 / tcp
-98713449 | 2025-03-23T14:04:15.723677
8858 / tcp
-2031469209 | 2025-03-22T17:57:28.979590
8859 / tcp
-98713449 | 2025-03-22T05:22:23.429774
8860 / tcp
-98713449 | 2025-03-23T16:05:25.784590
8862 / tcp
-98713449 | 2025-03-23T12:55:17.172158
8863 / tcp
-2031469209 | 2025-03-23T10:33:21.698300
8864 / tcp
-98713449 | 2025-03-25T19:42:16.683674
8867 / tcp
-98713449 | 2025-03-22T05:32:51.275618
8869 / tcp
-2031469209 | 2025-03-05T04:22:42.808857
8870 / tcp
-98713449 | 2025-03-22T03:25:33.947207
8872 / tcp
-98713449 | 2025-03-24T23:00:01.761349
8878 / tcp
-98713449 | 2025-03-23T07:27:53.766487
8880 / tcp
411540654 | 2025-03-26T20:51:44.433445
8881 / tcp
-98713449 | 2025-03-26T09:55:33.870346
8882 / tcp
-2031469209 | 2025-03-24T00:04:36.845625
8884 / tcp
-98713449 | 2025-03-23T07:46:43.591645
8886 / tcp
-98713449 | 2025-03-22T10:28:10.448541
8887 / tcp
-98713449 | 2025-03-23T19:07:57.618341
8888 / tcp
-666701999 | 2025-03-27T03:51:39.220824
8889 / tcp
1094048410 | 2025-03-26T01:28:11.831733
8899 / tcp
-2031469209 | 2025-03-23T23:59:13.867928
8900 / tcp
-98713449 | 2025-03-18T23:33:46.753789
8902 / tcp
-2031469209 | 2025-03-19T19:14:09.787914
8906 / tcp
-2031469209 | 2025-03-23T18:55:02.005235
8908 / tcp
-2031469209 | 2025-03-23T16:55:31.138345
8913 / tcp
-2031469209 | 2025-03-23T10:05:48.315612
8915 / tcp
-2031469209 | 2025-03-22T17:01:38.394272
8916 / tcp
-2031469209 | 2025-03-25T04:04:22.442348
8980 / tcp
-98713449 | 2025-03-22T10:12:06.770177
8990 / tcp
-98713449 | 2025-03-18T08:08:38.469024
8993 / tcp
-2031469209 | 2025-03-24T03:22:58.228574
9000 / tcp
-1714287109 | 2025-03-26T10:28:32.926630
9001 / tcp
1634741987 | 2025-03-27T00:12:03.383819
9002 / tcp
411540654 | 2025-03-26T16:36:56.025194
9003 / tcp
-98713449 | 2025-03-22T06:20:06.407456
9005 / tcp
-98713449 | 2025-03-23T12:54:03.564094
9006 / tcp
-98713449 | 2025-03-22T11:50:08.203157
9007 / tcp
-98713449 | 2025-03-22T18:13:49.183199
9009 / tcp
-2031469209 | 2025-03-27T03:10:52.772710
9010 / tcp
-98713449 | 2025-03-10T12:39:12.751395
9015 / tcp
-2031469209 | 2025-03-22T05:13:13.771733
9016 / tcp
-2031469209 | 2025-03-22T14:29:37.956592
9017 / tcp
-98713449 | 2025-03-22T11:29:52.890446
9018 / tcp
-98713449 | 2025-03-23T22:59:27.877666
9020 / tcp
-98713449 | 2025-03-23T23:01:10.613312
9021 / tcp
-98713449 | 2025-03-24T12:48:37.073415
9025 / tcp
-2031469209 | 2025-03-05T06:08:49.153580
9032 / tcp
-98713449 | 2025-03-22T11:20:07.948578
9033 / tcp
-98713449 | 2025-03-23T22:50:46.459636
9034 / tcp
-2031469209 | 2025-03-22T18:39:19.057904
9036 / tcp
-2031469209 | 2025-03-24T04:14:07.065277
9037 / tcp
-2031469209 | 2025-03-22T16:30:44.343766
9039 / tcp
-2031469209 | 2025-03-22T14:22:20.198341
9040 / tcp
-98713449 | 2025-02-26T01:39:33.634431
9041 / tcp
-98713449 | 2025-03-22T05:43:29.257408
9042 / tcp
-98713449 | 2025-03-26T23:17:48.780145
9043 / tcp
-2031469209 | 2025-03-23T11:00:48.154917
9044 / tcp
-2031469209 | 2025-03-24T00:07:39.978555
9045 / tcp
-2031469209 | 2025-03-23T17:20:35.336646
9046 / tcp
-2031469209 | 2025-03-23T01:28:36.646450
9047 / tcp
-98713449 | 2025-03-23T16:57:14.805680
9050 / tcp
-98713449 | 2025-03-10T15:49:51.205544
9051 / tcp
-2031469209 | 2025-03-27T00:27:47.923279
9052 / tcp
-2031469209 | 2025-03-23T11:21:06.215484
9054 / tcp
-2031469209 | 2025-03-25T00:25:31.538833
9057 / tcp
-2031469209 | 2025-03-23T12:20:35.356684
9059 / tcp
-98713449 | 2025-03-23T02:58:28.274663
9060 / tcp
-98713449 | 2025-03-24T02:32:54.109227
9061 / tcp
-98713449 | 2025-03-24T01:13:39.773506
9062 / tcp
-98713449 | 2025-03-22T18:42:13.110617
9064 / tcp
-98713449 | 2025-03-24T03:34:00.664364
9065 / tcp
-98713449 | 2025-03-23T20:18:31.127492
9070 / tcp
-98713449 | 2025-03-23T04:35:56.217441
9071 / tcp
-98713449 | 2025-03-22T18:51:34.564859
9072 / tcp
-2031469209 | 2025-03-23T11:24:17.948685
9073 / tcp
-2031469209 | 2025-03-22T21:07:00.167406
9074 / tcp
-98713449 | 2025-03-23T23:39:02.561541
9075 / tcp
-2031469209 | 2025-03-23T01:04:07.266585
9076 / tcp
-2031469209 | 2025-03-26T02:44:53.866195
9077 / tcp
-98713449 | 2025-03-23T22:04:07.043117
9078 / tcp
-98713449 | 2025-03-25T08:07:01.192042
9080 / tcp
-2113003112 | 2025-03-25T15:56:29.781658
9082 / tcp
-2031469209 | 2025-03-24T00:41:08.894664
9083 / tcp
-2031469209 | 2025-03-23T19:36:10.362106
9089 / tcp
-98713449 | 2025-03-04T18:11:03.548636
9090 / tcp
2005929508 | 2025-03-26T13:21:01.266125
9091 / tcp
411540654 | 2025-03-26T21:00:09.201093
9092 / tcp
-98713449 | 2025-03-26T04:53:36.367235
9094 / tcp
-2031469209 | 2025-03-23T00:04:46.049158
9095 / tcp
411540654 | 2025-03-26T10:08:50.917639
9099 / tcp
-98713449 | 2025-03-23T19:22:43.129163
9100 / tcp
-98713449 | 2025-03-25T20:06:02.895865
9102 / tcp
-2031469209 | 2025-03-23T22:27:27.644376
9103 / tcp
-98713449 | 2025-03-22T12:49:55.467339
9104 / tcp
1634741987 | 2025-03-26T09:09:07.181300
9107 / tcp
-2031469209 | 2025-02-25T10:46:08.869438
9108 / tcp
-98713449 | 2025-03-23T21:58:01.072796
9109 / tcp
-98713449 | 2025-03-09T21:02:40.623282
9111 / tcp
-2031469209 | 2025-03-22T23:29:15.486394
9112 / tcp
-98713449 | 2025-03-13T16:00:56.247384
9113 / tcp
-98713449 | 2025-03-25T17:31:19.374202
9114 / tcp
-98713449 | 2025-03-22T18:43:58.358500
9115 / tcp
-2031469209 | 2025-03-23T22:43:25.970366
9118 / tcp
-98713449 | 2025-03-23T16:22:45.287255
9119 / tcp
-98713449 | 2025-03-23T16:03:30.226875
9120 / tcp
-2031469209 | 2025-03-26T02:13:34.339431
9122 / tcp
-98713449 | 2025-03-22T17:13:33.384982
9124 / tcp
-98713449 | 2025-03-13T18:07:27.260291
9125 / tcp
-98713449 | 2025-03-22T02:17:13.269410
9126 / tcp
-98713449 | 2025-03-23T04:31:13.395981
9128 / tcp
-98713449 | 2025-03-23T02:48:32.596012
9130 / tcp
-98713449 | 2025-03-23T05:55:46.171615
9131 / tcp
-98713449 | 2025-03-23T10:10:21.895631
9133 / tcp
-2031469209 | 2025-03-20T18:04:06.602485
9135 / tcp
-98713449 | 2025-03-24T01:03:43.478786
9136 / tcp
-98713449 | 2025-03-23T19:16:51.121190
9137 / tcp
-98713449 | 2025-03-22T15:54:05.049746
9140 / tcp
-98713449 | 2025-02-28T02:02:12.549866
9143 / tcp
-2031469209 | 2025-03-24T13:58:07.754298
9147 / tcp
-98713449 | 2025-02-26T12:59:27.670956
9150 / tcp
-98713449 | 2025-03-22T15:25:21.986566
9151 / tcp
-98713449 | 2025-03-25T18:16:48.188094
9152 / tcp
-2031469209 | 2025-03-23T01:55:55.647327
9153 / tcp
-2031469209 | 2025-03-11T00:10:38.019570
9155 / tcp
-98713449 | 2025-03-24T05:52:02.268084
9156 / tcp
-2031469209 | 2025-03-23T14:48:37.675072
9160 / tcp
-2031469209 | 2025-03-26T09:19:39.469276
9161 / tcp
-98713449 | 2025-03-22T09:22:35.876320
9164 / tcp
-2031469209 | 2025-03-22T09:21:09.194517
9165 / tcp
-98713449 | 2025-03-24T07:46:05.084029
9166 / tcp
-98713449 | 2025-03-12T21:10:28.887984
9169 / tcp
-98713449 | 2025-03-25T15:44:44.543515
9173 / tcp
-98713449 | 2025-03-23T16:41:25.656517
9174 / tcp
-98713449 | 2025-03-22T23:54:50.742373
9175 / tcp
-98713449 | 2025-03-22T08:46:36.115327
9177 / tcp
-98713449 | 2025-03-23T21:33:52.376187
9178 / tcp
-98713449 | 2025-03-24T04:16:51.240640
9181 / tcp
-98713449 | 2025-03-18T04:35:48.490217
9182 / tcp
-98713449 | 2025-03-22T12:07:01.167057
9183 / tcp
-2031469209 | 2025-03-23T22:08:03.139935
9184 / tcp
-2031469209 | 2025-03-18T03:54:03.722933
9185 / tcp
-98713449 | 2025-03-23T22:36:20.677553
9187 / tcp
-98713449 | 2025-03-16T05:21:49.008682
9189 / tcp
-98713449 | 2025-03-13T06:31:21.249851
9191 / tcp
521951111 | 2025-03-26T12:40:26.137202
9192 / tcp
-2031469209 | 2025-03-23T07:59:55.116540
9194 / tcp
-98713449 | 2025-03-26T12:29:00.657537
9197 / tcp
-98713449 | 2025-03-23T01:14:10.784844
9198 / tcp
-98713449 | 2025-03-22T19:26:47.521453
9199 / tcp
-2031469209 | 2025-03-22T14:05:38.038236
9200 / tcp
1701962934 | 2025-03-27T02:39:22.355494
9202 / tcp
-98713449 | 2025-03-23T00:29:10.756523
9203 / tcp
-2031469209 | 2025-03-22T03:41:01.624845
9204 / tcp
-98713449 | 2025-02-25T08:15:37.450495
9205 / tcp
-98713449 | 2025-03-23T16:19:50.682196
9206 / tcp
-98713449 | 2025-03-11T18:03:48.940518
9207 / tcp
-98713449 | 2025-03-23T10:42:23.919980
9208 / tcp
-98713449 | 2025-03-23T14:00:09.618309
9209 / tcp
-98713449 | 2025-03-22T07:57:25.955884
9210 / tcp
-2031469209 | 2025-03-23T21:30:49.434175
9211 / tcp
-98713449 | 2025-03-17T14:00:19.376222
9213 / tcp
-2031469209 | 2025-03-18T04:21:07.904306
9215 / tcp
-98713449 | 2025-03-22T01:49:20.156949
9217 / tcp
-2031469209 | 2025-03-15T18:25:46.646911
9220 / tcp
-98713449 | 2025-03-06T03:27:44.535142
9222 / tcp
-98713449 | 2025-03-23T05:42:45.878479
9236 / tcp
-98713449 | 2025-03-14T01:33:40.188140
9241 / tcp
-98713449 | 2025-03-23T00:05:44.009685
9242 / tcp
-98713449 | 2025-03-22T08:11:22.520122
9244 / tcp
-2031469209 | 2025-03-22T09:03:31.381548
9246 / tcp
-98713449 | 2025-03-22T03:16:08.034979
9252 / tcp
-2031469209 | 2025-03-09T07:13:14.934057
9256 / tcp
-98713449 | 2025-03-27T01:25:03.955240
9257 / tcp
-2031469209 | 2025-03-22T15:28:13.680752
9273 / tcp
-2031469209 | 2025-03-23T02:27:11.393398
9283 / tcp
-98713449 | 2025-03-16T05:47:51.139526
9289 / tcp
-98713449 | 2025-03-06T02:51:38.649119
9291 / tcp
-98713449 | 2025-03-24T02:31:35.272873
9295 / tcp
-98713449 | 2025-03-27T00:56:02.396529
9299 / tcp
-2031469209 | 2025-03-25T21:57:15.288015
9300 / tcp
1701962934 | 2025-03-18T07:26:36.818734
9301 / tcp
-98713449 | 2025-03-23T05:26:54.360412
9303 / tcp
-98713449 | 2025-03-22T14:13:32.157842
9304 / tcp
-2031469209 | 2025-03-04T01:36:21.392267
9306 / tcp
411540654 | 2025-03-26T15:28:33.278587
9308 / tcp
-2031469209 | 2025-03-22T12:01:51.923196
9310 / tcp
-2031469209 | 2025-02-28T01:43:47.945303
9311 / tcp
-98713449 | 2025-03-23T04:29:47.139109
9312 / tcp
-98713449 | 2025-03-27T02:02:41.334965
9315 / tcp
-2031469209 | 2025-03-23T04:05:18.881252
9333 / tcp
-98713449 | 2025-03-26T22:26:03.161563
9345 / tcp
-98713449 | 2025-03-22T19:18:11.049549
9351 / tcp
-98713449 | 2025-03-23T03:23:08.445740
9353 / tcp
-2031469209 | 2025-03-24T11:00:41.062193
9376 / tcp
-2031469209 | 2025-03-22T20:55:21.359582
9387 / tcp
-98713449 | 2025-03-22T03:24:31.174720
9389 / tcp
-2031469209 | 2025-03-13T06:02:41.890209
9398 / tcp
411540654 | 2025-03-27T03:05:44.287260
9418 / tcp
-2031469209 | 2025-03-26T05:31:44.298315
9441 / tcp
-98713449 | 2025-03-23T20:13:18.456964
9443 / tcp
-1454941180 | 2025-03-27T02:27:27.354420
9454 / tcp
-98713449 | 2025-03-11T17:21:32.567740
9455 / tcp
-2031469209 | 2025-03-25T01:31:59.047728
9458 / tcp
-98713449 | 2025-02-27T14:19:36.774478
9465 / tcp
-98713449 | 2025-03-23T15:48:01.648119
9480 / tcp
-98713449 | 2025-03-24T02:37:07.440598
9488 / tcp
-98713449 | 2025-03-23T02:49:03.320842
9501 / tcp
-2031469209 | 2025-03-22T13:36:19.485877
9510 / tcp
-98713449 | 2025-03-23T19:40:09.334364
9515 / tcp
-98713449 | 2025-03-18T18:45:12.274659
9530 / tcp
-98713449 | 2025-03-27T02:18:13.636956
9532 / tcp
-98713449 | 2025-03-23T13:11:19.005643
9553 / tcp
-98713449 | 2025-03-23T13:19:05.397854
9595 / tcp
-98713449 | 2025-03-27T03:17:12.782960
9600 / tcp
-98713449 | 2025-03-26T05:02:05.753160
9611 / tcp
-98713449 | 2025-03-22T18:53:07.056302
9658 / tcp
-98713449 | 2025-03-20T11:56:40.786235
9674 / tcp
-2031469209 | 2025-03-23T09:44:00.320118
9682 / tcp
-2031469209 | 2025-03-23T19:45:12.627025
9690 / tcp
-2031469209 | 2025-03-22T10:21:53.376525
9696 / tcp
-98713449 | 2025-03-23T23:09:32.450008
9710 / tcp
-98713449 | 2025-03-10T16:25:32.546741
9734 / tcp
-98713449 | 2025-03-23T19:48:13.246168
9743 / tcp
-2031469209 | 2025-03-22T04:36:13.194569
9754 / tcp
-98713449 | 2025-03-22T20:19:50.805454
9761 / tcp
-98713449 | 2025-03-26T09:59:33.564131
9765 / tcp
-98713449 | 2025-03-16T21:57:08.612030
9773 / tcp
-2031469209 | 2025-03-22T17:50:26.693566
9797 / tcp
-98713449 | 2025-03-22T11:25:16.807706
9800 / tcp
-98713449 | 2025-03-27T02:26:33.389068
9802 / tcp
-98713449 | 2025-03-23T04:03:48.037197
9804 / tcp
-2031469209 | 2025-03-13T04:33:23.655859
9811 / tcp
-2031469209 | 2025-03-22T18:30:00.050241
9869 / tcp
-98713449 | 2025-03-26T11:47:17.125575
9876 / tcp
-98713449 | 2025-03-26T09:32:30.924335
9885 / tcp
-2031469209 | 2025-03-22T06:59:32.241114
9898 / tcp
1946968897 | 2025-03-26T09:47:17.039469
9899 / tcp
-98713449 | 2025-03-26T20:57:46.612693
9902 / tcp
-98713449 | 2025-03-23T18:15:17.158766
9909 / tcp
-98713449 | 2025-03-22T14:58:51.242645
9923 / tcp
-2031469209 | 2025-03-26T14:00:52.400844
9926 / tcp
-98713449 | 2025-03-23T23:57:35.503231
9928 / tcp
-2031469209 | 2025-03-22T10:10:11.108200
9930 / tcp
-98713449 | 2025-03-23T03:01:09.586749
9939 / tcp
-2031469209 | 2025-03-11T19:51:00.475664
9943 / tcp
411540654 | 2025-03-26T06:45:30.274596
9944 / tcp
-2031469209 | 2025-03-27T01:35:42.475326
9955 / tcp
-98713449 | 2025-03-23T00:11:43.625789
9977 / tcp
-98713449 | 2025-03-22T14:07:27.634531
9981 / tcp
-98713449 | 2025-03-26T19:51:35.775829
9991 / tcp
-98713449 | 2025-03-14T03:09:36.777604
9997 / tcp
-2031469209 | 2025-03-22T05:44:51.783582
9998 / tcp
-98713449 | 2025-03-26T14:56:12.996141
9999 / tcp
114433638 | 2025-03-26T11:08:11.455060
10000 / tcp
637809814 | 2025-03-26T21:53:25.862402
10001 / tcp
-2031469209 | 2025-03-26T07:41:29.082949
10003 / tcp
-98713449 | 2025-03-22T13:57:21.240149
10005 / tcp
-98713449 | 2025-03-24T03:49:50.443293
10006 / tcp
-98713449 | 2025-03-23T00:53:46.427753
10007 / tcp
-98713449 | 2025-03-23T03:21:34.560942
10008 / tcp
-98713449 | 2025-03-23T22:17:15.990463
10009 / tcp
-98713449 | 2025-03-23T16:39:47.550247
10010 / tcp
-98713449 | 2025-03-24T01:37:09.165099
10011 / tcp
-1058385585 | 2025-03-23T03:37:52.896347
10012 / tcp
-2031469209 | 2025-03-23T23:49:32.246379
10014 / tcp
-98713449 | 2025-03-23T01:37:03.827723
10015 / tcp
-98713449 | 2025-03-23T14:11:34.776127
10019 / tcp
-98713449 | 2025-03-23T23:42:11.927938
10020 / tcp
-98713449 | 2025-03-24T00:12:06.758377
10021 / tcp
-98713449 | 2025-03-26T00:54:01.585324
10024 / tcp
-98713449 | 2025-03-18T20:29:22.200788
10026 / tcp
-98713449 | 2025-03-19T05:36:14.772307
10027 / tcp
-2031469209 | 2025-03-22T05:03:11.219152
10028 / tcp
-2031469209 | 2025-03-22T19:15:26.658348
10029 / tcp
-2031469209 | 2025-03-23T11:56:27.679280
10030 / tcp
-98713449 | 2025-03-22T22:21:25.645576
10034 / tcp
-98713449 | 2025-03-19T22:37:47.490045
10035 / tcp
-1058385585 | 2025-03-23T22:56:22.247129
10038 / tcp
-2031469209 | 2025-03-24T01:02:14.265426
10039 / tcp
-98713449 | 2025-03-22T11:54:49.454024
10040 / tcp
-98713449 | 2025-03-23T21:14:18.394205
10041 / tcp
-98713449 | 2025-03-23T05:15:18.191368
10045 / tcp
-98713449 | 2025-03-22T06:48:52.091712
10047 / tcp
-98713449 | 2025-03-22T05:34:06.024316
10048 / tcp
-2031469209 | 2025-03-26T23:50:27.462479
10050 / tcp
-98713449 | 2025-03-22T14:32:21.787515
10051 / tcp
1094048410 | 2025-03-14T15:42:57.387343
10052 / tcp
-98713449 | 2025-03-23T09:12:17.193830
10066 / tcp
-98713449 | 2025-03-17T18:38:51.186756
10071 / tcp
-2031469209 | 2025-03-23T08:41:40.089570
10075 / tcp
-98713449 | 2025-03-23T13:24:48.054354
10080 / tcp
-98713449 | 2025-03-19T00:54:21.426472
10081 / tcp
-98713449 | 2025-03-22T10:01:12.891937
10082 / tcp
-98713449 | 2025-03-23T03:05:36.933648
10083 / tcp
-2031469209 | 2025-03-22T10:36:57.019488
10084 / tcp
-98713449 | 2025-03-23T11:11:04.500645
10086 / tcp
-98713449 | 2025-03-23T13:05:36.887446
10087 / tcp
-98713449 | 2025-03-06T20:09:37.177484
10089 / tcp
-2031469209 | 2025-03-23T07:36:30.128338
10090 / tcp
-98713449 | 2025-03-26T12:17:01.120966
10093 / tcp
-2031469209 | 2025-03-22T20:39:33.384154
10100 / tcp
-98713449 | 2025-03-18T23:47:19.873435
10181 / tcp
-98713449 | 2025-03-25T01:22:31.701389
10200 / tcp
-98713449 | 2025-03-22T11:09:33.532367
10201 / tcp
-98713449 | 2025-03-22T21:27:32.970634
10205 / tcp
-2031469209 | 2025-03-22T05:03:09.794214
10209 / tcp
-98713449 | 2025-03-22T17:42:50.991502
10210 / tcp
-2031469209 | 2025-03-22T10:49:32.948022
10225 / tcp
-2031469209 | 2025-03-23T17:22:00.553536
10240 / tcp
-98713449 | 2025-03-23T08:17:08.033505
10243 / tcp
-2031469209 | 2025-03-27T03:50:49.732221
10249 / tcp
-98713449 | 2025-03-23T19:39:19.526173
10250 / tcp
411540654 | 2025-03-26T19:53:51.012011
10251 / tcp
-98713449 | 2025-03-23T20:20:10.218093
10254 / tcp
-2031469209 | 2025-03-23T07:33:24.301533
10283 / tcp
-98713449 | 2025-03-23T17:29:39.858860
10348 / tcp
-98713449 | 2025-03-23T18:12:09.367285
10390 / tcp
-98713449 | 2025-03-23T12:39:15.843340
10393 / tcp
-98713449 | 2025-03-23T15:28:59.011687
10397 / tcp
-2031469209 | 2025-03-23T23:37:02.684680
10398 / tcp
-98713449 | 2025-03-23T07:43:17.764114
10443 / tcp
-1454941180 | 2025-03-26T23:33:51.292940
10444 / tcp
-98713449 | 2025-03-23T21:11:13.206029
10445 / tcp
-98713449 | 2025-03-23T06:34:50.306995
10477 / tcp
-98713449 | 2025-03-24T00:22:12.240732
10533 / tcp
-98713449 | 2025-03-23T13:21:42.939142
10554 / tcp
-98713449 | 2025-03-25T17:20:50.610750
10810 / tcp
-2031469209 | 2025-03-23T01:06:52.066368
10892 / tcp
-98713449 | 2025-03-23T08:54:21.212450
10894 / tcp
-2031469209 | 2025-03-22T20:59:38.180820
10909 / tcp
-98713449 | 2025-03-27T01:18:32.191124
10911 / tcp
-2031469209 | 2025-03-25T19:42:06.903933
10934 / tcp
-98713449 | 2025-03-24T02:59:34.002879
10935 / tcp
-98713449 | 2025-03-23T07:18:46.448955
10936 / tcp
-98713449 | 2025-03-18T12:41:12.046235
11000 / tcp
-98713449 | 2025-03-26T04:05:39.632773
11001 / tcp
-2031469209 | 2025-03-23T06:36:21.090417
11007 / tcp
-98713449 | 2025-03-16T23:05:20.513868
11112 / tcp
-98713449 | 2025-03-25T17:32:32.680677
11180 / tcp
-2031469209 | 2025-03-23T00:49:02.417393
11210 / tcp
-2031469209 | 2025-03-27T00:16:46.456402
11211 / tcp
2034197593 | 2025-03-27T01:49:58.299655
11288 / tcp
-98713449 | 2025-03-27T01:51:55.615756
11300 / tcp
-2031469209 | 2025-03-25T01:06:38.375552
11371 / tcp
-2031469209 | 2025-03-26T08:13:18.454940
11401 / tcp
-98713449 | 2025-03-22T12:51:33.675651
11434 / tcp
-2031469209 | 2025-03-26T18:51:10.587034
11480 / tcp
-98713449 | 2025-03-23T07:16:08.303772
11596 / tcp
-2031469209 | 2025-03-23T10:54:19.798188
11601 / tcp
-2031469209 | 2025-03-23T12:01:09.942653
11680 / tcp
-98713449 | 2025-02-25T06:43:03.364261
11701 / tcp
-98713449 | 2025-03-13T09:01:09.277283
12000 / tcp
-98713449 | 2025-03-26T23:28:43.873115
12001 / tcp
-98713449 | 2025-03-23T10:53:08.308050
12016 / tcp
-2031469209 | 2025-03-22T14:51:51.298054
12019 / tcp
-2031469209 | 2025-03-08T15:37:41.190657
12056 / tcp
-98713449 | 2025-03-26T01:18:19.710680
12084 / tcp
-98713449 | 2025-02-25T20:12:23.604755
12088 / tcp
-98713449 | 2025-03-23T11:50:15.043204
12103 / tcp
-98713449 | 2025-03-22T23:53:09.502750
12104 / tcp
-98713449 | 2025-03-24T01:23:53.342774
12106 / tcp
-2031469209 | 2025-03-15T07:23:12.482488
12107 / tcp
-2031469209 | 2025-03-22T13:08:50.422024
12111 / tcp
-98713449 | 2025-03-23T12:38:05.083733
12112 / tcp
-98713449 | 2025-03-23T15:33:01.439772
12113 / tcp
-98713449 | 2025-03-23T03:08:35.820127
12115 / tcp
-2031469209 | 2025-03-22T18:13:11.091501
12116 / tcp
-98713449 | 2025-03-22T12:40:44.903867
12117 / tcp
-98713449 | 2025-03-22T07:00:36.923482
12120 / tcp
-98713449 | 2025-03-23T04:14:11.041053
12121 / tcp
-2031469209 | 2025-03-24T01:44:15.342803
12122 / tcp
-2031469209 | 2025-03-23T01:01:52.308816
12124 / tcp
-98713449 | 2025-03-21T09:44:02.842668
12126 / tcp
-2031469209 | 2025-03-20T21:45:07.038973
12127 / tcp
-98713449 | 2025-03-22T07:36:36.417656
12128 / tcp
-98713449 | 2025-03-22T12:24:41.456952
12129 / tcp
-2031469209 | 2025-03-23T22:49:20.731597
12130 / tcp
-2031469209 | 2025-03-24T01:53:48.217392
12131 / tcp
-98713449 | 2025-03-22T22:53:07.970997
12134 / tcp
-98713449 | 2025-03-24T00:19:31.812822
12136 / tcp
-2031469209 | 2025-03-13T23:15:56.546273
12137 / tcp
-98713449 | 2025-03-23T02:43:08.297769
12138 / tcp
-98713449 | 2025-03-23T17:04:38.425200
12139 / tcp
-2031469209 | 2025-03-22T03:03:43.653766
12141 / tcp
-98713449 | 2025-03-23T18:09:39.899471
12142 / tcp
-98713449 | 2025-03-23T07:17:15.163699
12143 / tcp
-98713449 | 2025-03-22T04:49:20.238579
12144 / tcp
-2031469209 | 2025-03-23T07:43:14.612129
12145 / tcp
-98713449 | 2025-03-23T09:51:03.650741
12146 / tcp
-98713449 | 2025-03-24T02:22:57.157504
12147 / tcp
-98713449 | 2025-03-22T04:27:26.967531
12148 / tcp
-2031469209 | 2025-03-22T16:15:55.381504
12150 / tcp
-2031469209 | 2025-03-23T09:52:27.859433
12151 / tcp
-2031469209 | 2025-03-23T07:24:34.394288
12153 / tcp
-2031469209 | 2025-03-17T00:32:57.326659
12154 / tcp
-2031469209 | 2025-03-23T18:37:32.841733
12156 / tcp
-98713449 | 2025-03-22T13:48:17.239540
12158 / tcp
-98713449 | 2025-03-22T06:37:05.777950
12159 / tcp
-98713449 | 2025-03-22T20:02:27.207537
12161 / tcp
-2031469209 | 2025-03-18T01:48:02.595886
12162 / tcp
-98713449 | 2025-03-11T22:19:13.667810
12163 / tcp
-2031469209 | 2025-02-28T22:02:27.059907
12165 / tcp
-2031469209 | 2025-03-22T04:20:00.534879
12166 / tcp
-98713449 | 2025-03-22T05:19:25.582562
12168 / tcp
-2031469209 | 2025-03-24T02:14:32.913406
12169 / tcp
-98713449 | 2025-03-05T22:25:59.857087
12170 / tcp
-2031469209 | 2025-03-26T01:03:12.839825
12171 / tcp
-2031469209 | 2025-03-26T01:04:54.300715
12173 / tcp
-98713449 | 2025-03-19T23:50:23.981416
12174 / tcp
-98713449 | 2025-03-23T14:11:15.049124
12177 / tcp
-2031469209 | 2025-02-25T19:57:42.304006
12178 / tcp
-2031469209 | 2025-03-24T02:04:08.187818
12180 / tcp
-2031469209 | 2025-03-22T05:23:43.979984
12181 / tcp
-98713449 | 2025-03-23T20:33:16.568351
12184 / tcp
-2031469209 | 2025-03-22T07:22:09.863878
12187 / tcp
-98713449 | 2025-03-23T16:50:24.930877
12188 / tcp
-98713449 | 2025-03-22T09:23:59.820927
12189 / tcp
-2031469209 | 2025-03-23T12:14:26.840780
12191 / tcp
-98713449 | 2025-03-24T02:05:36.085638
12192 / tcp
-2031469209 | 2025-02-27T08:17:32.746453
12193 / tcp
-98713449 | 2025-03-23T14:05:49.592935
12194 / tcp
-2031469209 | 2025-03-23T03:49:18.885424
12196 / tcp
-2031469209 | 2025-03-23T01:01:05.063579
12198 / tcp
-2031469209 | 2025-03-23T02:54:03.053317
12204 / tcp
-98713449 | 2025-03-23T21:06:39.673874
12205 / tcp
-2031469209 | 2025-03-22T11:28:38.540032
12206 / tcp
-98713449 | 2025-03-15T14:53:08.364059
12207 / tcp
-98713449 | 2025-02-26T17:44:35.514224
12208 / tcp
-98713449 | 2025-03-26T01:01:43.084535
12209 / tcp
-98713449 | 2025-03-23T09:49:53.565957
12210 / tcp
-98713449 | 2025-03-23T22:34:25.472027
12212 / tcp
-98713449 | 2025-03-22T13:13:13.858783
12222 / tcp
-98713449 | 2025-03-23T14:23:33.881769
12223 / tcp
-98713449 | 2025-03-24T00:15:05.039272
12225 / tcp
-2031469209 | 2025-03-23T21:53:20.730626
12226 / tcp
-98713449 | 2025-03-23T19:12:17.569043
12227 / tcp
-98713449 | 2025-03-23T20:43:33.139385
12231 / tcp
-2031469209 | 2025-03-24T00:39:34.541646
12232 / tcp
-2031469209 | 2025-03-23T18:57:38.149916
12233 / tcp
-98713449 | 2025-03-23T00:49:38.935680
12236 / tcp
-2031469209 | 2025-03-23T02:37:41.556437
12237 / tcp
-2031469209 | 2025-03-17T07:23:48.644082
12241 / tcp
-2031469209 | 2025-03-22T10:11:43.645170
12243 / tcp
-2031469209 | 2025-03-23T02:40:37.154816
12251 / tcp
-98713449 | 2025-03-23T08:09:50.468414
12253 / tcp
-98713449 | 2025-03-24T01:29:59.798999
12254 / tcp
-98713449 | 2025-03-23T10:38:34.386643
12255 / tcp
-98713449 | 2025-03-23T05:45:34.288032
12256 / tcp
-2031469209 | 2025-03-22T11:01:38.362338
12258 / tcp
-2031469209 | 2025-03-22T02:16:13.795351
12259 / tcp
-98713449 | 2025-03-23T18:30:12.176694
12260 / tcp
-98713449 | 2025-03-22T14:17:50.567535
12261 / tcp
-98713449 | 2025-03-25T11:42:57.845942
12263 / tcp
-98713449 | 2025-03-25T07:56:05.333040
12264 / tcp
-98713449 | 2025-03-06T18:41:21.447986
12265 / tcp
-98713449 | 2025-03-23T19:09:32.824110
12266 / tcp
-2031469209 | 2025-03-23T23:05:22.621472
12267 / tcp
-98713449 | 2025-03-23T08:35:57.118362
12271 / tcp
-98713449 | 2025-03-24T03:12:18.612474
12273 / tcp
-98713449 | 2025-03-22T06:38:20.193483
12274 / tcp
-98713449 | 2025-03-22T10:53:36.698341
12279 / tcp
-98713449 | 2025-03-22T03:13:08.503758
12280 / tcp
-98713449 | 2025-03-07T09:14:52.040490
12282 / tcp
-2031469209 | 2025-03-22T18:55:44.477205
12283 / tcp
-2031469209 | 2025-03-23T08:05:16.448778
12285 / tcp
-2031469209 | 2025-03-22T15:23:24.881889
12286 / tcp
-98713449 | 2025-03-23T20:11:36.894865
12287 / tcp
-98713449 | 2025-03-22T16:02:06.516602
12288 / tcp
-2031469209 | 2025-02-28T18:27:28.110868
12289 / tcp
-98713449 | 2025-03-23T06:26:24.840232
12290 / tcp
-98713449 | 2025-03-23T16:47:03.996325
12292 / tcp
-2031469209 | 2025-03-22T20:24:17.445648
12294 / tcp
-98713449 | 2025-03-22T07:33:32.981539
12295 / tcp
-2031469209 | 2025-03-23T23:03:49.229028
12296 / tcp
-98713449 | 2025-03-16T06:41:56.135491
12301 / tcp
-98713449 | 2025-03-23T19:56:20.428183
12302 / tcp
-98713449 | 2025-03-23T10:47:01.223521
12303 / tcp
-2031469209 | 2025-03-23T17:33:48.150323
12304 / tcp
-98713449 | 2025-03-07T04:31:44.962083
12306 / tcp
-98713449 | 2025-03-23T23:16:59.663273
12307 / tcp
-2031469209 | 2025-03-22T17:38:34.421737
12311 / tcp
-2031469209 | 2025-03-23T10:20:16.713282
12315 / tcp
-98713449 | 2025-03-23T16:51:43.011566
12317 / tcp
-98713449 | 2025-03-23T05:24:15.246903
12318 / tcp
-98713449 | 2025-03-23T15:04:06.228855
12322 / tcp
-2031469209 | 2025-03-22T02:57:42.385778
12323 / tcp
1738565259 | 2025-03-26T02:24:05.951218
12324 / tcp
-98713449 | 2025-03-23T20:12:02.700264
12325 / tcp
-2031469209 | 2025-02-26T16:12:09.471269
12328 / tcp
-2031469209 | 2025-03-23T03:18:40.504530
12330 / tcp
-98713449 | 2025-03-24T02:49:46.682311
12331 / tcp
-2031469209 | 2025-03-22T03:26:05.388304
12333 / tcp
-98713449 | 2025-03-23T04:28:36.950973
12335 / tcp
-2031469209 | 2025-03-18T06:50:53.032445
12337 / tcp
-2031469209 | 2025-03-22T03:15:06.808187
12341 / tcp
-2031469209 | 2025-03-24T20:06:33.698223
12343 / tcp
-2031469209 | 2025-03-06T09:35:24.918932
12344 / tcp
-98713449 | 2025-03-24T04:12:42.436477
12346 / tcp
-2031469209 | 2025-03-22T23:04:26.610884
12347 / tcp
-98713449 | 2025-03-23T17:58:59.542217
12348 / tcp
-98713449 | 2025-03-22T04:03:19.338580
12349 / tcp
-2031469209 | 2025-03-23T20:37:34.255407
12351 / tcp
-98713449 | 2025-03-24T03:02:28.451140
12353 / tcp
-98713449 | 2025-03-22T22:14:48.074290
12354 / tcp
-98713449 | 2025-03-22T15:59:01.294831
12355 / tcp
-98713449 | 2025-03-24T04:18:19.455600
12356 / tcp
-2031469209 | 2025-03-23T09:34:10.576987
12357 / tcp
-2031469209 | 2025-03-11T02:45:07.294563
12358 / tcp
-2031469209 | 2025-03-23T23:07:00.945745
12360 / tcp
-98713449 | 2025-03-10T00:43:47.670197
12361 / tcp
-98713449 | 2025-03-23T21:03:02.040791
12362 / tcp
-2031469209 | 2025-03-15T12:34:54.217398
12363 / tcp
-98713449 | 2025-03-24T01:28:14.338260
12365 / tcp
-98713449 | 2025-03-23T02:29:56.788429
12371 / tcp
-98713449 | 2025-03-23T02:51:05.469342
12372 / tcp
-98713449 | 2025-03-23T22:15:23.145332
12374 / tcp
-98713449 | 2025-03-22T04:29:53.261924
12376 / tcp
-98713449 | 2025-03-19T15:38:47.237736
12377 / tcp
-2031469209 | 2025-03-22T10:35:23.777008
12378 / tcp
-98713449 | 2025-03-22T21:01:04.996803
12380 / tcp
-98713449 | 2025-03-23T03:26:09.473509
12381 / tcp
-98713449 | 2025-03-17T00:12:46.627631
12383 / tcp
-98713449 | 2025-03-20T14:40:07.018279
12384 / tcp
-98713449 | 2025-03-16T12:19:31.439493
12386 / tcp
-98713449 | 2025-03-22T07:06:51.474161
12387 / tcp
-98713449 | 2025-03-23T00:58:01.792644
12388 / tcp
-98713449 | 2025-03-22T12:18:40.458358
12390 / tcp
-98713449 | 2025-03-24T01:52:37.907363
12392 / tcp
-2031469209 | 2025-03-22T05:29:46.619767
12396 / tcp
-98713449 | 2025-03-11T16:34:32.151787
12397 / tcp
-98713449 | 2025-03-26T09:46:23.055594
12400 / tcp
-2031469209 | 2025-03-23T05:47:11.910050
12404 / tcp
-98713449 | 2025-03-22T15:02:27.592579
12406 / tcp
-2031469209 | 2025-03-22T10:48:30.440803
12407 / tcp
-98713449 | 2025-03-23T11:06:32.031431
12408 / tcp
-98713449 | 2025-03-23T03:04:23.226129
12410 / tcp
-98713449 | 2025-03-12T03:16:37.159188
12411 / tcp
-98713449 | 2025-03-22T12:46:47.227965
12412 / tcp
-98713449 | 2025-03-22T04:34:54.795218
12415 / tcp
-98713449 | 2025-03-06T18:15:06.953888
12417 / tcp
-98713449 | 2025-03-22T21:33:03.084385
12418 / tcp
-98713449 | 2025-03-23T22:51:55.365713
12420 / tcp
-2031469209 | 2025-03-24T03:09:33.087689
12423 / tcp
-98713449 | 2025-03-24T01:42:45.558847
12424 / tcp
-98713449 | 2025-03-22T16:26:42.583456
12425 / tcp
-2031469209 | 2025-03-07T13:57:59.463439
12426 / tcp
-2031469209 | 2025-03-23T01:56:07.850818
12427 / tcp
-98713449 | 2025-03-17T03:49:00.896087
12428 / tcp
-2031469209 | 2025-03-22T16:03:35.023618
12429 / tcp
-2031469209 | 2025-03-10T11:52:35.451118
12433 / tcp
-2031469209 | 2025-03-23T10:51:11.778516
12434 / tcp
-2031469209 | 2025-03-23T11:08:01.440618
12436 / tcp
-2031469209 | 2025-03-21T08:41:08.903318
12437 / tcp
-2031469209 | 2025-03-23T21:12:52.458612
12438 / tcp
-2031469209 | 2025-03-16T04:25:48.619546
12439 / tcp
-98713449 | 2025-03-23T11:58:09.050014
12440 / tcp
-98713449 | 2025-03-23T03:17:31.884023
12442 / tcp
-98713449 | 2025-03-13T02:24:46.280289
12444 / tcp
-2031469209 | 2025-03-22T01:39:42.570063
12448 / tcp
-98713449 | 2025-03-22T06:00:45.894074
12449 / tcp
-2031469209 | 2025-03-13T16:14:52.156565
12450 / tcp
-2031469209 | 2025-03-22T00:41:38.619290
12451 / tcp
-2031469209 | 2025-03-16T19:39:14.138429
12454 / tcp
-98713449 | 2025-03-22T02:22:27.184384
12455 / tcp
-98713449 | 2025-03-13T19:48:32.261699
12457 / tcp
-98713449 | 2025-03-10T00:48:02.232678
12458 / tcp
-2031469209 | 2025-03-22T09:12:24.843374
12459 / tcp
-98713449 | 2025-03-24T02:21:40.134663
12462 / tcp
-2031469209 | 2025-03-25T18:48:27.793262
12463 / tcp
-2031469209 | 2025-03-23T17:24:57.010281
12465 / tcp
-2031469209 | 2025-03-23T20:49:31.942021
12467 / tcp
-2031469209 | 2025-03-12T19:29:22.916332
12469 / tcp
-98713449 | 2025-03-11T08:06:32.963569
12470 / tcp
-98713449 | 2025-03-22T10:22:41.805624
12475 / tcp
-98713449 | 2025-03-23T03:39:03.009736
12478 / tcp
-98713449 | 2025-03-24T07:21:48.276720
12479 / tcp
-2031469209 | 2025-03-23T12:18:40.311458
12480 / tcp
-2031469209 | 2025-03-22T19:41:47.957146
12481 / tcp
-2031469209 | 2025-03-24T03:44:29.610658
12483 / tcp
-98713449 | 2025-03-22T12:15:44.571118
12484 / tcp
-98713449 | 2025-03-23T22:33:14.561471
12485 / tcp
-98713449 | 2025-03-24T02:41:09.365650
12486 / tcp
-98713449 | 2025-03-23T05:51:37.214908
12487 / tcp
-98713449 | 2025-03-22T02:55:56.287127
12488 / tcp
-98713449 | 2025-02-25T20:39:16.344944
12489 / tcp
-98713449 | 2025-03-23T19:41:51.963100
12490 / tcp
-98713449 | 2025-03-22T20:35:11.209434
12491 / tcp
-2031469209 | 2025-03-22T12:33:52.834432
12493 / tcp
-98713449 | 2025-03-22T23:11:30.504601
12494 / tcp
-2031469209 | 2025-03-23T05:38:54.990925
12495 / tcp
-98713449 | 2025-03-23T01:49:08.144201
12498 / tcp
-2031469209 | 2025-03-23T11:29:47.793576
12501 / tcp
-2031469209 | 2025-03-22T10:13:20.471113
12503 / tcp
-98713449 | 2025-03-15T06:06:58.356620
12505 / tcp
-98713449 | 2025-03-23T14:32:15.940622
12506 / tcp
-98713449 | 2025-03-22T09:51:48.623619
12507 / tcp
-2031469209 | 2025-03-22T18:47:10.755751
12508 / tcp
-98713449 | 2025-03-22T12:12:43.913124
12509 / tcp
-98713449 | 2025-03-22T01:44:50.099387
12510 / tcp
-98713449 | 2025-03-22T03:00:11.383862
12511 / tcp
-98713449 | 2025-03-22T01:53:11.521634
12512 / tcp
-98713449 | 2025-03-23T12:24:51.214981
12514 / tcp
-2031469209 | 2025-03-23T02:14:04.654957
12518 / tcp
-2031469209 | 2025-03-23T05:25:53.613054
12519 / tcp
-2031469209 | 2025-03-23T13:16:04.792971
12520 / tcp
-2031469209 | 2025-03-22T06:31:01.706880
12521 / tcp
-98713449 | 2025-03-23T16:37:09.881805
12523 / tcp
-2031469209 | 2025-03-11T20:38:21.173557
12524 / tcp
-2031469209 | 2025-03-24T02:38:17.235224
12525 / tcp
-98713449 | 2025-03-23T22:40:44.712332
12526 / tcp
-98713449 | 2025-03-25T12:58:19.880283
12527 / tcp
-98713449 | 2025-03-23T00:22:11.534501
12529 / tcp
-98713449 | 2025-03-24T00:23:54.257851
12530 / tcp
-98713449 | 2025-03-15T10:55:31.524823
12532 / tcp
-98713449 | 2025-03-23T21:50:23.446451
12538 / tcp
-2031469209 | 2025-03-23T06:15:53.526044
12539 / tcp
-2031469209 | 2025-03-23T18:26:48.592490
12540 / tcp
-98713449 | 2025-03-23T02:41:40.764827
12544 / tcp
-2031469209 | 2025-03-20T10:36:26.751553
12545 / tcp
-2031469209 | 2025-03-23T21:52:00.313533
12547 / tcp
-2031469209 | 2025-03-23T20:51:16.509623
12549 / tcp
-2031469209 | 2025-03-24T00:27:06.245603
12551 / tcp
-2031469209 | 2025-03-23T15:20:40.255652
12554 / tcp
-98713449 | 2025-03-22T18:10:38.324056
12555 / tcp
-2031469209 | 2025-03-23T14:22:19.675451
12559 / tcp
-98713449 | 2025-03-22T18:31:57.320865
12560 / tcp
-98713449 | 2025-03-22T20:22:51.512656
12563 / tcp
-98713449 | 2025-03-23T19:53:24.200434
12564 / tcp
-2031469209 | 2025-03-22T22:50:31.866081
12567 / tcp
-98713449 | 2025-03-13T15:33:58.956112
12568 / tcp
-98713449 | 2025-03-22T18:01:57.428929
12570 / tcp
-98713449 | 2025-03-19T00:37:27.661047
12572 / tcp
-98713449 | 2025-03-22T03:07:54.841010
12573 / tcp
-2031469209 | 2025-03-22T06:05:13.470544
12574 / tcp
-2031469209 | 2025-03-22T15:31:08.764805
12575 / tcp
-98713449 | 2025-03-23T22:23:11.928194
12577 / tcp
-2031469209 | 2025-03-05T06:17:27.535497
12578 / tcp
-98713449 | 2025-03-22T22:50:08.098020
12580 / tcp
-98713449 | 2025-03-23T04:28:49.620387
12581 / tcp
-2031469209 | 2025-03-24T03:29:45.722221
12582 / tcp
-2031469209 | 2025-03-23T13:48:19.636607
12583 / tcp
-2031469209 | 2025-03-15T18:25:47.757069
12585 / tcp
-98713449 | 2025-03-24T02:27:18.040209
12589 / tcp
-2031469209 | 2025-03-22T13:38:07.060887
12590 / tcp
-98713449 | 2025-03-23T06:30:40.925721
12601 / tcp
-98713449 | 2025-03-24T01:46:56.877465
12615 / tcp
-2031469209 | 2025-03-23T22:39:00.515114
12980 / tcp
-98713449 | 2025-03-23T21:12:13.990755
13082 / tcp
-2031469209 | 2025-02-25T07:17:46.354338
13128 / tcp
-2031469209 | 2025-03-22T17:20:17.326303
13380 / tcp
-2031469209 | 2025-03-23T19:14:15.331941
13579 / tcp
-2031469209 | 2025-03-27T00:04:54.762685
14024 / tcp
-98713449 | 2025-03-23T19:25:51.603143
14026 / tcp
-2031469209 | 2025-03-22T03:28:23.824847
14082 / tcp
-98713449 | 2025-03-26T04:21:22.834507
14084 / tcp
-98713449 | 2025-03-23T00:13:47.909502
14104 / tcp
-98713449 | 2025-03-24T00:34:30.078756
14130 / tcp
-2031469209 | 2025-03-23T17:32:22.230403
14147 / tcp
-2031469209 | 2025-03-27T03:10:22.665389
14265 / tcp
-98713449 | 2025-03-26T05:25:46.174467
14400 / tcp
-98713449 | 2025-03-23T20:14:45.556851
14402 / tcp
-98713449 | 2025-03-22T23:57:10.547088
14404 / tcp
-98713449 | 2025-03-23T11:25:54.367712
14407 / tcp
-2031469209 | 2025-03-22T04:12:37.378508
14825 / tcp
-98713449 | 2025-03-17T00:50:34.256511
14880 / tcp
-98713449 | 2025-03-23T17:11:49.077749
14895 / tcp
-98713449 | 2025-03-23T00:18:42.375846
14897 / tcp
-98713449 | 2025-03-23T10:15:48.557249
14905 / tcp
-98713449 | 2025-03-23T01:43:00.813901
15000 / tcp
-98713449 | 2025-03-22T14:38:16.668009
15001 / tcp
-2031469209 | 2025-03-22T09:40:07.032921
15002 / tcp
-98713449 | 2025-03-17T16:29:48.779385
15006 / tcp
-98713449 | 2025-03-22T05:15:01.658724
15018 / tcp
-98713449 | 2025-03-22T03:10:34.931184
15038 / tcp
-98713449 | 2025-03-08T20:13:02.591157
15044 / tcp
-98713449 | 2025-03-22T20:30:15.905930
15084 / tcp
-98713449 | 2025-03-22T09:07:58.266091
15123 / tcp
-98713449 | 2025-03-23T09:56:43.976990
15443 / tcp
411540654 | 2025-03-14T05:15:19.086379
15502 / tcp
-98713449 | 2025-03-24T01:34:19.299349
15503 / tcp
-2031469209 | 2025-03-23T04:54:05.796800
15504 / tcp
-98713449 | 2025-03-25T01:54:17.620989
15555 / tcp
-2031469209 | 2025-03-23T08:15:52.265647
15588 / tcp
-98713449 | 2025-03-23T15:58:05.620639
15672 / tcp
-98713449 | 2025-03-22T07:05:02.672435
15673 / tcp
-2031469209 | 2025-03-23T17:39:16.025026
15831 / tcp
-98713449 | 2025-03-25T07:18:11.882492
16000 / tcp
-2031469209 | 2025-03-13T14:33:31.223571
16002 / tcp
-98713449 | 2025-03-22T11:47:33.077713
16003 / tcp
-2031469209 | 2025-03-23T18:35:47.439351
16004 / tcp
-2031469209 | 2025-03-22T04:18:45.534608
16006 / tcp
-98713449 | 2025-03-22T08:20:22.690756
16007 / tcp
-98713449 | 2025-03-22T07:51:29.804251
16008 / tcp
-98713449 | 2025-03-22T08:12:58.244357
16010 / tcp
-98713449 | 2025-03-26T02:45:03.877088
16011 / tcp
-2031469209 | 2025-03-23T13:55:39.673702
16012 / tcp
-2031469209 | 2025-03-23T23:56:29.909156
16013 / tcp
-2031469209 | 2025-03-22T08:42:39.936669
16014 / tcp
-98713449 | 2025-03-22T12:42:30.048298
16015 / tcp
-2031469209 | 2025-03-23T18:00:09.214013
16016 / tcp
-98713449 | 2025-03-22T21:26:08.904367
16018 / tcp
-2031469209 | 2025-03-11T12:10:42.766761
16020 / tcp
-98713449 | 2025-03-23T18:13:49.748135
16021 / tcp
-98713449 | 2025-03-23T16:38:27.630412
16022 / tcp
-98713449 | 2025-03-21T13:03:16.285451
16024 / tcp
-98713449 | 2025-03-24T03:38:28.647088
16025 / tcp
-2031469209 | 2025-03-23T02:26:41.231329
16026 / tcp
-2031469209 | 2025-03-24T02:10:21.108265
16027 / tcp
-98713449 | 2025-03-13T08:41:54.236132
16028 / tcp
-98713449 | 2025-03-22T05:10:43.039518
16030 / tcp
-98713449 | 2025-03-26T02:12:06.455896
16031 / tcp
-2031469209 | 2025-03-23T20:01:09.089990
16033 / tcp
-2031469209 | 2025-03-23T02:28:12.395143
16035 / tcp
-98713449 | 2025-03-23T01:28:16.716112
16036 / tcp
-98713449 | 2025-03-22T22:38:27.086481
16037 / tcp
-2031469209 | 2025-03-23T05:22:30.877352
16038 / tcp
-2031469209 | 2025-03-26T14:58:44.574630
16039 / tcp
-2031469209 | 2025-03-22T07:09:54.557295
16040 / tcp
-98713449 | 2025-03-22T05:12:09.528898
16041 / tcp
-98713449 | 2025-03-23T06:21:17.241767
16042 / tcp
-98713449 | 2025-03-23T16:54:25.933978
16043 / tcp
-98713449 | 2025-03-23T10:01:45.208936
16045 / tcp
-2031469209 | 2025-03-23T03:43:14.763719
16047 / tcp
-98713449 | 2025-03-22T23:56:09.948199
16050 / tcp
-98713449 | 2025-03-24T04:46:12.955424
16051 / tcp
-2031469209 | 2025-03-22T10:25:29.337021
16052 / tcp
-2031469209 | 2025-03-23T17:43:35.767645
16054 / tcp
-98713449 | 2025-03-23T01:02:17.985870
16055 / tcp
-98713449 | 2025-03-24T02:52:06.284571
16057 / tcp
-98713449 | 2025-03-22T23:49:56.526293
16058 / tcp
-98713449 | 2025-03-22T08:53:01.989579
16059 / tcp
-2031469209 | 2025-03-23T17:54:32.777665
16061 / tcp
-2031469209 | 2025-03-23T16:44:20.293603
16062 / tcp
-98713449 | 2025-03-04T09:17:04.614809
16067 / tcp
-98713449 | 2025-03-22T09:06:43.998246
16068 / tcp
-98713449 | 2025-03-23T16:18:30.097009
16069 / tcp
-98713449 | 2025-03-24T11:43:48.258380
16072 / tcp
-98713449 | 2025-03-22T20:57:13.876880
16073 / tcp
-98713449 | 2025-03-23T14:29:39.409737
16074 / tcp
-98713449 | 2025-03-22T15:11:12.759838
16075 / tcp
-98713449 | 2025-03-22T10:55:31.064559
16077 / tcp
-98713449 | 2025-03-23T02:12:40.742925
16078 / tcp
-98713449 | 2025-03-23T09:04:29.551996
16080 / tcp
-98713449 | 2025-03-22T16:57:25.372689
16084 / tcp
-98713449 | 2025-03-22T08:16:08.793045
16085 / tcp
-2031469209 | 2025-03-23T17:16:30.171997
16086 / tcp
-2031469209 | 2025-03-14T12:51:06.172268
16089 / tcp
-98713449 | 2025-03-22T07:16:16.198754
16091 / tcp
-98713449 | 2025-03-25T01:03:29.546332
16092 / tcp
-98713449 | 2025-03-11T01:37:04.973244
16094 / tcp
-98713449 | 2025-02-27T14:20:19.247233
16098 / tcp
-2031469209 | 2025-02-25T11:32:49.774434
16101 / tcp
-2031469209 | 2025-03-24T02:00:03.253207
16103 / tcp
-98713449 | 2025-03-23T02:20:40.350124
16311 / tcp
-98713449 | 2025-03-22T17:00:32.166170
16316 / tcp
-2031469209 | 2025-03-24T02:46:42.818600
16400 / tcp
-98713449 | 2025-03-24T00:34:07.066913
16402 / tcp
-98713449 | 2025-03-24T00:28:46.286641
16404 / tcp
-2031469209 | 2025-03-22T20:16:17.767278
16443 / tcp
-98713449 | 2025-03-07T04:49:58.781250
16464 / tcp
1094048410 | 2025-03-21T01:28:11.723024
16666 / tcp
-2031469209 | 2025-03-22T11:42:55.853390
16800 / tcp
-98713449 | 2025-03-23T08:21:11.235818
16992 / tcp
998037014 | 2025-03-26T17:51:08.433939
17000 / tcp
-2031469209 | 2025-03-26T14:59:22.803952
17020 / tcp
-98713449 | 2025-03-26T23:21:54.320172
17070 / tcp
-2031469209 | 2025-03-23T05:16:55.071124
17082 / tcp
-2031469209 | 2025-03-22T15:14:03.586179
17100 / tcp
-2031469209 | 2025-03-22T14:34:25.987236
17102 / tcp
-98713449 | 2025-03-26T00:55:13.450814
17182 / tcp
-2031469209 | 2025-03-22T17:31:23.703937
17184 / tcp
-98713449 | 2025-03-22T05:58:53.429993
17443 / tcp
-98713449 | 2025-03-23T17:51:05.387301
17771 / tcp
-98713449 | 2025-03-13T10:51:54.259239
17776 / tcp
-98713449 | 2025-03-22T11:06:46.274281
17778 / tcp
-98713449 | 2025-03-24T04:15:57.447287
17780 / tcp
-2031469209 | 2025-03-23T02:34:09.945591
18000 / tcp
-2031469209 | 2025-03-23T06:07:35.668880
18001 / tcp
-98713449 | 2025-03-22T10:58:18.173285
18002 / tcp
-98713449 | 2025-03-24T05:56:13.544178
18004 / tcp
-98713449 | 2025-03-23T18:28:36.146857
18006 / tcp
-2031469209 | 2025-03-23T01:58:57.472393
18008 / tcp
-98713449 | 2025-03-26T05:43:23.468347
18009 / tcp
-98713449 | 2025-03-23T03:10:47.993812
18010 / tcp
-2031469209 | 2025-02-27T21:06:03.778166
18012 / tcp
-98713449 | 2025-03-22T21:34:43.314064
18014 / tcp
-2031469209 | 2025-03-23T19:27:12.379059
18018 / tcp
-98713449 | 2025-03-23T00:26:02.401526
18019 / tcp
-2031469209 | 2025-03-22T04:42:03.439800
18020 / tcp
-98713449 | 2025-03-22T02:40:09.613129
18021 / tcp
-98713449 | 2025-03-22T20:36:22.725975
18022 / tcp
-2031469209 | 2025-03-22T17:36:48.772510
18027 / tcp
-2031469209 | 2025-03-23T11:39:00.943597
18029 / tcp
-2031469209 | 2025-03-24T03:19:39.910597
18030 / tcp
-2031469209 | 2025-03-26T07:50:16.343905
18031 / tcp
-98713449 | 2025-03-23T02:32:55.623463
18033 / tcp
-98713449 | 2025-03-23T15:45:00.743403
18034 / tcp
-98713449 | 2025-03-23T05:34:19.806671
18037 / tcp
-2031469209 | 2025-03-22T11:32:56.541229
18038 / tcp
-2031469209 | 2025-03-23T11:45:46.279066
18041 / tcp
-98713449 | 2025-03-24T18:56:29.562165
18044 / tcp
-2031469209 | 2025-03-25T21:28:17.441082
18045 / tcp
-98713449 | 2025-03-20T11:03:26.685712
18047 / tcp
-98713449 | 2025-03-22T09:18:31.305276
18050 / tcp
-98713449 | 2025-03-23T20:22:39.413277
18051 / tcp
-2031469209 | 2025-03-26T00:57:15.724748
18052 / tcp
-2031469209 | 2025-03-22T10:45:06.714057
18053 / tcp
-98713449 | 2025-03-22T14:56:17.617931
18054 / tcp
-98713449 | 2025-03-23T14:31:59.352893
18056 / tcp
-98713449 | 2025-03-23T17:35:12.602488
18057 / tcp
-98713449 | 2025-03-23T12:02:56.990699
18058 / tcp
-98713449 | 2025-03-23T08:22:42.854488
18059 / tcp
-2031469209 | 2025-03-23T03:48:08.470473
18062 / tcp
-2031469209 | 2025-03-22T21:08:29.933785
18063 / tcp
-98713449 | 2025-03-01T01:48:06.350810
18064 / tcp
-2031469209 | 2025-03-23T01:50:31.605715
18065 / tcp
-98713449 | 2025-03-22T04:24:11.343016
18066 / tcp
-98713449 | 2025-03-22T04:51:11.192139
18069 / tcp
-2031469209 | 2025-03-22T20:05:34.635961
18070 / tcp
-98713449 | 2025-03-23T10:39:30.634766
18071 / tcp
-98713449 | 2025-03-24T03:51:32.837470
18075 / tcp
-98713449 | 2025-03-26T07:47:37.076452
18077 / tcp
-2031469209 | 2025-03-10T06:24:45.679892
18078 / tcp
-98713449 | 2025-03-19T01:33:36.465085
18079 / tcp
-98713449 | 2025-03-22T18:15:06.378221
18081 / tcp
1859111832 | 2025-03-26T22:51:29.432160
18082 / tcp
-98713449 | 2025-03-24T02:42:45.413229
18083 / tcp
-2031469209 | 2025-03-22T07:26:18.308844
18087 / tcp
-98713449 | 2025-03-23T18:03:32.051421
18088 / tcp
-2031469209 | 2025-03-22T03:29:00.240492
18090 / tcp
-2031469209 | 2025-03-07T17:42:30.769752
18092 / tcp
-2031469209 | 2025-03-23T16:09:28.044610
18093 / tcp
-98713449 | 2025-03-22T18:28:34.161495
18094 / tcp
-98713449 | 2025-02-26T06:34:14.096715
18095 / tcp
-98713449 | 2025-03-22T16:20:30.772321
18101 / tcp
-98713449 | 2025-03-22T22:52:20.391354
18102 / tcp
-98713449 | 2025-03-23T22:03:23.647250
18103 / tcp
-98713449 | 2025-03-06T14:37:08.578574
18105 / tcp
-98713449 | 2025-03-25T17:00:49.066964
18108 / tcp
-98713449 | 2025-03-23T01:32:55.415638
18109 / tcp
-98713449 | 2025-03-23T14:02:37.258804
18110 / tcp
-2031469209 | 2025-03-22T15:04:01.905404
18111 / tcp
-98713449 | 2025-03-03T17:42:42.944929
18181 / tcp
-2031469209 | 2025-03-22T12:20:15.088359
18182 / tcp
-98713449 | 2025-03-22T07:45:50.903574
18200 / tcp
-98713449 | 2025-03-21T10:47:23.429299
18225 / tcp
-2031469209 | 2025-03-24T03:21:07.005644
18239 / tcp
-2031469209 | 2025-03-22T11:09:50.211604
18245 / tcp
-98713449 | 2025-03-26T21:39:33.575183
18368 / tcp
-98713449 | 2025-03-22T10:40:25.213092
18553 / tcp
1094048410 | 2025-03-26T21:27:00.909350
18765 / tcp
-98713449 | 2025-03-23T14:17:27.738999
18802 / tcp
-98713449 | 2025-03-23T11:09:42.300109
18888 / tcp
-98713449 | 2025-03-24T05:14:21.401447
19000 / tcp
-2031469209 | 2025-03-25T19:57:35.704025
19014 / tcp
-98713449 | 2025-03-22T21:11:35.669712
19015 / tcp
-2031469209 | 2025-03-23T23:47:18.016582
19017 / tcp
-98713449 | 2025-03-23T07:00:18.713478
19022 / tcp
-98713449 | 2025-03-22T15:18:53.047772
19071 / tcp
-2031469209 | 2025-03-26T10:45:18.158058
19082 / tcp
-98713449 | 2025-03-22T23:50:20.966963
19090 / tcp
-98713449 | 2025-03-22T06:57:36.879193
19091 / tcp
-98713449 | 2025-03-23T02:44:39.236511
19100 / tcp
-98713449 | 2025-03-23T13:33:50.780511
19233 / tcp
-98713449 | 2025-03-23T23:56:32.275778
19776 / tcp
-98713449 | 2025-03-22T19:50:05.972473
19902 / tcp
-98713449 | 2025-03-23T09:13:27.485319
19930 / tcp
411540654 | 2025-03-26T17:31:17.731969
19998 / tcp
-98713449 | 2025-03-22T08:39:17.252685
19999 / tcp
1440224878 | 2025-03-23T05:02:37.968174
20000 / tcp
411540654 | 2025-03-27T01:47:22.605295
20010 / tcp
-98713449 | 2025-03-22T03:52:30.667322
20020 / tcp
-98713449 | 2025-03-14T19:06:04.062118
20030 / tcp
-98713449 | 2025-03-23T19:28:40.878310
20053 / tcp
-98713449 | 2025-03-22T13:43:38.827777
20060 / tcp
-98713449 | 2025-03-23T19:31:41.984113
20070 / tcp
-98713449 | 2025-03-24T03:55:42.621812
20080 / tcp
-2031469209 | 2025-03-23T16:34:16.196125
20082 / tcp
-2031469209 | 2025-03-22T04:20:04.821848
20084 / tcp
-98713449 | 2025-03-23T13:45:13.979433
20090 / tcp
-2031469209 | 2025-03-23T01:05:27.460944
20100 / tcp
-98713449 | 2025-03-21T11:56:37.866094
20107 / tcp
-98713449 | 2025-03-15T21:07:02.408463
20150 / tcp
-98713449 | 2025-03-24T02:35:44.711290
20184 / tcp
-2031469209 | 2025-03-22T07:24:59.408792
20200 / tcp
-98713449 | 2025-03-23T13:10:02.046770
20201 / tcp
-98713449 | 2025-03-23T08:59:11.517898
20256 / tcp
411540654 | 2025-03-26T13:44:08.433484
20325 / tcp
-98713449 | 2025-03-23T07:55:28.413256
20440 / tcp
-2031469209 | 2025-03-23T21:04:56.241200
20443 / tcp
-2031469209 | 2025-03-23T10:43:51.013955
20500 / tcp
-2031469209 | 2025-03-22T15:09:54.339973
20512 / tcp
-2031469209 | 2025-03-13T20:20:45.954719
20547 / tcp
-2031469209 | 2025-03-26T14:02:47.313591
20892 / tcp
-2031469209 | 2025-03-22T06:54:48.586926
20894 / tcp
-2031469209 | 2025-03-23T02:25:41.610015
20900 / tcp
-2031469209 | 2025-03-26T01:07:46.587215
21001 / tcp
-2031469209 | 2025-03-22T14:01:20.710816
21002 / tcp
-2031469209 | 2025-03-23T05:21:09.096879
21025 / tcp
-98713449 | 2025-03-27T00:28:50.887193
21082 / tcp
-98713449 | 2025-03-23T07:14:52.961633
21083 / tcp
-2031469209 | 2025-03-22T02:28:04.348196
21200 / tcp
-98713449 | 2025-03-22T23:08:17.952179
21230 / tcp
-2031469209 | 2025-03-22T06:34:07.924078
21231 / tcp
-98713449 | 2025-03-22T21:40:56.374214
21233 / tcp
-2031469209 | 2025-03-23T12:33:21.292839
21234 / tcp
-2031469209 | 2025-03-23T19:33:13.018807
21236 / tcp
-98713449 | 2025-03-24T01:25:13.037665
21237 / tcp
-98713449 | 2025-03-23T23:07:56.706053
21239 / tcp
-98713449 | 2025-03-20T23:34:08.193935
21240 / tcp
-2031469209 | 2025-02-25T21:44:44.488155
21241 / tcp
-98713449 | 2025-03-23T12:40:49.222916
21242 / tcp
-98713449 | 2025-03-22T20:03:31.382727
21244 / tcp
-98713449 | 2025-03-18T09:37:19.135725
21245 / tcp
-98713449 | 2025-03-23T08:30:22.791984
21247 / tcp
-2031469209 | 2025-03-10T09:33:27.546701
21248 / tcp
-98713449 | 2025-03-23T19:49:20.552014
21250 / tcp
-2031469209 | 2025-03-23T12:46:45.906810
21251 / tcp
-98713449 | 2025-03-22T08:17:36.501134
21253 / tcp
-98713449 | 2025-03-09T21:01:29.433713
21254 / tcp
-98713449 | 2025-03-23T07:22:05.048224
21255 / tcp
-2031469209 | 2025-03-22T21:18:52.169528
21256 / tcp
-98713449 | 2025-03-23T00:24:56.037173
21257 / tcp
-98713449 | 2025-03-22T12:29:10.190445
21258 / tcp
-2031469209 | 2025-03-22T14:11:41.721508
21259 / tcp
-98713449 | 2025-03-22T06:25:14.195821
21260 / tcp
-98713449 | 2025-03-20T23:31:05.067570
21261 / tcp
-2031469209 | 2025-03-22T04:22:05.732331
21264 / tcp
-98713449 | 2025-03-23T16:58:47.599970
21265 / tcp
-98713449 | 2025-03-23T02:15:18.051545
21266 / tcp
-2031469209 | 2025-03-22T12:27:46.429355
21268 / tcp
-98713449 | 2025-03-27T03:06:40.262040
21269 / tcp
-98713449 | 2025-03-22T22:57:24.329410
21273 / tcp
-98713449 | 2025-03-24T07:39:54.356644
21274 / tcp
-2031469209 | 2025-03-23T07:30:26.892726
21276 / tcp
-2031469209 | 2025-03-22T04:06:15.120706
21277 / tcp
-2031469209 | 2025-03-22T11:18:07.784831
21278 / tcp
-98713449 | 2025-03-23T00:59:24.732197
21279 / tcp
-98713449 | 2025-03-23T18:41:48.416938
21280 / tcp
-2031469209 | 2025-03-23T13:43:40.819381
21282 / tcp
-98713449 | 2025-03-23T14:16:32.158555
21283 / tcp
-2031469209 | 2025-03-22T23:00:20.981833
21284 / tcp
-98713449 | 2025-03-22T23:24:27.386528
21285 / tcp
-2031469209 | 2025-03-22T18:35:46.523276
21286 / tcp
-2031469209 | 2025-03-23T06:01:24.160894
21287 / tcp
-98713449 | 2025-03-23T01:49:01.056690
21288 / tcp
-98713449 | 2025-03-25T20:21:18.544500
21289 / tcp
-98713449 | 2025-03-22T14:41:32.346300
21290 / tcp
-98713449 | 2025-03-22T23:19:03.745698
21292 / tcp
-98713449 | 2025-03-22T10:46:55.113160
21294 / tcp
-98713449 | 2025-03-23T03:45:07.502271
21295 / tcp
-98713449 | 2025-03-22T04:04:36.850629
21296 / tcp
-98713449 | 2025-03-24T04:33:45.297787
21297 / tcp
-98713449 | 2025-03-22T11:24:03.179001
21298 / tcp
-2031469209 | 2025-03-23T01:39:45.882196
21299 / tcp
-98713449 | 2025-03-24T03:43:10.888216
21301 / tcp
-2031469209 | 2025-03-22T04:43:37.703452
21302 / tcp
-98713449 | 2025-03-23T03:59:44.470051
21303 / tcp
-2031469209 | 2025-03-23T23:29:27.180899
21305 / tcp
-98713449 | 2025-03-23T23:33:05.733671
21306 / tcp
-2031469209 | 2025-03-22T17:12:03.467613
21307 / tcp
-2031469209 | 2025-03-09T04:27:17.447408
21308 / tcp
-2031469209 | 2025-03-26T00:51:49.504909
21312 / tcp
-2031469209 | 2025-03-22T08:26:21.537448
21313 / tcp
-2031469209 | 2025-03-22T23:38:01.693897
21314 / tcp
-98713449 | 2025-03-23T23:38:15.888825
21315 / tcp
-98713449 | 2025-03-17T10:04:53.392591
21317 / tcp
-98713449 | 2025-03-22T11:53:23.714536
21319 / tcp
-98713449 | 2025-03-23T10:23:26.446854
21321 / tcp
-98713449 | 2025-03-22T18:00:46.956793
21322 / tcp
-98713449 | 2025-03-26T01:09:52.919061
21323 / tcp
-2031469209 | 2025-03-23T04:32:59.715847
21325 / tcp
-2031469209 | 2025-03-26T19:57:08.582168
21326 / tcp
-98713449 | 2025-03-23T03:36:01.009056
21327 / tcp
-98713449 | 2025-03-24T00:32:23.520365
21357 / tcp
-2031469209 | 2025-03-22T17:55:11.416741
21379 / tcp
-98713449 | 2025-03-26T23:48:26.958980
21381 / tcp
-98713449 | 2025-03-18T20:52:55.656014
21443 / tcp
-2031469209 | 2025-03-22T21:03:04.093465
21515 / tcp
-98713449 | 2025-03-23T00:19:52.061055
21935 / tcp
-98713449 | 2025-03-23T23:24:22.413896
22000 / tcp
-2031469209 | 2025-03-22T13:49:53.291031
22069 / tcp
1094048410 | 2025-03-25T01:50:46.213881
22082 / tcp
-2031469209 | 2025-03-25T13:25:56.091264
22084 / tcp
-2031469209 | 2025-03-24T01:51:07.589264
22103 / tcp
-98713449 | 2025-03-22T17:59:19.695798
22206 / tcp
-2031469209 | 2025-03-14T10:44:42.328710
22222 / tcp
411540654 | 2025-03-26T09:35:35.243731
22403 / tcp
-98713449 | 2025-03-22T05:04:37.957666
22556 / tcp
-98713449 | 2025-03-26T05:31:43.399127
23023 / tcp
-2031469209 | 2025-03-25T18:05:06.843654
23084 / tcp
-98713449 | 2025-03-23T23:02:10.995914
23182 / tcp
-2031469209 | 2025-03-23T13:58:31.207966
23424 / tcp
-98713449 | 2025-03-26T22:33:41.546769
24084 / tcp
-98713449 | 2025-03-21T02:10:04.309565
24181 / tcp
-98713449 | 2025-03-22T18:57:28.201455
24245 / tcp
411540654 | 2025-03-26T04:18:57.218499
24442 / tcp
-98713449 | 2025-03-23T01:09:28.062323
25000 / tcp
-98713449 | 2025-03-22T09:24:34.822192
25001 / tcp
-98713449 | 2025-03-25T18:33:33.316528
25003 / tcp
-98713449 | 2025-03-23T05:01:17.097535
25004 / tcp
-98713449 | 2025-03-21T00:08:33.691575
25007 / tcp
-98713449 | 2025-03-23T09:26:26.911502
25010 / tcp
-98713449 | 2025-03-23T08:24:20.614357
25082 / tcp
-98713449 | 2025-03-23T20:24:12.856632
25084 / tcp
-2031469209 | 2025-03-23T08:45:33.699405
25105 / tcp
-2031469209 | 2025-03-26T21:35:06.777660
25565 / tcp
-2031469209 | 2025-03-26T16:55:41.688881
25782 / tcp
-98713449 | 2025-03-22T03:31:12.834031
26656 / tcp
1094048410 | 2025-03-13T06:18:13.678891
26657 / tcp
411540654 | 2025-03-12T02:26:47.520876
27015 / tcp
-2031469209 | 2025-03-27T03:31:06.412743
27016 / tcp
411540654 | 2025-03-25T14:11:37.548336
27017 / tcp
448794242 | 2025-03-25T10:39:39.618632
27036 / tcp
411540654 | 2025-03-25T08:50:09.519222
27105 / tcp
-98713449 | 2025-03-23T20:28:37.403737
27571 / tcp
-2031469209 | 2025-03-23T07:41:50.321792
28001 / tcp
-98713449 | 2025-03-22T19:04:47.924591
28015 / tcp
-98713449 | 2025-03-27T00:58:00.873938
28017 / tcp
-2031469209 | 2025-03-26T07:34:48.260859
28443 / tcp
-2031469209 | 2025-03-25T19:35:20.127747
28818 / tcp
-2031469209 | 2025-03-23T10:04:31.850458
29984 / tcp
-98713449 | 2025-02-28T06:52:11.215707
30001 / tcp
-2031469209 | 2025-03-11T00:03:40.999011
30002 / tcp
-98713449 | 2025-03-26T09:46:46.196418
30003 / tcp
-2031469209 | 2025-03-26T16:53:37.075780
30005 / tcp
-2031469209 | 2025-03-22T10:48:15.364749
30009 / tcp
-98713449 | 2025-03-23T01:46:17.044028
30010 / tcp
-98713449 | 2025-03-23T07:54:06.364086
30011 / tcp
-2031469209 | 2025-03-12T22:23:00.794824
30013 / tcp
-98713449 | 2025-03-23T12:58:48.838443
30015 / tcp
-98713449 | 2025-03-22T21:30:23.669690
30017 / tcp
-2031469209 | 2025-03-24T00:21:14.163956
30021 / tcp
-98713449 | 2025-03-22T15:43:34.174771
30022 / tcp
411540654 | 2025-03-18T21:36:08.928231
30023 / tcp
-98713449 | 2025-03-24T03:41:35.951379
30027 / tcp
-98713449 | 2025-03-22T12:57:20.166433
30050 / tcp
-98713449 | 2025-03-16T21:37:24.097720
30083 / tcp
-98713449 | 2025-03-22T14:25:15.725326
30101 / tcp
-98713449 | 2025-03-22T03:51:13.413995
30106 / tcp
-98713449 | 2025-03-23T20:17:39.808524
30111 / tcp
-2031469209 | 2025-03-23T10:32:09.204388
30112 / tcp
-98713449 | 2025-03-25T05:07:20.448780
30120 / tcp
-2031469209 | 2025-03-22T21:10:06.340248
30121 / tcp
-98713449 | 2025-03-23T15:40:41.801803
30122 / tcp
1094048410 | 2025-03-19T20:50:03.825448
30222 / tcp
411540654 | 2025-03-25T16:25:40.842133
30301 / tcp
411540654 | 2025-03-15T21:14:58.652394
30303 / tcp
1094048410 | 2025-03-19T22:03:37.231929
30322 / tcp
1094048410 | 2025-03-24T13:44:15.246671
30422 / tcp
1094048410 | 2025-03-26T09:15:13.220920
30443 / tcp
-2031469209 | 2025-03-14T13:13:12.874224
30468 / tcp
-2031469209 | 2025-03-23T20:57:10.674106
30473 / tcp
-2031469209 | 2025-03-23T14:14:34.862505
30501 / tcp
-98713449 | 2025-03-23T00:08:53.339114
30522 / tcp
411540654 | 2025-03-26T06:03:07.587134
30622 / tcp
411540654 | 2025-03-26T02:32:13.901324
30700 / tcp
-2031469209 | 2025-03-23T17:23:35.326201
30701 / tcp
-2031469209 | 2025-03-24T17:36:57.509207
30718 / tcp
411540654 | 2025-03-22T11:31:52.413866
30722 / tcp
1094048410 | 2025-03-25T00:02:15.514180
30822 / tcp
1094048410 | 2025-03-12T19:57:28.904123
30892 / tcp
-98713449 | 2025-03-23T00:15:19.640524
30894 / tcp
-98713449 | 2025-03-23T23:50:27.814631
30922 / tcp
411540654 | 2025-03-20T22:23:43.513689
31022 / tcp
1094048410 | 2025-03-24T12:02:04.913087
31122 / tcp
411540654 | 2025-03-09T12:35:02.560910
31210 / tcp
-98713449 | 2025-02-27T18:06:52.880289
31222 / tcp
1094048410 | 2025-03-24T02:18:56.915445
31322 / tcp
1094048410 | 2025-03-25T05:22:09.776330
31337 / tcp
411540654 | 2025-03-25T12:55:41.510869
31380 / tcp
-2031469209 | 2025-03-23T09:20:47.340438
31422 / tcp
411540654 | 2025-03-25T03:36:46.038635
31444 / tcp
-2031469209 | 2025-03-22T18:48:24.518155
31522 / tcp
411540654 | 2025-03-23T11:42:59.573361
31622 / tcp
411540654 | 2025-03-23T10:12:09.098810
31722 / tcp
411540654 | 2025-03-21T15:44:27.291459
31822 / tcp
411540654 | 2025-03-12T07:36:30.800493
31922 / tcp
1094048410 | 2025-03-24T06:46:47.723933
32022 / tcp
411540654 | 2025-03-23T19:10:07.731318
32080 / tcp
-98713449 | 2025-03-23T10:57:35.655958
32122 / tcp
1094048410 | 2025-03-20T03:14:03.943806
32202 / tcp
-98713449 | 2025-03-23T17:45:13.825122
32222 / tcp
1094048410 | 2025-03-23T17:27:55.451076
32303 / tcp
-98713449 | 2025-03-22T13:18:53.336830
32322 / tcp
411540654 | 2025-03-09T18:24:51.431198
32400 / tcp
-2031469209 | 2025-03-26T13:15:10.155767
32422 / tcp
411540654 | 2025-03-23T13:29:18.231669
32443 / tcp
-98713449 | 2025-03-23T16:21:11.724327
32522 / tcp
411540654 | 2025-03-22T03:55:19.192157
32622 / tcp
411540654 | 2025-03-21T03:38:11.223445
32722 / tcp
1094048410 | 2025-03-23T05:25:40.521287
32764 / tcp
-2031469209 | 2025-03-25T17:24:19.231805
32800 / tcp
-98713449 | 2025-03-22T18:09:12.404476
32822 / tcp
1094048410 | 2025-03-23T04:07:51.215645
32922 / tcp
411540654 | 2025-03-23T02:02:00.051362
33022 / tcp
411540654 | 2025-03-23T00:07:31.813800
33060 / tcp
-98713449 | 2025-03-26T23:56:51.854486
33122 / tcp
411540654 | 2025-03-22T22:22:16.818521
33222 / tcp
1094048410 | 2025-03-09T19:47:23.260909
33322 / tcp
1094048410 | 2025-03-22T07:28:54.562862
33338 / tcp
411540654 | 2025-03-24T08:45:39.167711
33389 / tcp
-98713449 | 2025-03-24T14:48:22.276717
33422 / tcp
1094048410 | 2025-03-09T10:32:17.726134
33522 / tcp
411540654 | 2025-03-20T13:53:18.576155
33622 / tcp
1094048410 | 2025-03-08T20:44:06.803428
33722 / tcp
411540654 | 2025-03-18T05:28:17.443372
33822 / tcp
1094048410 | 2025-03-18T11:16:28.395785
33922 / tcp
1094048410 | 2025-03-18T04:46:12.621422
34022 / tcp
411540654 | 2025-03-20T19:33:26.991458
34122 / tcp
411540654 | 2025-03-20T15:43:39.880998
34222 / tcp
411540654 | 2025-03-20T01:31:24.048525
34225 / tcp
-98713449 | 2025-03-10T11:06:40.337903
34422 / tcp
411540654 | 2025-03-15T00:51:57.440948
34500 / tcp
-98713449 | 2025-03-23T12:15:52.489492
34522 / tcp
411540654 | 2025-03-05T06:08:46.927847
34722 / tcp
411540654 | 2025-03-19T08:16:48.769790
34822 / tcp
411540654 | 2025-03-19T06:21:26.302860
34922 / tcp
411540654 | 2025-03-18T19:51:30.423892
35000 / tcp
-98713449 | 2025-03-26T22:14:43.841876
35002 / tcp
-98713449 | 2025-03-23T07:58:11.884977
35022 / tcp
1094048410 | 2025-03-19T02:47:27.399811
35101 / tcp
-98713449 | 2025-03-22T10:17:31.659814
35122 / tcp
411540654 | 2025-03-04T08:58:33.893256
35153 / tcp
-98713449 | 2025-03-22T13:17:45.893059
35222 / tcp
1094048410 | 2025-03-18T09:33:45.562267
35240 / tcp
-98713449 | 2025-03-23T05:01:57.177540
35250 / tcp
-98713449 | 2025-03-22T05:47:50.406493
35251 / tcp
-98713449 | 2025-03-22T19:48:59.600315
35322 / tcp
411540654 | 2025-03-17T08:39:59.518333
35422 / tcp
411540654 | 2025-03-18T23:51:25.862976
35522 / tcp
-98713449 | 2025-03-22T17:24:13.514932
35554 / tcp
-98713449 | 2025-03-24T02:34:23.599720
35559 / tcp
-98713449 | 2025-03-17T15:21:55.197916
35560 / tcp
-98713449 | 2025-03-23T19:00:26.693175
35622 / tcp
411540654 | 2025-03-18T07:56:06.918612
35722 / tcp
411540654 | 2025-03-17T10:24:07.313936
35822 / tcp
411540654 | 2025-03-17T17:48:30.521792
35922 / tcp
1094048410 | 2025-03-16T22:20:14.395924
36022 / tcp
411540654 | 2025-03-17T21:41:59.917832
36222 / tcp
411540654 | 2025-03-17T19:31:15.243829
36422 / tcp
1094048410 | 2025-03-15T08:31:24.662412
36501 / tcp
-98713449 | 2025-03-22T20:58:33.632848
36505 / tcp
-98713449 | 2025-03-22T01:13:28.355099
36522 / tcp
411540654 | 2025-02-28T21:04:30.677530
36622 / tcp
411540654 | 2025-03-16T07:44:29.181146
36722 / tcp
411540654 | 2025-03-17T05:49:25.714686
36922 / tcp
411540654 | 2025-03-18T13:20:34.614538
36983 / tcp
-2031469209 | 2025-03-23T00:38:08.597906
37022 / tcp
1094048410 | 2025-03-16T19:33:51.192369
37122 / tcp
411540654 | 2025-03-16T23:13:42.764492
37222 / tcp
1094048410 | 2025-03-14T19:37:41.684796
37322 / tcp
1094048410 | 2025-03-16T11:17:11.753755
37422 / tcp
411540654 | 2025-02-28T19:51:01.801751
37443 / tcp
-2031469209 | 2025-03-22T18:58:48.686172
37522 / tcp
411540654 | 2025-03-16T09:36:34.007386
37622 / tcp
1094048410 | 2025-03-16T03:48:10.567427
37722 / tcp
1094048410 | 2025-03-16T00:22:26.485820
37777 / tcp
-98713449 | 2025-03-26T22:33:23.987482
37822 / tcp
411540654 | 2025-03-14T01:46:31.150971
38022 / tcp
411540654 | 2025-02-27T13:16:20.081633
38080 / tcp
-98713449 | 2025-03-23T20:52:17.065124
38122 / tcp
1094048410 | 2025-03-15T17:37:37.591571
38222 / tcp
1094048410 | 2025-03-11T18:13:10.351330
38322 / tcp
411540654 | 2025-03-15T13:45:34.876176
38333 / tcp
1094048410 | 2025-03-15T21:26:11.051777
38520 / tcp
-2031469209 | 2025-03-24T04:00:13.911581
38522 / tcp
411540654 | 2025-03-14T03:20:52.739293
38622 / tcp
411540654 | 2025-02-25T22:43:07.709534
38722 / tcp
411540654 | 2025-03-14T00:00:57.274001
38822 / tcp
1094048410 | 2025-03-12T16:08:46.538721
38922 / tcp
1094048410 | 2025-03-13T15:38:48.407483
39001 / tcp
-98713449 | 2025-03-22T19:01:57.134491
39122 / tcp
1094048410 | 2025-03-13T18:52:38.687156
39222 / tcp
411540654 | 2025-03-13T17:16:57.362363
39322 / tcp
411540654 | 2025-03-11T11:25:01.425265
39522 / tcp
411540654 | 2025-03-11T09:20:09.742313
39822 / tcp
1094048410 | 2025-03-12T06:48:21.191610
39922 / tcp
411540654 | 2025-02-26T17:21:02.443921
40000 / tcp
-98713449 | 2025-03-09T18:56:55.943742
40001 / tcp
-2031469209 | 2025-03-22T11:16:11.755484
40022 / tcp
1094048410 | 2025-03-09T10:52:39.637919
40029 / tcp
-98713449 | 2025-03-24T02:10:24.112455
40070 / tcp
-98713449 | 2025-03-22T19:16:27.873383
40122 / tcp
1094048410 | 2025-02-26T14:26:45.206918
40222 / tcp
1094048410 | 2025-03-04T10:44:18.403516
40322 / tcp
1094048410 | 2025-03-08T21:40:55.971704
40471 / tcp
-2031469209 | 2025-03-22T10:32:35.647157
40522 / tcp
1094048410 | 2025-03-04T07:12:54.016167
40622 / tcp
411540654 | 2025-02-26T12:10:58.558019
40892 / tcp
-98713449 | 2025-03-22T21:42:32.216470
41022 / tcp
411540654 | 2025-03-08T23:01:29.938625
41122 / tcp
1094048410 | 2025-02-27T14:53:48.897352
41522 / tcp
411540654 | 2025-03-04T21:21:22.480351
41794 / tcp
411540654 | 2025-03-23T20:56:22.600385
41800 / tcp
-98713449 | 2025-03-26T23:44:03.683349
41822 / tcp
1094048410 | 2025-03-07T17:50:19.746668
42022 / tcp
1094048410 | 2025-03-04T17:42:31.102763
42122 / tcp
411540654 | 2025-03-05T03:34:06.684519
42222 / tcp
1094048410 | 2025-03-04T23:05:40.271858
42235 / tcp
-98713449 | 2025-03-23T20:31:54.151527
42420 / tcp
-2031469209 | 2025-02-28T18:31:31.498590
42422 / tcp
1094048410 | 2025-03-04T20:10:59.104758
42424 / tcp
-2031469209 | 2025-03-22T23:44:49.639580
42922 / tcp
411540654 | 2025-02-28T15:23:44.745104
43008 / tcp
-2031469209 | 2025-03-23T08:11:23.068969
43080 / tcp
-98713449 | 2025-03-23T02:05:08.210660
43200 / tcp
-2031469209 | 2025-03-23T10:34:50.364858
43322 / tcp
411540654 | 2025-02-27T21:50:45.748419
43422 / tcp
1094048410 | 2025-02-27T20:32:16.426856
43522 / tcp
1094048410 | 2025-02-27T18:26:16.567904
43622 / tcp
1094048410 | 2025-02-27T01:36:00.119551
43722 / tcp
411540654 | 2025-02-27T03:37:02.328756
43922 / tcp
1094048410 | 2025-02-26T19:03:34.520275
44022 / tcp
411540654 | 2025-02-27T08:19:10.417971
44100 / tcp
-98713449 | 2025-03-23T20:29:57.989700
44122 / tcp
411540654 | 2025-02-26T22:45:55.614269
44158 / tcp
-98713449 | 2025-03-27T01:04:06.228732
44222 / tcp
411540654 | 2025-03-10T22:40:19.555604
44300 / tcp
-98713449 | 2025-03-23T02:09:31.426615
44301 / tcp
-98713449 | 2025-03-23T06:48:03.705854
44303 / tcp
-98713449 | 2025-03-22T14:03:05.664135
44304 / tcp
-98713449 | 2025-03-23T20:38:40.646122
44305 / tcp
-2031469209 | 2025-03-23T02:19:35.695000
44306 / tcp
-98713449 | 2025-03-22T08:02:04.214446
44307 / tcp
-98713449 | 2025-03-23T20:26:06.045868
44308 / tcp
-2031469209 | 2025-03-23T11:35:49.567957
44310 / tcp
-2031469209 | 2025-03-22T03:33:28.026236
44320 / tcp
-2031469209 | 2025-03-22T17:32:54.299443
44333 / tcp
-2031469209 | 2025-03-22T17:20:06.002684
44336 / tcp
-98713449 | 2025-02-27T15:48:45.754553
44337 / tcp
-98713449 | 2025-03-23T00:23:00.831949
44340 / tcp
-2031469209 | 2025-03-23T23:11:08.149995
44341 / tcp
-98713449 | 2025-03-27T01:09:58.457782
44345 / tcp
-98713449 | 2025-03-08T18:07:16.719897
44350 / tcp
-98713449 | 2025-03-22T05:16:16.830294
44365 / tcp
-98713449 | 2025-03-23T00:26:43.975809
44399 / tcp
-2031469209 | 2025-03-11T17:46:24.433992
44410 / tcp
-98713449 | 2025-03-22T11:21:08.320082
44420 / tcp
-2031469209 | 2025-03-24T03:18:28.829906
44422 / tcp
411540654 | 2025-02-26T08:45:24.161713
44444 / tcp
-2031469209 | 2025-03-22T20:25:53.527909
44500 / tcp
-98713449 | 2025-03-27T02:34:24.862573
44510 / tcp
-98713449 | 2025-03-13T14:51:49.734091
44520 / tcp
-2031469209 | 2025-03-23T19:07:08.084988
44922 / tcp
411540654 | 2025-02-26T03:39:48.333007
45000 / tcp
-2031469209 | 2025-03-23T17:42:30.245564
45001 / tcp
-2031469209 | 2025-03-23T13:41:04.350842
45002 / tcp
-2031469209 | 2025-03-22T13:55:39.524784
45003 / tcp
-2031469209 | 2025-03-22T07:52:48.427377
45005 / tcp
-98713449 | 2025-03-23T07:45:01.649181
45039 / tcp
-98713449 | 2025-03-22T02:55:33.860669
45111 / tcp
-98713449 | 2025-03-22T06:08:00.077415
45122 / tcp
411540654 | 2025-02-25T12:50:30.009142
45222 / tcp
1094048410 | 2025-02-25T19:27:04.973307
45322 / tcp
411540654 | 2025-02-25T17:41:55.537721
45522 / tcp
1094048410 | 2025-02-25T16:15:47.324318
45667 / tcp
-98713449 | 2025-03-22T12:08:19.500737
45668 / tcp
-98713449 | 2025-03-22T14:38:21.776166
45677 / tcp
-2031469209 | 2025-03-23T01:49:42.680213
45786 / tcp
-98713449 | 2025-03-25T15:12:23.290850
45788 / tcp
-2031469209 | 2025-03-23T23:12:52.125229
45821 / tcp
-2031469209 | 2025-03-23T15:42:08.925549
45822 / tcp
411540654 | 2025-03-10T21:53:30.756160
45922 / tcp
411540654 | 2025-03-10T14:22:35.911460
46022 / tcp
1094048410 | 2025-02-25T07:40:19.688162
46122 / tcp
1094048410 | 2025-02-25T05:55:49.981590
46862 / tcp
-2031469209 | 2025-03-16T00:52:44.772970
47000 / tcp
-98713449 | 2025-03-11T18:17:35.041543
47080 / tcp
-98713449 | 2025-03-23T04:56:41.968404
47322 / tcp
1094048410 | 2025-02-25T04:11:01.840839
47522 / tcp
1094048410 | 2025-02-25T10:08:12.796204
47534 / tcp
-98713449 | 2025-03-22T16:39:45.104603
47622 / tcp
411540654 | 2025-02-25T05:27:37.713903
47808 / tcp
411540654 | 2025-03-24T04:05:17.721344
47822 / tcp
1094048410 | 2025-03-10T09:08:46.339734
47922 / tcp
1094048410 | 2025-03-10T07:23:38.491349
47984 / tcp
-2031469209 | 2025-03-22T13:07:24.574890
47990 / tcp
1094048410 | 2025-03-25T19:44:50.346129
48001 / tcp
-98713449 | 2025-03-24T23:44:40.854988
48002 / tcp
-2031469209 | 2025-03-23T21:16:53.550301
48012 / tcp
-98713449 | 2025-03-23T09:01:44.455651
48013 / tcp
-2031469209 | 2025-03-24T02:16:58.732567
48018 / tcp
-98713449 | 2025-03-23T08:38:27.153838
48019 / tcp
-98713449 | 2025-03-21T21:14:10.004967
48022 / tcp
411540654 | 2025-03-07T11:20:51.977100
48100 / tcp
-2031469209 | 2025-03-22T05:51:33.782443
48222 / tcp
411540654 | 2025-03-10T03:57:10.156481
48322 / tcp
411540654 | 2025-03-10T02:52:54.928770
48422 / tcp
411540654 | 2025-03-10T00:29:37.011672
48522 / tcp
411540654 | 2025-03-09T22:45:30.829967
48899 / tcp
411540654 | 2025-03-22T05:42:25.806712
49080 / tcp
-98713449 | 2025-03-23T20:58:48.274807
49121 / tcp
-2031469209 | 2025-03-22T04:46:39.678935
49152 / tcp
-98713449 | 2025-03-26T16:48:12.955797
49153 / tcp
448794242 | 2025-03-22T13:25:33.595141
49200 / tcp
-2031469209 | 2025-03-06T09:59:47.678180
49443 / tcp
-98713449 | 2025-03-25T15:20:34.422007
49502 / tcp
-2031469209 | 2025-03-23T19:43:21.665632
49592 / tcp
-98713449 | 2025-03-24T04:01:08.601402
49682 / tcp
-2031469209 | 2025-03-25T16:32:07.818425
49684 / tcp
-98713449 | 2025-03-23T15:27:18.525960
49686 / tcp
-2031469209 | 2025-03-22T11:27:10.696107
49688 / tcp
-98713449 | 2025-03-24T22:29:33.238491
49690 / tcp
-98713449 | 2025-03-23T02:37:44.822489
49692 / tcp
-98713449 | 2025-03-23T19:06:23.804653
49694 / tcp
-2031469209 | 2025-03-23T01:28:17.336893
49767 / tcp
-2031469209 | 2025-03-22T01:55:55.271950
50000 / tcp
-2031469209 | 2025-03-26T12:04:35.454736
50002 / tcp
-2031469209 | 2025-03-22T18:06:15.458305
50003 / tcp
-2031469209 | 2025-03-23T22:18:21.137915
50005 / tcp
-98713449 | 2025-03-22T14:10:24.718585
50006 / tcp
-98713449 | 2025-03-13T16:41:41.324933
50007 / tcp
-2031469209 | 2025-03-22T02:27:13.724263
50008 / tcp
-2031469209 | 2025-03-23T12:07:07.882096
50010 / tcp
-2031469209 | 2025-03-23T03:00:02.509863
50012 / tcp
-98713449 | 2025-03-23T20:53:54.588684
50013 / tcp
-98713449 | 2025-03-23T16:42:56.773838
50014 / tcp
-98713449 | 2025-03-23T03:54:01.435458
50022 / tcp
-98713449 | 2025-03-22T23:39:48.880598
50042 / tcp
-98713449 | 2025-03-22T03:37:51.527304
50050 / tcp
-98713449 | 2025-03-26T20:30:40.523762
50070 / tcp
-1843295204 | 2025-03-26T09:29:49.615044
50073 / tcp
-98713449 | 2025-03-22T06:15:36.872296
50080 / tcp
-98713449 | 2025-03-07T06:27:13.164641
50100 / tcp
-98713449 | 2025-03-26T19:50:14.328009
50101 / tcp
-2031469209 | 2025-03-22T20:21:48.796661
50106 / tcp
-2031469209 | 2025-03-22T06:46:05.853689
50107 / tcp
-98713449 | 2025-03-11T11:31:06.043795
50113 / tcp
-98713449 | 2025-03-22T01:43:26.730372
50122 / tcp
-98713449 | 2025-03-23T19:05:11.231390
50160 / tcp
-98713449 | 2025-03-23T17:48:12.664768
50202 / tcp
-98713449 | 2025-03-22T03:23:08.931162
50443 / tcp
-98713449 | 2025-03-15T01:09:31.560152
50500 / tcp
-2031469209 | 2025-03-23T17:00:08.707591
50580 / tcp
-98713449 | 2025-03-22T01:29:54.733379
50777 / tcp
-98713449 | 2025-03-22T03:46:16.074924
50995 / tcp
-2031469209 | 2025-03-22T20:16:56.780962
50996 / tcp
-98713449 | 2025-03-23T15:59:18.904380
50997 / tcp
-98713449 | 2025-03-22T04:54:12.701960
50998 / tcp
-98713449 | 2025-03-23T21:41:00.919439
51007 / tcp
-98713449 | 2025-03-22T08:48:13.168594
51106 / tcp
-2031469209 | 2025-03-26T21:02:25.828403
51200 / tcp
-2031469209 | 2025-03-23T06:06:06.654456
51235 / tcp
-98713449 | 2025-03-26T12:22:50.504251
51434 / tcp
-2031469209 | 2025-03-23T07:08:32.130280
51443 / tcp
1094048410 | 2025-03-12T04:16:03.227047
52010 / tcp
-2031469209 | 2025-03-23T09:35:08.647856
52022 / tcp
1094048410 | 2025-03-07T02:27:26.213094
52200 / tcp
-2031469209 | 2025-03-23T17:40:59.590451
52230 / tcp
-98713449 | 2025-03-07T06:38:36.718463
52311 / tcp
-98713449 | 2025-03-26T02:01:56.514684
52536 / tcp
-98713449 | 2025-03-23T12:36:33.895123
52869 / tcp
-2031469209 | 2025-03-26T04:22:02.635517
52881 / tcp
-98713449 | 2025-02-27T20:49:07.747000
52931 / tcp
-2031469209 | 2025-03-22T22:02:19.552476
52951 / tcp
-98713449 | 2025-03-24T00:38:35.760132
53022 / tcp
411540654 | 2025-03-07T07:35:06.189788
53413 / tcp
411540654 | 2025-03-22T02:10:26.887015
53413 / udp
-1959516545 | 2025-03-11T10:26:41.929478
53482 / tcp
-2031469209 | 2025-03-22T03:56:23.968689
53485 / tcp
-98713449 | 2025-03-08T17:53:42.172847
53806 / tcp
-98713449 | 2025-03-23T13:08:32.931561
54022 / tcp
-98713449 | 2025-03-04T17:20:09.838082
54138 / tcp
-2031469209 | 2025-03-26T08:13:44.837774
54327 / tcp
-2031469209 | 2025-03-24T02:12:56.593838
54490 / tcp
-2031469209 | 2025-03-23T09:10:36.377628
54545 / tcp
-2031469209 | 2025-03-08T19:07:46.992363
54922 / tcp
411540654 | 2025-03-07T09:15:57.883909
54984 / tcp
411540654 | 2025-03-21T07:08:31.324191
55000 / tcp
-98713449 | 2025-03-27T01:36:54.389942
55055 / tcp
-98713449 | 2025-03-22T14:44:46.848913
55081 / tcp
-98713449 | 2025-03-23T17:15:02.418648
55200 / tcp
-98713449 | 2025-03-22T04:31:42.948452
55222 / tcp
1094048410 | 2025-03-07T02:26:58.114396
55350 / tcp
-2031469209 | 2025-03-23T14:19:25.042915
55422 / tcp
1094048410 | 2025-03-06T18:03:27.456976
55442 / tcp
-98713449 | 2025-03-27T03:34:16.640720
55443 / tcp
1094048410 | 2025-03-26T08:03:10.217194
55470 / tcp
-2031469209 | 2025-03-23T03:33:30.951062
55475 / tcp
-2031469209 | 2025-03-22T22:56:29.110692
55481 / tcp
-98713449 | 2025-03-23T13:39:45.978799
55490 / tcp
-2031469209 | 2025-03-23T01:20:57.490345
55522 / tcp
411540654 | 2025-03-06T23:02:11.951271
55553 / tcp
411540654 | 2025-03-26T09:44:38.107554
55554 / tcp
-98713449 | 2025-03-27T02:02:21.478722
55722 / tcp
1094048410 | 2025-03-06T19:45:48.418981
55822 / tcp
411540654 | 2025-03-06T21:17:43.995459
57022 / tcp
1094048410 | 2025-03-06T14:36:38.391008
57778 / tcp
-2031469209 | 2025-02-28T13:06:41.686687
57780 / tcp
-2031469209 | 2025-03-22T03:32:24.872898
57782 / tcp
-2031469209 | 2025-03-24T18:09:11.966484
57786 / tcp
-2031469209 | 2025-03-23T01:13:57.752121
57787 / tcp
-2031469209 | 2025-03-22T18:21:06.124307
57822 / tcp
411540654 | 2025-03-06T06:18:33.623751
58000 / tcp
-2031469209 | 2025-03-22T16:27:52.619768
58122 / tcp
1094048410 | 2025-03-06T02:51:37.914027
58222 / tcp
1094048410 | 2025-03-06T01:41:31.875437
58322 / tcp
1094048410 | 2025-03-05T23:22:01.160435
58378 / tcp
-2031469209 | 2025-03-24T01:26:37.920520
58422 / tcp
411540654 | 2025-03-05T21:38:13.196909
58522 / tcp
411540654 | 2025-03-05T20:19:56.996959
58532 / tcp
-98713449 | 2025-03-23T15:53:33.874917
58603 / tcp
-2031469209 | 2025-03-23T04:15:46.218815
58822 / tcp
1094048410 | 2025-03-05T16:28:14.225659
58922 / tcp
411540654 | 2025-03-05T16:30:11.876270
59012 / tcp
-98713449 | 2025-03-13T22:47:07.677274
59022 / tcp
411540654 | 2025-03-05T13:01:53.946243
59122 / tcp
411540654 | 2025-03-05T11:18:57.440731
59222 / tcp
1094048410 | 2025-03-05T09:36:00.714420
59322 / tcp
1094048410 | 2025-03-05T07:50:27.946129
59522 / tcp
1094048410 | 2025-03-03T18:46:12.071318
60000 / tcp
-98713449 | 2025-03-22T14:47:21.774477
60001 / tcp
-2031469209 | 2025-03-26T04:56:19.078216
60010 / tcp
-2031469209 | 2025-03-27T03:19:47.908182
60021 / tcp
-2031469209 | 2025-03-23T08:08:26.082869
60030 / tcp
-98713449 | 2025-03-26T10:51:47.276862
60099 / tcp
-2031469209 | 2025-03-22T06:12:25.290842
61234 / tcp
-98713449 | 2025-03-23T21:36:41.999732
61613 / tcp
-2031469209 | 2025-03-26T05:09:27.037171
61616 / tcp
-98713449 | 2025-03-26T18:42:34.389749
61617 / tcp
-98713449 | 2025-03-24T03:08:15.447791
61619 / tcp
-2031469209 | 2025-03-23T00:49:49.382377
62078 / tcp
-98713449 | 2025-03-26T12:08:32.910496
62080 / tcp
-2031469209 | 2025-03-23T11:13:56.793284
62865 / tcp
-98713449 | 2025-03-23T05:18:14.176525
63210 / tcp
-98713449 | 2025-03-26T22:43:45.294391
63256 / tcp
-98713449 | 2025-03-26T08:40:01.548326
63260 / tcp
-98713449 | 2025-03-25T23:42:41.180128
63443 / tcp
-98713449 | 2025-03-22T04:57:02.954194
63676 / tcp
-2031469209 | 2025-03-22T05:12:48.248904
64477 / tcp
-2031469209 | 2025-03-24T21:02:54.797182
64671 / tcp
-98713449 | 2025-03-24T00:02:18.892062
64683 / tcp
-2031469209 | 2025-03-23T13:37:17.719789
65000 / tcp
-98713449 | 2025-03-23T23:49:11.964133
65432 / tcp
695566046 | 2025-03-22T19:06:18.464434



Contact Us

Shodan ® - All rights reserved