138.201.130.33

Regular View Raw Data Timeline
Last Seen: 2025-03-21

GeneralInformation

Hostnames mail.trustcrypt.com
Domains trustcrypt.com 
Country Germany
City Falkenstein
Organization Hetzner Online GmbH
ISP Hetzner Online GmbH
ASN AS24940

WebTechnologies

JavaScript libraries
Miscellaneous
Programming languages
UI frameworks
Web frameworks
Webmail

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(2)
CVE-2025-26466
5.9A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2024(17)
CVE-2024-40898
7.5SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue. 
CVE-2024-38477
7.5null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CVE-2024-38476
9.8Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CVE-2024-38474
9.8Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI. Users are recommended to upgrade to version 2.4.60, which fixes this issue. Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.
CVE-2024-27316
7.5HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
CVE-2024-25117
6.8php-svg-lib is a scalable vector graphics (SVG) file parsing/rendering library. Prior to version 0.5.2, php-svg-lib fails to validate that font-family doesn't contain a PHAR url, which might leads to RCE on PHP < 8.0, and doesn't validate if external references are allowed. This might leads to bypass of restrictions or RCE on projects that are using it, if they do not strictly revalidate the fontName that is passed by php-svg-lib. The `Style::fromAttributes(`), or the `Style::parseCssStyle()` should check the content of the `font-family` and prevents it to use a PHAR url, to avoid passing an invalid and dangerous `fontName` value to other libraries. The same check as done in the `Style::fromStyleSheets` might be reused. Libraries using this library as a dependency might be vulnerable to some bypass of restrictions, or even remote code execution, if they do not double check the value of the `fontName` that is passed by php-svg-lib. Version 0.5.2 contains a fix for this issue.
CVE-2024-22201
7.5Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6.
CVE-2024-11236
9.8In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write.
CVE-2024-11234
4.8In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
CVE-2024-11233
4.8In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.
CVE-2024-8184
5.9There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory.
CVE-2024-6763
3.7Eclipse Jetty is a lightweight, highly scalable, Java-based web server and Servlet engine . It includes a utility class, HttpURI, for URI/URL parsing. The HttpURI class does insufficient validation on the authority segment of a URI. However the behaviour of HttpURI differs from the common browsers in how it handles a URI that would be considered invalid if fully validated against the RRC. Specifically HttpURI and the browser may differ on the value of the host extracted from an invalid URI and thus a combination of Jetty and a vulnerable browser may be vulnerable to a open redirect attack or to a SSRF attack if the URI is used after passing validation checks.
CVE-2024-6387
8.1A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
CVE-2024-5585
7.7In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
CVE-2024-5458
5.3In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
CVE-2024-4577
9.8In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
CVE-2024-2408
5.9The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable. PHP Windows builds for the versions 8.1.29, 8.2.20 and 8.3.8 and above include OpenSSL patches that fix the vulnerability.
2023(18)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51766
5.3Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-44487
7.5The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2023-40167
5.3Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
CVE-2023-36479
3.5Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2.
CVE-2023-36478
7.5Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to exceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295 will overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), and this length value is a very large positive number when multiplied by 2, then the user can cause a very large buffer to be allocated on the server. Users of HTTP/2 can be impacted by a remote denial of service attack. The issue has been fixed in versions 11.0.16, 10.0.16, and 9.4.53. There are no known workarounds.
CVE-2023-31122
7.5Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.
CVE-2023-26049
2.4Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue.
CVE-2023-26048
5.3Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).
CVE-2023-3824
9.4In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
CVE-2023-3823
8.6In PHP versions 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8 various XML functions rely on libxml global state to track configuration variables, like whether external entities are loaded. This state is assumed to be unchanged unless the user explicitly changes it by calling appropriate function. However, since the state is process-global, other modules - such as ImageMagick - may also use this library within the same process, and change that global state for their internal purposes, and leave it in a state where external entities loading is enabled. This can lead to the situation where external XML is parsed with external entities loaded, which can lead to disclosure of any local files accessible to PHP. This vulnerable state may persist in the same process across many requests, until the process is shut down.
CVE-2023-3247
2.6In PHP versions 8.0.* before 8.0.29, 8.1.* before 8.1.20, 8.2.* before 8.2.7 when using SOAP HTTP Digest Authentication, random value generator was not checked for failure, and was using narrower range of values than it should have. In case of random generator failure, it could lead to a disclosure of 31 bits of uninitialized memory from the client to the server, and it also made easier to a malicious server to guess the client's nonce. 
CVE-2023-0662
7.5In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space.
CVE-2023-0568
7.5In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.
CVE-2023-0567
7.7In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid. 
2022(21)
CVE-2022-37454
9.8The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.
CVE-2022-37452
9.8Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVE-2022-37451
7.5Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
CVE-2022-37436
5.3Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
CVE-2022-31813
9.8Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
CVE-2022-31630
6.5In PHP versions prior to 7.4.33, 8.0.25 and 8.1.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information. 
CVE-2022-31629
6.5In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
CVE-2022-31628
2.3In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
CVE-2022-31626
7.5In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.
CVE-2022-31625
8.1In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.
CVE-2022-30556
7.5Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
CVE-2022-29404
7.5In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
CVE-2022-28615
9.1Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
CVE-2022-28614
5.3The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
CVE-2022-28330
5.3Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module.
CVE-2022-22721
9.1If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-22720
9.8Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling
CVE-2022-22719
7.5A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-4900
6.2A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.
CVE-2022-2048
7.5In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
CVE-2022-2047
2.7In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario.
2021(17)
CVE-2021-44790
9.8A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
CVE-2021-40438
9.0A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVE-2021-39275
9.8ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVE-2021-38371
7.5The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
CVE-2021-34798
7.5Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVE-2021-34428
2.9For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
CVE-2021-32792
3.1mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, there is an XSS vulnerability in when using `OIDCPreservePost On`.
CVE-2021-32791
5.9mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.
CVE-2021-32786
4.7mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression.
CVE-2021-32785
5.3mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it again and lead to an uncontrolled format string bug. Initial assessment shows that this bug does not appear to allow gaining arbitrary code execution, but can reliably provoke a denial of service by repeatedly crashing the Apache workers. This bug has been corrected in version 2.4.9 by performing argument interpolation only once, using the `hiredis` API. As a workaround, this vulnerability can be mitigated by setting `OIDCCacheEncrypt` to `on`, as cache keys are cryptographically hashed before use when this option is enabled.
CVE-2021-28169
5.3For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
CVE-2021-28165
7.5In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
CVE-2021-27216
6.3Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options.
CVE-2021-23017
7.7A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVE-2021-21708
8.2In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This issue affects: code that uses FILTER_VALIDATE_FLOAT with min/max limits.
CVE-2021-3618
7.4ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
2020(37)
CVE-2020-28026
9.8Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.
CVE-2020-28025
7.5Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory.
CVE-2020-28024
9.8Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.
CVE-2020-28023
7.5Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.
CVE-2020-28022
9.8Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.
CVE-2020-28021
8.8Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.
CVE-2020-28019
7.5Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA.
CVE-2020-28018
9.8Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL.
CVE-2020-28017
9.8Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.
CVE-2020-28016
7.8Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because "-F ''" is mishandled by parse_fix_phrase.
CVE-2020-28015
7.8Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.
CVE-2020-28014
6.1Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.
CVE-2020-28013
7.8Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles "-F '.('" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.
CVE-2020-28012
7.8Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.
CVE-2020-28011
7.8Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.
CVE-2020-28010
7.8Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).
CVE-2020-28009
7.8Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).
CVE-2020-28008
7.8Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
CVE-2020-28007
7.8Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
CVE-2020-27223
5.3In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.
CVE-2020-27218
4.8In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
CVE-2020-27216
7.0In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-11579
7.5An issue was discovered in Chadha PHPKB 9.0 Enterprise Edition. installer/test-connection.php (part of the installation process) allows a remote unauthenticated attacker to disclose local files on hosts running PHP before 7.2.16, or on hosts where the MySQL ALLOW LOCAL DATA INFILE option is enabled.
CVE-2020-11023
6.9In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022
6.9In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-7070
4.3In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
CVE-2020-7069
5.4In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.
CVE-2020-7068
4.8In PHP versions 7.2.x below 7.2.33, 7.3.x below 7.3.21 and 7.4.x below 7.4.9, while processing PHAR files using phar extension, phar_parse_zipfile could be tricked into accessing freed memory, which could lead to a crash or information disclosure.
CVE-2020-7067
7.5In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
CVE-2020-7066
5.3In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server.
CVE-2020-7064
6.5In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.
CVE-2020-7063
5.5In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on the filesystem were with more restrictive permissions. This may result in files having more lax permissions than intended when such archive is extracted.
CVE-2020-7062
7.5In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.
CVE-2020-7061
6.5In PHP versions 7.3.x below 7.3.15 and 7.4.x below 7.4.3, while extracting PHAR files on Windows using phar extension, certain content inside PHAR file could lead to one-byte read past the allocated buffer. This could potentially lead to information disclosure or crash.
CVE-2020-7060
6.5When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
CVE-2020-7059
6.5When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
2019(31)
CVE-2019-20372
5.3NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
CVE-2019-13224
9.8A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
CVE-2019-11050
4.8When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
CVE-2019-11048
5.3In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
CVE-2019-11047
4.8When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
CVE-2019-11046
3.7In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
CVE-2019-11045
3.7In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
CVE-2019-11044
3.7In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
CVE-2019-11043
8.7In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
CVE-2019-11042
4.8When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
CVE-2019-11041
4.8When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
CVE-2019-11040
4.8When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
CVE-2019-11039
4.2Function iconv_mime_decode_headers() in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 may perform out-of-buffer read due to integer overflow when parsing MIME headers. This may lead to information disclosure or crash.
CVE-2019-11038
3.1When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.
CVE-2019-11036
4.8When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.29, 7.2.x below 7.2.18 and 7.3.x below 7.3.5 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
CVE-2019-11035
4.8When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
CVE-2019-11034
4.8When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.
CVE-2019-9641
9.8An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.
CVE-2019-9640
7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an Invalid Read in exif_process_SOFn.
CVE-2019-9639
7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.
CVE-2019-9638
7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len.
CVE-2019-9637
7.5An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
CVE-2019-9024
7.5An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.
CVE-2019-9023
9.8An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.
CVE-2019-9022
7.5An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.
CVE-2019-9021
9.8An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.
CVE-2019-9020
9.8An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.
CVE-2019-6977
8.8gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(9)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-19935
7.5ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.
CVE-2018-19396
7.5ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
CVE-2018-19395
7.5ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
CVE-2018-16845
8.2nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2018-1303
7.5A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.
CVE-2018-1302
5.9When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.
CVE-2018-1301
5.9A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
2017(12)
CVE-2017-20005
9.8NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module.
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2017-9798
7.5Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
CVE-2017-9788
9.1In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
CVE-2017-9118
7.5PHP 7.1.5 has an Out of bounds access in php_pcre_replace_impl via a crafted preg_replace call.
CVE-2017-8923
9.8The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
CVE-2017-7963
7.5The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating "There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.
CVE-2017-7679
9.8In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
CVE-2017-7529
7.5Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
CVE-2017-7272
7.4PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
CVE-2017-3169
9.8In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
CVE-2017-3167
9.8In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
2016(16)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-8743
7.5Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
CVE-2016-8612
4.3Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process.
CVE-2016-5387
8.1The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
CVE-2016-4975
6.1Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).
CVE-2016-4450
7.5os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-1247
7.8The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.
CVE-2016-0747
5.3The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.
CVE-2016-0746
9.8Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.
CVE-2016-0742
7.5The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.
2015(7)
CVE-2015-9253
6.5An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
CVE-2015-3183
5.0The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
CVE-2015-0228
5.0The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.
2014(11)
CVE-2014-4078
5.1The IP Security feature in Microsoft Internet Information Services (IIS) 8.0 and 8.5 does not properly process wildcard allow and deny rules for domains within the "IP Address and Domain Restrictions" list, which makes it easier for remote attackers to bypass an intended rule set via an HTTP request, aka "IIS Security Feature Bypass Vulnerability."
CVE-2014-3616
4.3nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct "virtual host confusion" attacks.
CVE-2014-3556
6.8The STARTTLS implementation in mail/ngx_mail_smtp_handler.c in the SMTP proxy in nginx 1.5.x and 1.6.x before 1.6.1 and 1.7.x before 1.7.4 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
CVE-2014-0231
5.0The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
CVE-2014-0226
6.8Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
CVE-2014-0133
7.5Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.
CVE-2014-0118
4.3The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
CVE-2014-0098
5.0The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
2013(12)
CVE-2013-6438
5.0The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.
CVE-2013-5704
5.0The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."
CVE-2013-4547
7.5nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.
CVE-2013-4365
7.5Heap-based buffer overflow in the fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.9 for the Apache HTTP Server allows remote attackers to have an unspecified impact via unknown vectors.
CVE-2013-2765
5.0The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2013-2070
5.8http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
CVE-2013-1896
4.3mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
CVE-2013-1862
5.1mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
CVE-2013-0942
4.3Cross-site scripting (XSS) vulnerability in EMC RSA Authentication Agent 7.1 before 7.1.1 for Web for Internet Information Services, and 7.1 before 7.1.1 for Web for Apache, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2013-0941
2.1EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
CVE-2013-0337
7.5The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
2012(14)
CVE-2012-4558
4.3Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
CVE-2012-4557
5.0The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
CVE-2012-4360
4.3Cross-site scripting (XSS) vulnerability in the mod_pagespeed module 0.10.19.1 through 0.10.22.4 for the Apache HTTP Server allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2012-4001
5.0The mod_pagespeed module before 0.10.22.6 for the Apache HTTP Server does not properly verify its host name, which allows remote attackers to trigger HTTP requests to arbitrary hosts via unspecified vectors, as demonstrated by requests to intranet servers.
CVE-2012-3526
5.0The reverse proxy add forward module (mod_rpaf) 0.5 and 0.6 for the Apache HTTP Server allows remote attackers to cause a denial of service (server or application crash) via multiple X-Forwarded-For headers in a request.
CVE-2012-3499
4.3Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
CVE-2012-2687
2.6Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
CVE-2012-2284
2.1The (1) install and (2) upgrade processes in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375, when Exchange Server is used, allow local users to read cleartext administrator credentials via unspecified vectors.
CVE-2012-2089
6.8Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
CVE-2012-1180
5.0Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
CVE-2012-0883
6.9envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
CVE-2012-0053
4.3protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
CVE-2012-0031
4.6scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
2011(16)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4968
4.8nginx http proxy module does not verify peer identity of https origin server which could facilitate man-in-the-middle attack (MITM)
CVE-2011-4963
5.0nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
CVE-2011-4415
1.2The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the "len +=" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
CVE-2011-4317
4.3The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
CVE-2011-4315
6.8Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
CVE-2011-3639
4.3The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
CVE-2011-3607
4.4Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
CVE-2011-3368
5.0The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
CVE-2011-3348
4.3The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request.
CVE-2011-3192
7.8The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
CVE-2011-2688
7.5SQL injection vulnerability in mysql/mysql-auth.pl in the mod_authnz_external module 3.2.5 and earlier for the Apache HTTP Server allows remote attackers to execute arbitrary SQL commands via the user field.
CVE-2011-1176
4.3The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
CVE-2011-0419
4.3Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
CVE-2011-0290
6.5The BlackBerry Collaboration Service in Research In Motion (RIM) BlackBerry Enterprise Server (BES) 5.0.3 through MR4 for Microsoft Exchange and Lotus Domino allows remote authenticated users to log into arbitrary user accounts associated with the same organization, and send messages, read messages, read contact lists, or cause a denial of service (login unavailability), via unspecified vectors.
2010(8)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
CVE-2010-2068
5.0mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
CVE-2010-1623
5.0Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
CVE-2010-1452
5.0The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
CVE-2010-0025
5.0The SMTP component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Server 2008 Gold, SP2, and R2, and Exchange Server 2000 SP3, does not properly allocate memory for SMTP command replies, which allows remote attackers to read fragments of e-mail messages by sending a series of invalid commands and then sending a STARTTLS command, aka "SMTP Memory Allocation Vulnerability."
CVE-2010-0024
5.0The SMTP component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Server 2008 Gold, SP2, and R2, and Exchange Server 2003 SP2, does not properly parse MX records, which allows remote DNS servers to cause a denial of service (service outage) via a crafted response to a DNS MX record query, aka "SMTP Server MX Record Vulnerability."
2009(7)
CVE-2009-3720
5.0The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
CVE-2009-3560
5.0The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
CVE-2009-2299
5.0The Artofdefence Hyperguard Web Application Firewall (WAF) module before 2.5.5-11635, 3.0 before 3.0.3-11636, and 3.1 before 3.1.1-11637, a module for the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via an HTTP request with a large Content-Length value but no POST data.
CVE-2009-1491
9.3McAfee GroupShield for Microsoft Exchange on Exchange Server 2000, and possibly other anti-virus or anti-spam products from McAfee or other vendors, does not scan X- headers for malicious content, which allows remote attackers to bypass virus detection via a crafted message, as demonstrated by a message with an X-Testing header and no message body.
CVE-2009-0796
2.6Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.
CVE-2009-0099
5.0The Electronic Messaging System Microsoft Data Base (EMSMDB32) provider in Microsoft Exchange 2000 Server SP3 and Exchange Server 2003 SP2, as used in Exchange System Attendant, allows remote attackers to cause a denial of service (application outage) via a malformed MAPI command, aka "Literal Processing Vulnerability."
CVE-2009-0098
9.3Microsoft Exchange 2000 Server SP3, Exchange Server 2003 SP2, and Exchange Server 2007 SP1 do not properly interpret Transport Neutral Encapsulation (TNEF) properties, which allows remote attackers to execute arbitrary code via a crafted TNEF message, aka "Memory Corruption Vulnerability."
2008(4)
CVE-2008-4109
5.0A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
CVE-2008-3259
1.2OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.
CVE-2008-0455
4.3Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
2007(9)
CVE-2007-4752
7.5ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
CVE-2007-4723
7.5Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page.
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.
CVE-2007-2243
5.0OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.
CVE-2007-0221
7.8Integer overflow in the IMAP (IMAP4) support in Microsoft Exchange Server 2000 SP3 allows remote attackers to cause a denial of service (service hang) via crafted literals in an IMAP command, aka the "IMAP Literal Processing Vulnerability."
CVE-2007-0220
6.8Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2000 SP3, and 2003 SP1 and SP2 allows remote attackers to execute arbitrary scripts, spoof content, or obtain sensitive information via certain UTF-encoded, script-based e-mail attachments, involving an "incorrectly handled UTF character set label".
CVE-2007-0213
10Microsoft Exchange Server 2000 SP3, 2003 SP1 and SP2, and 2007 does not properly decode certain MIME encoded e-mails, which allows remote attackers to execute arbitrary code via a crafted base64-encoded MIME e-mail message.
CVE-2007-0039
7.8The Exchange Collaboration Data Objects (EXCDO) functionality in Microsoft Exchange Server 2000 SP3, 2003 SP1 and SP2, and 2007 allows remote attackers to cause a denial of service (crash) via an Internet Calendar (iCal) file containing multiple X-MICROSOFT-CDO-MODPROPS (MODPROPS) properties in which the second MODPROPS is longer than the first, which triggers a NULL pointer dereference and an unhandled exception.
2006(9)
CVE-2006-20001
7.5A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier.
CVE-2006-5794
7.5Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.
CVE-2006-5052
5.0Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
CVE-2006-5051
8.1Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
CVE-2006-4924
7.8sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
CVE-2006-1193
2.6Cross-site scripting (XSS) vulnerability in Microsoft Exchange Server 2000 SP1 through SP3, when running Outlook Web Access (OWA), allows user-assisted remote attackers to inject arbitrary HTML or web script via unknown vectors related to "HTML parsing."
CVE-2006-0225
4.6scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
CVE-2006-0027
7.5Unspecified vulnerability in Microsoft Exchange allows remote attackers to execute arbitrary code via e-mail messages with crafted (1) vCal or (2) iCal Calendar properties.
CVE-2006-0002
7.5Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation.
2005(4)
CVE-2005-2798
5.0sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.
CVE-2005-2666
1.2SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate a list of additional targets that are more likely to have the same password or key.
CVE-2005-1987
7.5Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string.
CVE-2005-0560
7.5Heap-based buffer overflow in the SvrAppendReceivedChunk function in xlsasink.dll in the SMTP service of Exchange Server 2000 and 2003 allows remote attackers to execute arbitrary code via a crafted X-LINK2STATE extended verb request to the SMTP port.
2004(3)
CVE-2004-2760
6.8sshd in OpenSSH 3.5p1, when PermitRootLogin is disabled, immediately closes the TCP connection after a root login attempt with the correct password, but leaves the connection open after an attempt with an incorrect password, which makes it easier for remote attackers to guess the password by observing the connection state, a different vulnerability than CVE-2003-0190. NOTE: it could be argued that in most environments, this does not cross privilege boundaries without requiring leverage of a separate vulnerability.
CVE-2004-1653
6.4The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.
CVE-2004-0574
10The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.
2003(6)
CVE-2003-1562
7.6sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.
CVE-2003-0714
7.5The Internet Mail Service in Exchange Server 5.5 and Exchange 2000 allows remote attackers to cause a denial of service (memory exhaustion) by directly connecting to the SMTP service and sending a certain extended verb request, possibly triggering a buffer overflow in Exchange 2000.
CVE-2003-0695
7.5Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693.
CVE-2003-0693
10A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695.
CVE-2003-0682
7.5"Memory bugs" in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695.
CVE-2003-0190
5.0OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
2002(6)
CVE-2002-1876
2.1Microsoft Exchange 2000 allows remote authenticated attackers to cause a denial of service via a large number of rapid requests, which consumes all of the licenses that are granted to Exchange by IIS.
CVE-2002-1873
5.0Microsoft Exchange 2000, when used with Microsoft Remote Procedure Call (MSRPC), allows remote attackers to cause a denial of service (crash or memory consumption) via malformed MSRPC calls.
CVE-2002-0507
2.1An interaction between Microsoft Outlook Web Access (OWA) with RSA SecurID allows local users to bypass the SecurID authentication for a previous user via several submissions of an OWA Authentication request with the proper OWA password for the previous user, which is eventually accepted by OWA.
CVE-2002-0368
5.0The Store Service in Microsoft Exchange 2000 allows remote attackers to cause a denial of service (CPU consumption) via a mail message with a malformed RFC message attribute, aka "Malformed Mail Attribute can Cause Exchange 2000 to Exhaust CPU Resources."
CVE-2002-0055
5.0SMTP service in Microsoft Windows 2000, Windows XP Professional, and Exchange 2000 allows remote attackers to cause a denial of service via a command with a malformed data transfer (BDAT) request.
CVE-2002-0049
6.4Microsoft Exchange Server 2000 System Attendant gives "Everyone" group privileges to the WinReg key, which could allow remote attackers to read or modify registry keys.
2001(7)
CVE-2001-1319
5.0Microsoft Exchange 5.5 2000 allows remote attackers to cause a denial of service (hang) via exceptional BER encodings for the LDAP filter type field, as demonstrated by the PROTOS LDAPv3 test suite.
CVE-2001-1099
5.0The default configuration of Norton AntiVirus for Microsoft Exchange 2000 2.x allows remote attackers to identify the recipient's INBOX file path by sending an email with an attachment containing malicious content, which includes the path in the rejection notice.
CVE-2001-0666
2.1Outlook Web Access (OWA) in Microsoft Exchange 2000 allows an authenticated user to cause a denial of service (CPU consumption) via a malformed OWA request for a deeply nested folder within the user's mailbox.
CVE-2001-0543
5.0Memory leak in NNTP service in Windows NT 4.0 and Windows 2000 allows remote attackers to cause a denial of service (memory exhaustion) via a large number of malformed posts.
CVE-2001-0509
5.0Vulnerabilities in RPC servers in (1) Microsoft Exchange Server 2000 and earlier, (2) Microsoft SQL Server 2000 and earlier, (3) Windows NT 4.0, and (4) Windows 2000 allow remote attackers to cause a denial of service via malformed inputs.
CVE-2001-0340
7.5An interaction between the Outlook Web Access (OWA) service in Microsoft Exchange 2000 Server and Internet Explorer allows attackers to execute malicious script code against a user's mailbox via a message attachment that contains HTML code, which is executed automatically.
CVE-2001-0146
5.0IIS 5.0 and Microsoft Exchange 2000 allow remote attackers to cause a denial of service (memory allocation error) by repeatedly sending a series of specially formatted URL's.
2000(2)
CVE-2000-1139
7.5The installation of Microsoft Exchange 2000 before Rev. A creates a user account with a known password, which could allow attackers to gain privileges, aka the "Exchange User Account" vulnerability.
CVE-2000-0216
5.0Microsoft email clients in Outlook, Exchange, and Windows Messaging automatically respond to Read Receipt and Delivery Receipt tags, which could allow an attacker to flood a mail system with responses by forging a Read Receipt request that is redirected to a large distribution list.
1999(1)
CVE-1999-1322
4.6The installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext.

OpenPorts

1115171921222325263743496670808183848898102104106110111119122131135143175177179180221243264311385389427443444445447448449453461465485502503513515554587591593631636666743771789800801830873887992993994100210121022102310271080109911531167117711901200129012921293131113371344136613881400143314431447145114541471152115991604160517001723174118001801182018331883191119251926193519471950195219621964196619711976197919861988199020002002200320082018202120502052207220772079208120822083208721082109212121542156218121962220222222262250225923232332234523752376237924042480252525492552256626262628265027612762280630003001301730213049305030563058305930663068307130793084308830923102310731183125312631283135313831473149315531593165317231763177318331873192319431973256326032683269329933013306331033333341334533653388338934063408346035003541354235483551355435573566356735703580368937493780379037923793384240004001400240224040406340644085410341044117414841504155415741594242424442824321434343694402443144334434444344444459446645004502450545064524452845304567460246204664470047824786484849115000500150025005500650075009501150225025505350835105511951205201522252265231523252345246525552635265526752725274527852795321535754325433543554565495554255555556556055955596560156035606560756145620564056715672568057015800580458585900590159085911591259135915591959385985598859955996600060016002600460096020602260616081613461616308634863796405644364646488651065116512651365446560656165806603660566336653666266646666666766686697675567996887699870017010701270147015701870717082708570907105717372187272728373317401741574347441744374747480753775477603763476547657768777747775777777787779778077827801782278787980798980008001800580068008800980108014801980208024802580268027803480358045804980508057805880608063806680678069807080718074807780818082808380848085808680898090809380968097809880998101810281118112811381168119812381298135813681398140814581628165816681678168816981728179818281838188819482008203822282508252828082838285829183188333838183828385840684098414841584208423842684298431843484368443844484458447845484608462846584808484849485008501850585148540854485458554855685668567857585768577858085818582858385848591859486228649866687008705870987248728873287648779878487918806881088118814881588248830883188328834883688388848884988518853885588628865886688688872887788798880888788888891889989018906891089138935898890009001900290099017901990269030903490389039904190429044904590479051906290729080908290849086909090919092909591009101910291069109911191139118912191259127913091339134913891429143914591509151915491559158916091639165916891719172917491779180918291879191919692009201920692169218922092309244924792839289929292959299930393069307931593339350935393989400941894339441944394449454945594569465952995309553959596009633965896969704971097439761977998009811986998769898991699269930994399449955998199919998999910000100011000510011100171003110037100421005110066100711007510081100831008410086100901010110106101341018010205102101024010243102511038010399104431055410911109331093410943110001102711111111121121011211112881130011371114341148011602120001201912056120841210112107121081211812119121251212612131121331213412135121391214512155121571215912164121651217812181121861218712194121971220512207122141222012221122241222612237122411224612251122531225412262122651226612271122721227312282122871229112294122951229612298123021230412305123061230912312123181231912320123231233012331123321233312336123421234412345123461235312355123651236612367123701237712379123881238912391123941240512406124141241712419124231242912433124341243912441124441244812456124621246412471124741247912481124851249212493124941249612497124991250212506125081251012514125171252012522125261252712528125291253212533125361254112544125471255612561125631256412565125681257012576125811258312584126011300013047130841357914024140261408214084141011410414147142651433014344144001440414407144431452414825148801489614901149031503815042150841544315673160051600616009160101601116013160171602016026160301603116033160351603916041160501605216058160591606216070160741608016086160871609316095161011610216404164641660116666169921699317000170821710217771177731777617779180001800118002180081801418015180171801918029180311803218033180411804218043180511805918060180611806218068180801808118086180891809218094180971809818100181011810318105181091811018111181121820018245183681844318553188021888819000190141901519017190221908019082192221990219930199981999920000200182002020040200502008220084201062020120256204402054720880210252108221084212412124521249212502125421256212622126421265212672126821271212732127421276212772127921281212822128621287212882128921295212962129821299213002131421316213172132021322213232132821329213302135721379214002144322000220842210322107225562270523023230822318223424242452444224472248082500125004250062508425105255652578226656266572701528015280172808028443297982984230000300023000330004300073001730022300233010130110301133012030122301233022230301303033032230422304443047930522306223070130722308223089230894309223101731022311223122231322313373142231443314443152231622317223182231922320013210132122322023222232322324003242232522326223276432800329223302233060331223322233322333893342233522336223372233822339223402234222342253432234422345223462234722348223492235000350223510035122352223524135322354223552235622357223582235922360223612236222363223642236522366223672236822369223698437022370803712237215372223732237422375223762237722377773782237922380223812238322383333852238622387223882238922390013902239122392223932239422395223962239922400004000540022400994012240222403224052240622411224122241443415224180041922420224212242222424204242242901429224322143322434224352243622437224382243922440214402244122441584422244305443204432244332443344433644337443404435044410444204442244510446224472244818450014500345006450224511145122452224532245522456224582245886459224602246122462224642246443466224686246922470004700147122472224732247422475224762247722478224792247990480014802248222483224842248522486224872248822488894892249122491524921049222493224942249501495024962249684496884969449722498224992250000500015000250022500505007350085501005010150103501045016050222504435050050622507225080550822509225100351007511065122251235512945132251422516225182251922520225212252322525225253652622528225286952931530225320053322534815352253622538065392254022541385485754922550005502255222554225544255443554705548155522555535555455622558225752257784577865778757822579225800058122582225837858392584225844358522585325872258822589225901259022591225922259322594435952260001600106003060099601026012961613616166161761619620166207862237624436321063256632576326063676642956467164683647386500065432
11 / tcp
1462867571 | 2025-03-05T08:48:13.918284
15 / tcp
1556030096 | 2025-02-22T10:52:02.831034
17 / tcp
-876214075 | 2025-02-28T22:11:22.611211
19 / tcp
-285460252 | 2025-03-18T14:10:42.816267
21 / tcp
1660469701 | 2025-03-19T15:29:12.552254
22 / tcp
1810339643 | 2025-03-05T08:10:20.713714
23 / tcp
213382690 | 2025-03-11T13:27:08.049997
25 / tcp
-2121362028 | 2025-03-17T06:35:19.080282
26 / tcp
-904840257 | 2025-02-21T18:27:03.453819
37 / tcp
914009793 | 2025-03-05T09:45:08.495754
43 / tcp
1278386636 | 2025-03-06T05:11:09.169894
49 / tcp
-1331409936 | 2025-02-24T12:27:10.020077
66 / tcp
678531619 | 2025-03-10T22:37:14.262861
70 / tcp
-1935757142 | 2025-03-20T03:13:45.874663
80 / tcp
-2100514759 | 2025-03-16T09:14:11.638682
81 / tcp
1480321210 | 2025-03-16T06:00:22.487021
83 / tcp
-2011072988 | 2025-03-19T22:03:26.128732
84 / tcp
-1127226756 | 2025-03-13T13:32:38.799457
88 / tcp
-1815934374 | 2025-03-08T17:55:57.002795
98 / tcp
1454235135 | 2025-02-28T01:48:13.872302
102 / tcp
2051248139 | 2025-03-20T00:38:27.116579
104 / tcp
425584279 | 2025-03-11T11:01:51.393064
106 / tcp
1498347618 | 2025-03-16T04:47:43.262348
110 / tcp
1098206132 | 2025-02-22T18:13:52.484908
111 / tcp
-1788683013 | 2025-03-17T03:16:46.989281
119 / tcp
133491147 | 2025-02-24T10:04:27.309141
122 / tcp
-316288925 | 2025-03-13T16:40:27.730630
131 / tcp
1937533383 | 2025-03-06T10:41:27.929070
135 / tcp
1573941981 | 2025-03-15T07:54:12.556436
143 / tcp
-1921434939 | 2025-02-26T04:59:38.545034
175 / tcp
-2019309480 | 2025-03-13T19:49:41.419401
177 / tcp
1012473660 | 2025-03-08T11:14:32.388895
179 / tcp
401077110 | 2025-03-11T04:22:00.623287
180 / tcp
-1028154585 | 2025-02-28T06:23:20.032380
221 / tcp
738169200 | 2025-03-06T22:18:49.002451
243 / tcp
-282739361 | 2025-02-28T11:56:47.708391
264 / tcp
-154572464 | 2025-03-19T12:52:23.589229
311 / tcp
1040297065 | 2025-03-04T07:42:52.981521
385 / tcp
-1305063430 | 2025-02-28T10:27:06.798238
389 / tcp
208733475 | 2025-03-19T14:33:53.996908
427 / tcp
1760490468 | 2025-03-19T09:16:46.680241
443 / tcp
-289373364 | 2025-03-16T09:14:14.112711
444 / tcp
-1577780465 | 2025-03-20T20:48:30.501889
445 / tcp
-648448470 | 2025-03-05T17:40:58.128242
447 / tcp
-2010833664 | 2025-03-14T08:58:56.247347
448 / tcp
-1624711840 | 2025-03-06T08:03:32.059220
449 / tcp
-1839186337 | 2025-03-08T16:59:35.263966
453 / tcp
1954633370 | 2025-03-13T23:55:04.959652
461 / tcp
-364366066 | 2025-03-11T16:23:36.786637
465 / tcp
-784826319 | 2025-03-12T19:42:05.169148
485 / tcp
664005349 | 2025-03-11T19:08:48.844540
502 / tcp
-666657531 | 2025-03-18T19:02:19.714198
503 / tcp
-807207506 | 2025-03-17T01:20:19.680217
513 / tcp
-1578860413 | 2025-03-15T22:12:14.125821
515 / tcp
297814652 | 2025-03-20T16:42:40.309583
554 / tcp
1251650351 | 2025-03-06T22:48:44.002387
587 / tcp
1697248845 | 2025-03-15T09:33:14.343992
591 / tcp
1852291192 | 2025-03-15T06:14:58.315481
593 / tcp
-282343207 | 2025-03-18T05:23:54.267887
631 / tcp
-1654082170 | 2025-02-27T20:36:52.065407
636 / tcp
-955637101 | 2025-03-18T07:56:50.669573
666 / tcp
-1530552937 | 2025-03-06T13:13:01.732527
743 / tcp
485072641 | 2025-02-22T00:31:53.491431
771 / tcp
-1228235958 | 2025-03-20T02:13:57.944210
789 / tcp
2069828060 | 2025-02-22T19:23:40.020131
800 / tcp
-17598698 | 2025-02-26T12:54:12.489795
801 / tcp
-1569695982 | 2025-02-22T23:32:29.242207
830 / tcp
1447701878 | 2025-03-12T07:46:10.994344
873 / tcp
1236348442 | 2025-03-15T18:18:50.722635
887 / tcp
133290813 | 2025-03-20T02:15:31.754708
992 / tcp
-366821423 | 2025-03-13T21:54:42.441307
993 / tcp
1505986360 | 2025-03-07T17:47:28.291426
994 / tcp
-953517777 | 2025-03-14T09:17:08.882355
1002 / tcp
698584421 | 2025-02-28T11:00:02.210105
1012 / tcp
1837611033 | 2025-03-15T05:13:18.101798
1022 / tcp
-1159065859 | 2025-03-16T03:59:37.238211
1023 / tcp
-1543141103 | 2025-03-20T05:16:54.990643
1027 / tcp
522523263 | 2025-03-16T12:10:57.148723
1080 / tcp
179072027 | 2025-03-13T15:54:21.150936
1099 / tcp
1828971965 | 2025-03-16T11:57:56.655705
1153 / tcp
-2112366487 | 2025-03-18T06:46:30.063922
1167 / tcp
1905947784 | 2025-02-20T09:54:43.397352
1177 / tcp
-437065005 | 2025-03-17T16:37:41.705059
1190 / tcp
-1684519692 | 2025-03-10T07:50:06.161832
1200 / tcp
-691083489 | 2025-02-26T20:22:44.509165
1290 / tcp
410296410 | 2025-02-20T16:04:37.906859
1292 / tcp
1320305565 | 2025-03-05T03:30:58.305454
1293 / tcp
1924911942 | 2025-02-25T21:54:07.835348
1311 / tcp
1724148963 | 2025-03-20T02:20:16.985980
1337 / tcp
9313021 | 2025-03-19T03:54:47.480563
1344 / tcp
-638149335 | 2025-03-16T16:24:28.413729
1366 / tcp
1284053854 | 2025-02-28T06:44:32.160100
1388 / tcp
-1921586014 | 2025-03-06T10:08:22.852593
1400 / tcp
187196993 | 2025-03-12T21:56:17.428510
1433 / tcp
-1287788390 | 2025-03-19T14:09:48.972687
1443 / tcp
1328392154 | 2025-03-19T14:05:23.814860
1447 / tcp
-1833116758 | 2025-03-03T17:28:49.028853
1451 / tcp
1941613237 | 2025-02-27T13:26:38.522470
1454 / tcp
-587553346 | 2025-03-13T07:49:16.813590
1471 / tcp
779270084 | 2025-03-07T13:55:52.512174
1521 / tcp
337687517 | 2025-03-17T00:47:56.364665
1599 / tcp
242365563 | 2025-03-18T12:04:46.831715
1604 / tcp
-1823009543 | 2025-02-24T11:57:51.857517
1605 / tcp
142172914 | 2025-02-21T11:02:11.628768
1700 / tcp
1796691818 | 2025-03-10T06:23:10.244694
1723 / tcp
1986243837 | 2025-03-12T18:46:39.642194
1741 / tcp
0 | 2025-03-18T00:25:42.228754
1800 / tcp
-885069846 | 2025-03-19T11:24:10.888574
1801 / tcp
-1873175631 | 2025-02-24T10:50:45.247423
1820 / tcp
390321399 | 2025-02-28T21:04:38.459488
1833 / tcp
-1655015471 | 2025-03-06T19:36:59.435141
1883 / tcp
-615315952 | 2025-03-13T14:34:25.058561
1911 / tcp
239493601 | 2025-03-12T00:47:03.421210
1925 / tcp
2072665442 | 2025-03-19T06:07:18.756837
1926 / tcp
-591102044 | 2025-03-20T20:44:50.584884
1935 / tcp
-772364143 | 2025-02-24T09:19:07.402549
1947 / tcp
1970225905 | 2025-02-27T05:42:59.610154
1950 / tcp
-2050625602 | 2025-02-19T05:18:02.139707
1952 / tcp
180500472 | 2025-03-06T19:34:36.792087
1962 / tcp
-453258827 | 2025-03-18T03:39:56.405566
1964 / tcp
-1241839602 | 2025-03-15T22:29:55.762191
1966 / tcp
-328344507 | 2025-03-04T09:52:26.902525
1971 / tcp
1903547516 | 2025-03-06T06:39:04.794078
1976 / tcp
475342055 | 2025-03-05T14:12:04.111655
1979 / tcp
-1864391556 | 2025-02-26T20:19:19.015545
1986 / tcp
-2118204633 | 2025-02-25T10:45:49.752500
1988 / tcp
-754961601 | 2025-03-09T11:23:01.542439
1990 / tcp
-1390625230 | 2025-02-25T05:56:19.861347
2000 / tcp
-568383054 | 2025-03-10T07:32:24.254992
2002 / tcp
755727142 | 2025-03-16T10:28:02.211800
2003 / tcp
-69556151 | 2025-03-20T03:21:43.508321
2008 / tcp
-582007014 | 2025-03-14T19:46:05.519120
2018 / tcp
626005509 | 2025-02-22T03:26:54.602617
2021 / tcp
-1551491063 | 2025-03-04T05:55:34.807925
2050 / tcp
-1235354301 | 2025-03-09T21:39:35.061909
2052 / tcp
467773324 | 2025-03-10T20:45:00.134731
2072 / tcp
500464381 | 2025-03-20T20:24:55.672243
2077 / tcp
279093742 | 2025-03-15T07:49:34.004551
2079 / tcp
-798771723 | 2025-02-26T23:47:24.496279
2081 / tcp
602478895 | 2025-03-17T08:29:28.314533
2082 / tcp
0 | 2025-03-20T23:56:01.555744
2083 / tcp
1144915964 | 2025-02-27T03:40:43.165549
2087 / tcp
306177389 | 2025-03-18T10:47:21.006661
2108 / tcp
566199014 | 2025-02-20T23:54:27.645921
2109 / tcp
-952427762 | 2025-03-19T08:59:58.050935
2121 / tcp
1450058737 | 2025-03-07T06:55:58.740195
2154 / tcp
-171701887 | 2025-03-10T04:59:56.180921
2156 / tcp
1452289187 | 2025-02-25T23:25:45.590830
2181 / tcp
727379222 | 2025-03-04T10:03:12.761678
2196 / tcp
1882103072 | 2025-02-25T17:11:27.666799
2220 / tcp
-2093870450 | 2025-03-12T13:06:48.242959
2222 / tcp
-1318748742 | 2025-03-12T09:04:07.459100
2226 / tcp
2116172512 | 2025-03-05T05:47:12.843610
2250 / tcp
-1929569358 | 2025-02-20T06:25:25.377152
2259 / tcp
842498402 | 2025-02-25T12:17:09.688325
2323 / tcp
624490350 | 2025-03-13T14:45:40.822470
2332 / tcp
-600516556 | 2025-03-18T10:12:10.238698
2345 / tcp
1312401483 | 2025-02-28T18:01:57.048045
2375 / tcp
-838246665 | 2025-03-21T03:23:10.119006
2376 / tcp
155253098 | 2025-03-20T23:59:26.822146
2379 / tcp
353832205 | 2025-03-20T23:29:45.576470
2404 / tcp
-68471258 | 2025-03-21T02:53:30.696275
2480 / tcp
-691083489 | 2025-03-08T14:55:02.059884
2525 / tcp
838266375 | 2025-02-23T04:02:10.374390
2549 / tcp
389470969 | 2025-03-18T23:21:27.228438
2552 / tcp
767725671 | 2025-02-28T15:26:39.588494
2566 / tcp
1651377842 | 2025-03-16T12:40:54.351422
2626 / tcp
-1848452761 | 2025-03-11T03:07:14.323077
2628 / tcp
1113805059 | 2025-03-20T03:45:28.011688
2650 / tcp
-952427762 | 2025-02-26T15:09:48.001539
2761 / tcp
2001606840 | 2025-03-20T17:00:27.539101
2762 / tcp
1746554105 | 2025-03-18T06:11:17.546127
2806 / tcp
-2078568652 | 2025-03-18T13:37:54.745398
3000 / tcp
2087658294 | 2025-03-20T19:26:16.333823
3001 / tcp
-1236957511 | 2025-03-17T03:32:35.701620
3017 / tcp
1937533383 | 2025-03-15T04:05:46.307900
3021 / tcp
-1980192849 | 2025-02-22T15:29:24.718373
3049 / tcp
1709637926 | 2025-02-23T05:42:33.478574
3050 / tcp
-236146157 | 2025-03-17T03:49:24.761694
3056 / tcp
2111873776 | 2025-03-04T19:47:01.716856
3058 / tcp
-21893025 | 2025-03-19T03:38:05.187337
3059 / tcp
-1549170983 | 2025-03-10T16:18:34.147832
3066 / tcp
-790663801 | 2025-03-17T08:36:07.881353
3068 / tcp
1767007782 | 2025-02-24T15:18:54.157085
3071 / tcp
863421480 | 2025-03-11T07:05:25.898047
3079 / tcp
1580255845 | 2025-03-10T18:16:16.625587
3084 / tcp
2038735693 | 2025-02-21T20:41:45.365447
3088 / tcp
87734650 | 2025-02-24T03:36:16.128920
3092 / tcp
-918185579 | 2025-03-11T19:19:59.646365
3102 / tcp
878802859 | 2025-03-11T08:54:40.451022
3107 / tcp
-419052584 | 2025-03-17T23:42:19.445212
3118 / tcp
1287102578 | 2025-03-15T02:39:29.401658
3125 / tcp
816909776 | 2025-02-20T01:45:03.349286
3126 / tcp
-1815417686 | 2025-02-26T03:47:46.450265
3128 / tcp
0 | 2025-03-13T03:07:23.291959
3135 / tcp
2093514891 | 2025-02-21T17:56:45.564132
3138 / tcp
654126964 | 2025-02-25T01:40:56.468014
3147 / tcp
-266811842 | 2025-02-19T12:19:03.853654
3149 / tcp
-1037353589 | 2025-03-12T09:36:47.290960
3155 / tcp
547869950 | 2025-03-10T21:15:46.667681
3159 / tcp
-1022693814 | 2025-02-21T05:27:30.067677
3165 / tcp
1290991894 | 2025-03-20T00:04:37.283698
3172 / tcp
1860826850 | 2025-02-20T03:21:15.888140
3176 / tcp
-979934086 | 2025-03-04T22:44:53.236707
3177 / tcp
-1123244716 | 2025-02-27T11:13:54.464745
3183 / tcp
472676153 | 2025-03-04T21:42:28.678678
3187 / tcp
1183738287 | 2025-02-25T20:03:02.740206
3192 / tcp
832487891 | 2025-03-17T16:50:33.555176
3194 / tcp
531989966 | 2025-03-08T22:27:22.932999
3197 / tcp
-1120663878 | 2025-03-04T03:52:01.371385
3256 / tcp
1637462979 | 2025-03-14T18:08:10.444774
3260 / tcp
353224339 | 2025-02-27T02:50:09.349410
3268 / tcp
72810717 | 2025-03-05T15:17:37.205145
3269 / tcp
-929673585 | 2025-03-19T23:17:04.036714
3299 / tcp
350365229 | 2025-03-08T18:58:41.539295
3301 / tcp
1178637828 | 2025-03-20T12:18:59.834872
3306 / tcp
387785020 | 2025-03-18T06:58:07.965424
3310 / tcp
-860999876 | 2025-03-20T06:40:38.422668
3333 / tcp
1892504780 | 2025-03-19T09:16:15.150158
3341 / tcp
1870441161 | 2025-02-20T13:28:09.770822
3345 / tcp
1806912042 | 2025-03-14T07:08:26.480998
3365 / tcp
-1863740742 | 2025-03-19T06:20:57.549217
3388 / tcp
959874929 | 2025-03-20T03:06:35.965796
3389 / tcp
-1468296407 | 2025-03-16T17:03:39.083343
3406 / tcp
2104618985 | 2025-03-15T20:25:26.735745
3408 / tcp
-388478909 | 2025-03-03T22:22:18.371874
3460 / tcp
1937533383 | 2025-03-14T16:15:44.643442
3500 / tcp
842003069 | 2025-03-13T06:05:08.981315
3541 / tcp
323894002 | 2025-03-15T10:55:38.014531
3542 / tcp
-38876066 | 2025-03-15T14:12:00.764525
3548 / tcp
1481254007 | 2025-03-07T08:05:24.350708
3551 / tcp
-1767421207 | 2025-03-10T15:21:04.841082
3554 / tcp
2134767855 | 2025-02-23T01:21:48.819222
3557 / tcp
-1579562109 | 2025-03-14T12:42:38.135276
3566 / tcp
1668603510 | 2025-03-16T16:10:29.482133
3567 / tcp
-1427862993 | 2025-03-04T00:07:45.416181
3570 / tcp
664127073 | 2025-03-17T16:59:46.816681
3580 / tcp
1772035302 | 2025-02-25T01:48:36.392607
3689 / tcp
1360293260 | 2025-03-11T17:12:47.851339
3749 / tcp
1066395886 | 2025-03-14T13:48:20.063103
3780 / tcp
1489217448 | 2025-03-11T21:56:53.758333
3790 / tcp
88927398 | 2025-03-05T00:29:01.785087
3792 / tcp
-1085737677 | 2025-02-23T09:30:19.584128
3793 / tcp
1753803531 | 2025-03-10T11:03:57.893665
3842 / tcp
-1361514293 | 2025-03-07T16:43:07.601848
4000 / tcp
1147040296 | 2025-03-20T07:49:29.417668
4001 / tcp
-1439635675 | 2025-03-19T07:33:44.776175
4002 / tcp
-952427762 | 2025-03-19T05:28:06.204048
4022 / tcp
-311852186 | 2025-03-18T00:27:49.814517
4040 / tcp
695456078 | 2025-03-12T23:10:41.512755
4063 / tcp
1873779079 | 2025-03-20T04:41:38.496607
4064 / tcp
-1602436431 | 2025-03-10T13:45:30.455410
4085 / tcp
1537129437 | 2025-03-08T21:22:58.276016
4103 / tcp
-2042400978 | 2025-03-18T08:34:40.989453
4104 / tcp
1138125528 | 2025-03-17T19:20:27.069744
4117 / tcp
1146667987 | 2025-03-16T14:56:57.151078
4148 / tcp
-1715885394 | 2025-03-15T07:15:57.780753
4150 / tcp
-1980192849 | 2025-03-12T15:39:10.375825
4155 / tcp
-722748509 | 2025-03-06T06:46:54.714031
4157 / tcp
-2042568182 | 2025-03-17T09:37:31.055978
4159 / tcp
450964944 | 2025-03-13T15:54:55.404294
4242 / tcp
-191080957 | 2025-03-15T06:31:48.502831
4244 / tcp
1401798993 | 2025-03-17T12:07:58.559680
4282 / tcp
1858372728 | 2025-03-20T11:58:14.940859
4321 / tcp
-2109633 | 2025-03-19T01:44:03.052378
4343 / tcp
1184479308 | 2025-03-14T03:06:11.371487
4369 / tcp
11136414 | 2025-03-14T14:46:14.764956
4402 / tcp
-247628469 | 2025-03-05T03:01:20.619662
4431 / tcp
-1530510378 | 2025-03-18T18:20:29.403565
4433 / tcp
1933326255 | 2025-03-08T18:28:52.414093
4434 / tcp
555151585 | 2025-03-21T01:34:17.414431
4443 / tcp
647148943 | 2025-03-20T08:40:06.915033
4444 / tcp
108500572 | 2025-03-20T00:05:46.496736
4459 / tcp
-260091155 | 2025-03-12T14:55:47.732253
4466 / tcp
-1146609943 | 2025-02-25T03:36:00.551319
4500 / tcp
-610002655 | 2025-03-12T22:46:36.758476
4502 / tcp
772131990 | 2025-03-16T10:31:57.007853
4505 / tcp
2088283398 | 2025-03-06T08:09:21.700799
4506 / tcp
1850393299 | 2025-03-18T14:46:31.424505
4524 / tcp
-671591029 | 2025-02-23T07:31:37.559111
4528 / tcp
1962538443 | 2025-03-19T17:36:35.429494
4530 / tcp
-169060969 | 2025-03-20T02:10:15.635993
4567 / tcp
-1938286489 | 2025-03-13T03:26:26.561099
4602 / tcp
-2061856770 | 2025-03-19T03:07:24.468590
4620 / tcp
1925776924 | 2025-02-28T22:12:46.402234
4664 / tcp
1033616153 | 2025-03-12T21:01:31.068683
4700 / tcp
-1070406648 | 2025-03-13T01:02:33.691510
4782 / tcp
-1344393306 | 2025-03-18T02:01:39.865209
4786 / tcp
-1414170234 | 2025-03-13T18:00:56.057648
4848 / tcp
-1414882941 | 2025-03-20T04:59:45.122716
4911 / tcp
526056561 | 2025-03-19T10:11:14.258197
5000 / tcp
-1696733193 | 2025-03-12T07:37:59.812234
5001 / tcp
-1163829658 | 2025-03-20T00:15:29.226845
5002 / tcp
-219440856 | 2025-03-11T09:14:18.333992
5005 / tcp
-1633968421 | 2025-03-10T14:23:37.581006
5006 / tcp
1128213326 | 2025-02-26T07:32:41.293454
5007 / tcp
-1482788422 | 2025-03-20T02:46:35.862967
5009 / tcp
1172615530 | 2025-03-09T22:16:26.509366
5011 / tcp
-1090101527 | 2025-02-27T07:23:45.720335
5022 / tcp
-106907133 | 2025-02-28T16:12:02.609362
5025 / tcp
-114866834 | 2025-03-19T02:26:22.993868
5053 / tcp
2058959817 | 2025-03-19T06:28:12.546507
5083 / tcp
-1355096342 | 2025-03-15T18:22:27.287465
5105 / tcp
-1126855669 | 2025-03-17T06:31:38.294313
5119 / tcp
561406949 | 2025-03-09T15:14:30.703001
5120 / tcp
1693286927 | 2025-02-28T02:12:43.966304
5201 / tcp
395346443 | 2025-03-19T03:56:19.865642
5222 / tcp
544927970 | 2025-03-10T10:56:06.673843
5226 / tcp
1629977402 | 2025-02-25T09:03:15.933801
5231 / tcp
1413520398 | 2025-03-13T12:17:12.736673
5232 / tcp
127331803 | 2025-02-25T19:45:08.369523
5234 / tcp
291416009 | 2025-02-28T02:49:12.511965
5246 / tcp
-1251020142 | 2025-03-04T15:47:40.576185
5255 / tcp
1251863785 | 2025-02-28T21:50:37.525232
5263 / tcp
-1344129276 | 2025-03-15T20:29:39.233824
5265 / tcp
1831536238 | 2025-03-18T15:10:15.427643
5267 / tcp
-391447541 | 2025-03-09T04:45:48.026895
5272 / tcp
1112594340 | 2025-03-18T12:10:52.923408
5274 / tcp
-571684121 | 2025-02-23T14:51:45.467478
5278 / tcp
-1736156786 | 2025-02-21T12:36:55.289243
5279 / tcp
159422154 | 2025-03-12T23:35:08.033839
5321 / tcp
1453442774 | 2025-03-14T21:50:26.060846
5357 / tcp
-85749389 | 2025-03-08T17:36:23.670985
5432 / tcp
-1568579274 | 2025-03-20T06:14:51.050656
5433 / tcp
1339956746 | 2025-02-25T08:54:31.702527
5435 / tcp
-65970618 | 2025-03-20T17:26:41.138936
5456 / tcp
-1685306099 | 2025-03-13T22:48:52.753649
5495 / tcp
-2135598208 | 2025-02-25T23:25:57.263309
5542 / tcp
634270367 | 2025-02-19T23:39:51.421282
5555 / tcp
-412057968 | 2025-03-18T17:24:49.316472
5556 / tcp
-1125475736 | 2025-03-12T22:59:20.570044
5560 / tcp
376366198 | 2025-03-20T10:53:49.981267
5595 / tcp
195120634 | 2025-02-22T09:22:38.959210
5596 / tcp
854642128 | 2025-02-21T10:46:27.429034
5601 / tcp
-1665736272 | 2025-03-18T16:44:47.582160
5603 / tcp
505586025 | 2025-03-10T08:23:33.345208
5606 / tcp
1040297065 | 2025-03-16T19:07:26.030311
5607 / tcp
-503530078 | 2025-03-14T17:51:39.315179
5614 / tcp
-2119300443 | 2025-03-19T17:40:13.980879
5620 / tcp
-308093730 | 2025-02-25T17:30:16.127646
5640 / tcp
328983986 | 2025-02-27T22:34:44.879378
5671 / tcp
461512243 | 2025-03-09T13:56:01.512370
5672 / tcp
56330755 | 2025-03-14T11:04:45.643007
5680 / tcp
-1035074514 | 2025-03-09T17:20:29.802938
5701 / tcp
1979680927 | 2025-03-11T04:30:15.167520
5800 / tcp
-1941852520 | 2025-02-25T10:37:26.266835
5804 / tcp
1126078277 | 2025-02-27T18:47:52.912566
5858 / tcp
-1684219805 | 2025-03-15T05:48:05.514125
5900 / tcp
1956466506 | 2025-03-11T18:48:08.611915
5901 / tcp
727486631 | 2025-03-20T09:42:42.545691
5908 / tcp
-654891304 | 2025-02-22T18:00:36.913270
5911 / tcp
1229503990 | 2025-02-27T04:27:28.624827
5912 / tcp
-1787750614 | 2025-03-13T17:43:51.023478
5913 / tcp
1133804112 | 2025-02-19T07:42:09.552332
5915 / tcp
-1634907339 | 2025-03-17T23:19:03.864320
5919 / tcp
1041605939 | 2025-02-26T21:57:15.211639
5938 / tcp
-463174291 | 2025-03-15T23:34:21.876732
5985 / tcp
-1541298284 | 2025-03-05T02:31:37.023876
5988 / tcp
737882224 | 2025-03-19T08:56:37.635225
5995 / tcp
-1439867508 | 2025-02-28T18:05:13.827521
5996 / tcp
-701133123 | 2025-03-08T12:15:50.296217
6000 / tcp
-21893025 | 2025-03-19T03:05:25.894466
6001 / tcp
-1111784194 | 2025-03-20T15:55:32.296385
6002 / tcp
1550869830 | 2025-03-20T07:13:01.277846
6004 / tcp
877009474 | 2025-03-15T13:18:48.775755
6009 / tcp
902056043 | 2025-02-27T15:18:14.286999
6020 / tcp
-1688098492 | 2025-03-08T22:29:19.884858
6022 / tcp
1765462133 | 2025-03-16T21:10:17.500022
6061 / tcp
1937533383 | 2025-03-11T20:17:41.647652
6081 / tcp
657724292 | 2025-03-17T13:19:30.712991
6134 / tcp
1351244142 | 2025-02-27T08:43:39.673309
6161 / tcp
583872427 | 2025-03-19T13:56:08.408130
6308 / tcp
-445513548 | 2025-02-26T06:55:11.913556
6348 / tcp
1396189777 | 2025-02-19T08:58:41.178343
6379 / tcp
-1046515880 | 2025-03-20T18:56:04.463174
6405 / tcp
-587437893 | 2025-03-19T12:56:03.495858
6443 / tcp
-1890439956 | 2025-03-17T04:48:18.454146
6464 / tcp
333347299 | 2025-03-12T12:46:56.215331
6488 / tcp
1025265216 | 2025-03-05T10:52:14.143125
6510 / tcp
-386755398 | 2025-03-04T00:45:01.652727
6511 / tcp
1582551144 | 2025-03-09T05:06:32.179523
6512 / tcp
185294582 | 2025-03-05T23:44:16.853944
6513 / tcp
457715385 | 2025-03-04T03:10:54.008325
6544 / tcp
2031440292 | 2025-02-28T19:21:47.753570
6560 / tcp
1150509408 | 2025-03-15T05:58:50.591201
6561 / tcp
1392668678 | 2025-03-11T22:28:34.507269
6580 / tcp
-580296080 | 2025-02-23T19:27:45.134490
6603 / tcp
-521281783 | 2025-02-28T01:12:46.847584
6605 / tcp
1937533383 | 2025-03-05T04:17:34.968680
6633 / tcp
-1669076414 | 2025-03-19T13:41:12.844501
6653 / tcp
-768251464 | 2025-03-19T15:12:11.238899
6662 / tcp
-968331949 | 2025-02-20T01:22:54.089524
6664 / tcp
297514177 | 2025-03-11T12:27:36.158148
6666 / tcp
570556128 | 2025-03-19T12:15:23.791913
6667 / tcp
-1994956552 | 2025-03-20T10:16:54.160234
6668 / tcp
-1270792086 | 2025-03-20T12:30:11.605213
6697 / tcp
-2017742171 | 2025-02-28T05:20:11.205823
6755 / tcp
1899350731 | 2025-02-22T04:17:16.500548
6799 / tcp
1694022521 | 2025-03-18T09:10:53.954720
6887 / tcp
-964253691 | 2025-03-10T23:56:44.541798
6998 / tcp
242253127 | 2025-02-21T06:18:48.939920
7001 / tcp
-55658266 | 2025-03-21T04:29:51.525689
7010 / tcp
280981907 | 2025-02-25T21:32:57.973331
7012 / tcp
1570991271 | 2025-03-20T03:09:20.132367
7014 / tcp
-561917951 | 2025-03-19T20:13:24.188820
7015 / tcp
-2111480351 | 2025-03-13T14:23:45.801450
7018 / tcp
-109502869 | 2025-03-12T02:45:37.575374
7071 / tcp
-1502483758 | 2025-03-21T00:47:08.652513
7082 / tcp
1341206546 | 2025-03-13T13:43:19.659815
7085 / tcp
-595995185 | 2025-02-21T00:58:10.816764
7090 / tcp
879723133 | 2025-03-13T12:41:55.197892
7105 / tcp
-316077244 | 2025-02-26T15:16:24.883747
7173 / tcp
1067678734 | 2025-03-11T10:51:08.324910
7218 / tcp
355292142 | 2025-03-17T19:10:52.218754
7272 / tcp
-1714768308 | 2025-03-16T11:57:40.390288
7283 / tcp
-1878972276 | 2025-03-03T23:40:49.316464
7331 / tcp
1818676187 | 2025-03-18T16:29:17.194991
7401 / tcp
-62884564 | 2025-02-26T05:23:47.406218
7415 / tcp
1084540362 | 2025-03-18T03:27:11.361326
7434 / tcp
-2040286933 | 2025-03-20T05:06:14.209464
7441 / tcp
1611625487 | 2025-03-17T14:21:24.825503
7443 / tcp
-1314254204 | 2025-03-19T03:00:27.602607
7474 / tcp
-1323587847 | 2025-03-16T09:21:41.812079
7480 / tcp
-470883050 | 2025-02-22T02:12:19.222588
7537 / tcp
1346133811 | 2025-03-18T21:24:27.377305
7547 / tcp
-1856932075 | 2025-03-17T01:09:12.521755
7603 / tcp
-370386462 | 2025-03-18T19:25:47.303283
7634 / tcp
-1348686960 | 2025-03-04T03:57:11.963407
7654 / tcp
-397958082 | 2025-03-16T14:23:40.242521
7657 / tcp
4303259 | 2025-03-20T13:32:48.663938
7687 / tcp
-849271078 | 2025-03-10T04:23:17.408352
7774 / tcp
-454051046 | 2025-03-18T09:43:20.338095
7775 / tcp
1733647839 | 2025-02-23T14:42:07.996634
7777 / tcp
512351148 | 2025-03-19T16:35:10.754235
7778 / tcp
1937533383 | 2025-02-25T06:47:28.962092
7779 / tcp
-934179732 | 2025-03-14T15:54:24.782543
7780 / tcp
1126078277 | 2025-03-16T14:56:14.150767
7782 / tcp
-676802845 | 2025-03-07T11:23:16.286537
7801 / tcp
-880428164 | 2025-03-13T20:02:21.888076
7822 / tcp
352536919 | 2025-03-20T20:01:11.408970
7878 / tcp
1937533383 | 2025-03-04T12:57:00.219870
7980 / tcp
1350165580 | 2025-03-09T09:09:43.085256
7989 / tcp
-15834972 | 2025-02-20T08:07:01.516235
8000 / tcp
-1247991780 | 2025-03-16T06:01:30.959566
8001 / tcp
-1721195231 | 2025-03-16T18:25:48.935045
8005 / tcp
-1580141413 | 2025-03-10T12:58:39.156665
8006 / tcp
1654403587 | 2025-03-18T14:36:57.833877
8008 / tcp
1561785104 | 2025-03-09T08:06:08.496307
8009 / tcp
-421819265 | 2025-03-20T10:38:33.065818
8010 / tcp
-1594904917 | 2025-03-17T14:24:28.759778
8014 / tcp
634812619 | 2025-02-21T21:17:39.681743
8019 / tcp
15374318 | 2025-03-19T20:18:26.857167
8020 / tcp
-1821820641 | 2025-02-26T15:12:11.566722
8024 / tcp
-131760435 | 2025-03-19T19:31:39.014262
8025 / tcp
1409986401 | 2025-02-23T02:05:56.049408
8026 / tcp
-1265998376 | 2025-03-16T00:57:19.386105
8027 / tcp
162446275 | 2025-03-05T00:36:15.382910
8034 / tcp
1969682230 | 2025-02-24T13:37:59.268453
8035 / tcp
1548876023 | 2025-03-05T21:54:35.336815
8045 / tcp
1733944626 | 2025-02-23T09:15:07.613338
8049 / tcp
611828093 | 2025-03-18T17:38:58.284893
8050 / tcp
600858649 | 2025-02-19T17:59:52.065439
8057 / tcp
-952427762 | 2025-03-10T05:28:28.319952
8058 / tcp
142614944 | 2025-03-17T19:54:11.571002
8060 / tcp
-1624608555 | 2025-02-24T10:56:40.672402
8063 / tcp
-442408479 | 2025-03-18T20:53:17.176689
8066 / tcp
-1485196338 | 2025-03-14T10:22:08.551203
8067 / tcp
-1662958097 | 2025-03-13T14:37:57.504225
8069 / tcp
439218610 | 2025-03-10T12:59:22.231274
8070 / tcp
-1166624267 | 2025-03-18T02:58:00.514778
8071 / tcp
-824051779 | 2025-03-14T17:19:44.655667
8074 / tcp
1815764236 | 2025-03-10T10:42:41.082577
8077 / tcp
-1424902398 | 2025-03-03T21:16:56.993662
8081 / tcp
-1514888371 | 2025-03-01T01:30:58.673259
8082 / tcp
1361522489 | 2025-03-16T08:26:41.906306
8083 / tcp
1249193003 | 2025-03-21T03:17:35.346745
8084 / tcp
-1671261392 | 2025-03-20T21:09:10.785103
8085 / tcp
-73466632 | 2025-03-20T10:15:14.804917
8086 / tcp
544927970 | 2025-03-09T09:30:51.193178
8089 / tcp
-56384643 | 2025-03-11T06:26:23.054855
8090 / tcp
1088676265 | 2025-03-13T07:14:33.498677
8093 / tcp
1516893957 | 2025-03-19T15:03:57.636854
8096 / tcp
-2104042532 | 2025-03-19T18:36:54.535565
8097 / tcp
1782251834 | 2025-02-25T07:49:58.393198
8098 / tcp
-1274119408 | 2025-03-13T11:16:57.213662
8099 / tcp
-2064560507 | 2025-02-23T10:01:45.954034
8101 / tcp
-2066921031 | 2025-03-19T08:04:47.013370
8102 / tcp
1471476900 | 2025-02-20T09:30:08.951518
8111 / tcp
1720773666 | 2025-03-10T10:41:39.522795
8112 / tcp
0 | 2025-03-06T10:56:51.448804
8113 / tcp
1894112338 | 2025-02-23T05:44:37.017960
8116 / tcp
1426962881 | 2025-03-06T11:42:08.479204
8119 / tcp
-49555609 | 2025-03-04T04:25:01.480985
8123 / tcp
1013867678 | 2025-02-25T20:54:42.988246
8129 / tcp
-1355900937 | 2025-03-07T18:13:05.204738
8135 / tcp
-347152224 | 2025-02-19T12:32:56.059874
8136 / tcp
-2075817272 | 2025-03-20T04:44:39.313186
8139 / tcp
1479629258 | 2025-03-14T22:28:38.916050
8140 / tcp
-1465655898 | 2025-03-20T17:57:14.259787
8145 / tcp
-947971185 | 2025-03-04T05:48:43.936373
8162 / tcp
2008690146 | 2025-03-16T22:28:45.688048
8165 / tcp
-1950223339 | 2025-02-26T21:01:18.008139
8166 / tcp
-2011497378 | 2025-02-20T20:13:30.612916
8167 / tcp
1130557778 | 2025-03-12T22:00:27.381866
8168 / tcp
1234081837 | 2025-03-16T03:21:20.036561
8169 / tcp
95160369 | 2025-03-13T11:50:15.042669
8172 / tcp
-2144201244 | 2025-03-17T11:41:56.859832
8179 / tcp
-351307294 | 2025-03-11T00:10:05.674810
8182 / tcp
200541343 | 2025-02-27T23:15:41.870287
8183 / tcp
1054991604 | 2025-03-08T18:28:29.543084
8188 / tcp
-1911915971 | 2025-02-21T17:31:10.941704
8194 / tcp
1611208602 | 2025-03-07T18:32:25.473528
8200 / tcp
-725101615 | 2025-03-15T02:44:27.474690
8203 / tcp
-1735588896 | 2025-03-09T14:51:41.262840
8222 / tcp
-1687220583 | 2025-02-25T02:02:44.932896
8250 / tcp
2120758652 | 2025-03-17T18:11:21.371256
8252 / tcp
-1409644395 | 2025-02-25T06:21:33.153743
8280 / tcp
-58036453 | 2025-03-19T03:22:06.821963
8283 / tcp
-231882590 | 2025-03-03T19:28:49.810778
8285 / tcp
1623486129 | 2025-03-13T22:37:25.516714
8291 / tcp
-1357225574 | 2025-03-06T17:16:32.436875
8318 / tcp
86014073 | 2025-02-20T17:02:12.983168
8333 / tcp
-102616371 | 2025-03-19T13:41:20.685175
8381 / tcp
812985669 | 2025-02-27T01:07:00.512903
8382 / tcp
1555349534 | 2025-02-23T13:43:41.554038
8385 / tcp
-1808488993 | 2025-03-19T06:02:06.221363
8406 / tcp
2061632856 | 2025-02-25T22:10:18.921360
8409 / tcp
-812736534 | 2025-03-09T10:20:15.223122
8414 / tcp
1949687417 | 2025-03-16T16:40:45.700654
8415 / tcp
-1785543981 | 2025-03-14T21:43:43.052836
8420 / tcp
1515239028 | 2025-02-26T14:19:03.982955
8423 / tcp
-1586260694 | 2025-02-27T00:06:27.942763
8426 / tcp
-665383353 | 2025-02-23T19:25:59.125237
8429 / tcp
-54869389 | 2025-03-13T06:18:12.413696
8431 / tcp
472411982 | 2025-03-18T09:35:37.824606
8434 / tcp
-767546059 | 2025-02-27T03:55:02.790946
8436 / tcp
578724235 | 2025-02-26T08:33:24.111234
8443 / tcp
-143982002 | 2025-03-16T17:27:20.734196
8444 / tcp
1941430554 | 2025-03-19T06:21:19.054503
8445 / tcp
-613881601 | 2025-03-12T03:42:12.086132
8447 / tcp
-1307635895 | 2025-02-25T06:31:59.780940
8454 / tcp
1937533383 | 2025-03-18T08:06:15.316344
8460 / tcp
-575555879 | 2025-03-17T19:42:32.176450
8462 / tcp
-1653961583 | 2025-03-18T09:06:50.294797
8465 / tcp
172737782 | 2025-03-10T06:51:46.077008
8480 / tcp
-1735588896 | 2025-03-14T00:06:15.959210
8484 / tcp
-720747275 | 2025-02-24T20:08:24.782830
8494 / tcp
-142233293 | 2025-02-25T12:46:06.198787
8500 / tcp
1991787250 | 2025-02-22T00:27:01.724980
8501 / tcp
1621792322 | 2025-03-14T23:43:51.213870
8505 / tcp
-271532981 | 2025-02-25T17:41:21.915769
8514 / tcp
-1526059122 | 2025-03-10T15:30:24.857295
8540 / tcp
1808176084 | 2025-03-15T03:34:25.661858
8544 / tcp
1880617276 | 2025-03-21T01:23:05.932926
8545 / tcp
-1313328186 | 2025-03-19T05:11:27.674366
8554 / tcp
-705815832 | 2025-03-17T21:51:17.101077
8556 / tcp
-160841776 | 2025-02-23T04:48:13.492028
8566 / tcp
-923269001 | 2025-03-10T09:50:25.448720
8567 / tcp
-1075960342 | 2025-03-12T16:57:49.845891
8575 / tcp
1463072693 | 2025-03-20T15:35:33.489533
8576 / tcp
-300638956 | 2025-02-26T17:06:59.096487
8577 / tcp
-1671949841 | 2025-02-27T22:34:50.937188
8580 / tcp
-2105251738 | 2025-03-09T20:03:06.752320
8581 / tcp
860309218 | 2025-03-19T18:21:11.980474
8582 / tcp
-57110679 | 2025-02-28T01:21:30.614831
8583 / tcp
-2037657836 | 2025-03-18T07:05:42.118656
8584 / tcp
197271922 | 2025-02-22T21:37:59.561742
8591 / tcp
1477411797 | 2025-03-04T00:13:49.055814
8594 / tcp
-1354710931 | 2025-03-17T09:19:38.684645
8622 / tcp
-1122121349 | 2025-02-28T05:33:03.801510
8649 / tcp
63752395 | 2025-02-22T19:40:48.924407
8666 / tcp
-140277002 | 2025-02-28T16:36:34.541749
8700 / tcp
1792893207 | 2025-03-14T13:56:59.867474
8705 / tcp
2055329010 | 2025-02-26T00:02:13.400038
8709 / tcp
1659535485 | 2025-03-04T14:50:05.478234
8724 / tcp
1907025516 | 2025-03-15T15:13:23.318947
8728 / tcp
1100572254 | 2025-02-25T19:19:44.005853
8732 / tcp
-220446281 | 2025-03-16T18:03:21.405537
8764 / tcp
-738662145 | 2025-03-20T16:26:52.889945
8779 / tcp
1386585229 | 2025-02-27T22:09:05.969758
8784 / tcp
-1734777617 | 2025-03-03T18:03:38.997364
8791 / tcp
-1791056795 | 2025-03-14T04:06:25.754554
8806 / tcp
1619734542 | 2025-03-12T20:54:04.646546
8810 / tcp
128324085 | 2025-02-25T15:18:49.034749
8811 / tcp
285010393 | 2025-03-13T22:29:21.287577
8814 / tcp
-1086984016 | 2025-02-24T20:49:18.460870
8815 / tcp
658619840 | 2025-03-12T08:26:15.960092
8824 / tcp
-1995126349 | 2025-03-04T10:10:21.790829
8830 / tcp
581646933 | 2025-02-23T17:46:27.357971
8831 / tcp
-753344630 | 2025-02-24T09:18:47.980224
8832 / tcp
-825184533 | 2025-03-20T09:48:12.260684
8834 / tcp
603660086 | 2025-03-19T10:43:13.219966
8836 / tcp
653461082 | 2025-03-10T20:17:41.589460
8838 / tcp
119531165 | 2025-03-15T10:57:38.417768
8848 / tcp
-683274724 | 2025-03-20T12:44:17.090734
8849 / tcp
-1935641148 | 2025-03-06T01:46:34.304969
8851 / tcp
2134774966 | 2025-03-19T22:57:30.892237
8853 / tcp
-1133809145 | 2025-02-20T08:05:23.725588
8855 / tcp
2097278601 | 2025-02-27T22:57:43.620712
8862 / tcp
1494152755 | 2025-03-10T09:20:06.195869
8865 / tcp
1492588636 | 2025-03-15T06:03:30.920723
8866 / tcp
1443805044 | 2025-02-27T17:48:48.545646
8868 / tcp
-1211936298 | 2025-02-19T11:36:00.009048
8872 / tcp
79008219 | 2025-02-22T05:29:13.500804
8877 / tcp
-368535070 | 2025-02-24T16:50:28.189248
8879 / tcp
-986024335 | 2025-03-04T19:31:12.825529
8880 / tcp
1930311822 | 2025-02-28T08:16:53.638180
8887 / tcp
163848801 | 2025-03-19T20:19:45.315729
8888 / tcp
913090066 | 2025-02-27T12:58:23.666998
8891 / tcp
-518781621 | 2025-02-28T18:42:42.206743
8899 / tcp
1094336031 | 2025-03-15T16:05:19.407760
8901 / tcp
769070825 | 2025-03-17T08:48:14.022566
8906 / tcp
43318845 | 2025-03-16T11:48:44.794891
8910 / tcp
-530251354 | 2025-02-23T17:47:12.135061
8913 / tcp
1708956071 | 2025-03-19T02:34:15.722829
8935 / tcp
203719036 | 2025-03-15T18:34:47.354257
8988 / tcp
514187883 | 2025-03-19T19:03:17.575720
9000 / tcp
879812166 | 2025-03-19T02:36:55.269892
9001 / tcp
1595911802 | 2025-03-12T09:44:28.858959
9002 / tcp
-1525424016 | 2025-03-13T09:19:13.726444
9009 / tcp
-1888706902 | 2025-03-14T07:07:31.457265
9017 / tcp
1487952696 | 2025-03-06T21:38:18.683789
9019 / tcp
-584424219 | 2025-02-28T12:15:35.831853
9026 / tcp
47021604 | 2025-03-13T05:20:08.073828
9030 / tcp
1980117164 | 2025-03-15T13:52:00.934408
9034 / tcp
-1961581195 | 2025-03-11T11:18:51.788530
9038 / tcp
-870943646 | 2025-02-24T08:57:46.620097
9039 / tcp
532286536 | 2025-03-15T13:20:49.432144
9041 / tcp
-528227764 | 2025-02-23T13:33:41.897147
9042 / tcp
-867359999 | 2025-03-17T13:57:14.390612
9044 / tcp
-1913264045 | 2025-03-10T01:56:55.125573
9045 / tcp
-1532350429 | 2025-03-17T12:43:23.138121
9047 / tcp
-1138253474 | 2025-03-10T11:24:05.306452
9051 / tcp
617218282 | 2025-02-21T20:15:56.612367
9062 / tcp
271033605 | 2025-02-19T19:12:58.577750
9072 / tcp
-238429969 | 2025-03-07T02:18:50.770849
9080 / tcp
1031132990 | 2025-02-22T17:56:12.032958
9082 / tcp
1273161761 | 2025-03-13T01:59:53.969695
9084 / tcp
1827066547 | 2025-02-28T13:12:05.637439
9086 / tcp
-1850989170 | 2025-03-13T10:29:35.615215
9090 / tcp
1728228061 | 2025-03-12T20:36:21.054112
9091 / tcp
-1741270706 | 2025-03-13T15:43:28.596530
9092 / tcp
1475480684 | 2025-03-16T01:00:22.016314
9095 / tcp
1401463564 | 2025-03-15T09:19:42.469665
9100 / tcp
-403328594 | 2025-03-18T04:05:47.397801
9101 / tcp
1021255218 | 2025-03-05T22:16:32.023929
9102 / tcp
-287750521 | 2025-03-06T07:46:48.877657
9106 / tcp
-1938685914 | 2025-02-28T21:25:54.529463
9109 / tcp
1563553487 | 2025-02-19T15:29:56.614205
9111 / tcp
350365229 | 2025-03-20T06:08:58.228051
9113 / tcp
-747371776 | 2025-03-19T12:02:27.860427
9118 / tcp
-116007965 | 2025-03-05T10:13:42.644974
9121 / tcp
-1165583616 | 2025-03-09T16:20:09.123161
9125 / tcp
-1031630826 | 2025-02-20T16:59:04.315632
9127 / tcp
1856176733 | 2025-03-05T08:32:43.002706
9130 / tcp
2059149521 | 2025-02-26T07:52:31.349302
9133 / tcp
-1032766230 | 2025-03-21T01:15:10.578056
9134 / tcp
655374426 | 2025-02-24T17:31:06.125678
9138 / tcp
598654972 | 2025-03-06T17:39:31.464499
9142 / tcp
1822756913 | 2025-03-08T11:24:46.426496
9143 / tcp
204751956 | 2025-03-09T06:41:15.190135
9145 / tcp
-1003825550 | 2025-03-19T23:39:39.266833
9150 / tcp
843017743 | 2025-03-19T07:01:22.753872
9151 / tcp
433143763 | 2025-03-12T01:33:53.303843
9154 / tcp
-959938597 | 2025-03-06T23:12:27.861784
9155 / tcp
-354464442 | 2025-03-15T18:31:36.433344
9158 / tcp
1579323595 | 2025-03-10T19:53:38.522994
9160 / tcp
1149132484 | 2025-03-16T13:40:13.866380
9163 / tcp
-176010532 | 2025-02-26T15:25:36.302796
9165 / tcp
65549683 | 2025-03-05T20:09:08.305028
9168 / tcp
1362815757 | 2025-03-20T14:40:16.866890
9171 / tcp
-1915213775 | 2025-02-27T17:38:56.917194
9172 / tcp
83320986 | 2025-03-14T06:46:44.792908
9174 / tcp
-1018763198 | 2025-03-17T19:27:05.873662
9177 / tcp
460775299 | 2025-03-21T01:07:32.336719
9180 / tcp
-2031871986 | 2025-03-14T22:20:45.092054
9182 / tcp
-1562800680 | 2025-03-14T05:44:37.732660
9187 / tcp
-1667574886 | 2025-02-24T13:42:32.564200
9191 / tcp
-116359444 | 2025-03-15T09:07:17.009767
9196 / tcp
-1717565794 | 2025-03-10T09:46:21.436848
9200 / tcp
-1271729741 | 2025-03-20T14:30:15.915322
9201 / tcp
91284643 | 2025-03-11T04:26:31.086149
9206 / tcp
-536568674 | 2025-03-09T07:27:13.298153
9216 / tcp
-1171782040 | 2025-03-04T04:45:16.288049
9218 / tcp
393931244 | 2025-03-19T12:27:21.429598
9220 / tcp
-1133158375 | 2025-03-18T18:59:43.140019
9230 / tcp
1685970041 | 2025-02-26T07:50:01.063938
9244 / tcp
-1457934179 | 2025-03-14T21:09:55.084431
9247 / tcp
1736388855 | 2025-03-10T01:58:21.620439
9283 / tcp
-168334246 | 2025-03-04T10:35:55.538034
9289 / tcp
-300195864 | 2025-03-05T20:01:57.621193
9292 / tcp
461420103 | 2025-02-19T10:04:21.908862
9295 / tcp
690567919 | 2025-02-25T19:22:54.790938
9299 / tcp
1352216125 | 2025-03-20T10:48:44.729777
9303 / tcp
-519205114 | 2025-03-10T01:48:56.280865
9306 / tcp
764992626 | 2025-03-08T15:19:47.560978
9307 / tcp
-565271785 | 2025-03-12T00:14:39.984395
9315 / tcp
-542070468 | 2025-02-20T07:31:07.599566
9333 / tcp
272385022 | 2025-03-15T23:02:01.224873
9350 / tcp
1898680521 | 2025-02-24T15:43:14.333033
9353 / tcp
1722329392 | 2025-02-22T20:01:13.819471
9398 / tcp
-694244823 | 2025-03-21T02:01:44.455888
9400 / tcp
-97082938 | 2025-03-06T22:40:27.848804
9418 / tcp
-1996168860 | 2025-03-16T06:21:57.125854
9433 / tcp
1937533383 | 2025-02-25T23:38:46.310584
9441 / tcp
-1761252783 | 2025-03-09T18:11:52.440841
9443 / tcp
-555999836 | 2025-03-20T04:46:21.968453
9444 / tcp
1109908646 | 2025-03-15T17:05:06.660545
9454 / tcp
-2061804524 | 2025-02-21T23:12:25.988159
9455 / tcp
1050532791 | 2025-03-20T07:32:45.255045
9456 / tcp
-1544177842 | 2025-03-15T20:16:48.615669
9465 / tcp
1125491360 | 2025-03-05T17:39:32.303985
9529 / tcp
1264081534 | 2025-03-13T10:59:21.831431
9530 / tcp
1439934878 | 2025-03-15T22:52:59.029351
9553 / tcp
-1258296384 | 2025-03-17T00:47:12.815024
9595 / tcp
-1868089298 | 2025-03-16T17:06:17.941461
9600 / tcp
1938617182 | 2025-03-19T18:31:29.863497
9633 / tcp
742120530 | 2025-03-16T06:53:58.936786
9658 / tcp
-792961573 | 2025-03-06T08:45:48.810167
9696 / tcp
-1182060431 | 2025-03-09T09:00:05.712341
9704 / tcp
266959718 | 2025-03-16T16:00:59.359894
9710 / tcp
1978764526 | 2025-02-25T07:39:18.012025
9743 / tcp
-69290929 | 2025-03-14T13:13:11.591676
9761 / tcp
-1492024679 | 2025-03-21T04:31:03.404114
9779 / tcp
773648979 | 2025-02-19T16:29:14.338874
9800 / tcp
-1190092362 | 2025-03-13T20:11:07.355852
9811 / tcp
813116289 | 2025-03-09T12:12:10.676981
9869 / tcp
775492778 | 2025-03-20T08:23:23.809325
9876 / tcp
-1143802169 | 2025-03-07T12:54:21.593978
9898 / tcp
-1445976981 | 2025-03-17T17:03:31.904224
9916 / tcp
-903927559 | 2025-02-20T07:41:30.704375
9926 / tcp
2091886244 | 2025-02-26T15:17:48.344075
9930 / tcp
227662420 | 2025-03-15T00:01:50.256396
9943 / tcp
746257821 | 2025-03-14T15:03:39.672299
9944 / tcp
1505000537 | 2025-03-18T06:26:30.878540
9955 / tcp
-88708252 | 2025-03-04T16:10:24.113691
9981 / tcp
-1615531537 | 2025-03-05T23:41:36.838382
9991 / tcp
1623007743 | 2025-03-07T06:52:05.817485
9998 / tcp
948673559 | 2025-03-18T08:10:37.924690
9999 / tcp
-73961173 | 2025-03-20T10:23:49.342042
10000 / tcp
-1392784147 | 2025-03-17T20:45:48.143649
10001 / tcp
-1862748020 | 2025-03-18T09:06:34.983074
10005 / tcp
401934789 | 2025-03-11T09:53:03.175565
10011 / tcp
-1965370783 | 2025-03-19T11:01:38.697001
10017 / tcp
-589193540 | 2025-02-20T14:47:46.470616
10031 / tcp
-1554158120 | 2025-03-05T06:53:32.633578
10037 / tcp
-502147349 | 2025-03-01T02:01:10.960892
10042 / tcp
1666946110 | 2025-02-24T19:30:17.555386
10051 / tcp
1603264331 | 2025-03-14T16:06:13.989318
10066 / tcp
-1988963666 | 2025-03-04T18:11:38.450239
10071 / tcp
-1241288036 | 2025-03-17T14:09:05.232683
10075 / tcp
222821832 | 2025-03-18T23:32:08.775606
10081 / tcp
-1577002102 | 2025-02-20T17:36:23.936686
10083 / tcp
-1845531231 | 2025-03-16T18:36:17.421033
10084 / tcp
-365524121 | 2025-03-15T19:16:31.753721
10086 / tcp
-21523245 | 2025-02-24T13:43:02.979518
10090 / tcp
-1897639594 | 2025-03-12T23:41:25.126216
10101 / tcp
-941220693 | 2025-03-09T09:59:58.853072
10106 / tcp
1659024791 | 2025-02-21T10:29:33.781896
10134 / tcp
1794023354 | 2025-03-19T00:44:07.562302
10180 / tcp
-958450277 | 2025-03-05T18:23:58.594016
10205 / tcp
-2141171852 | 2025-03-14T19:06:38.853591
10210 / tcp
-131799554 | 2025-03-05T19:11:41.609315
10240 / tcp
1519566647 | 2025-02-22T14:23:14.755701
10243 / tcp
1015872472 | 2025-03-12T04:49:03.333297
10251 / tcp
625102328 | 2025-03-19T16:57:26.769292
10380 / tcp
1019148833 | 2025-03-17T06:00:50.087617
10399 / tcp
909800343 | 2025-02-25T20:28:38.924015
10443 / tcp
-1815328065 | 2025-03-15T09:40:15.087225
10554 / tcp
1895577918 | 2025-03-20T22:23:43.023446
10911 / tcp
1940661894 | 2025-03-20T20:11:35.592492
10933 / tcp
-2048179468 | 2025-03-15T10:49:31.032653
10934 / tcp
-815186865 | 2025-03-06T19:31:38.974125
10943 / tcp
-1705734936 | 2025-03-10T17:22:08.380485
11000 / tcp
1487267546 | 2025-03-21T02:31:12.534212
11027 / tcp
-922927054 | 2025-03-18T21:27:37.516774
11111 / tcp
-1257304397 | 2025-03-12T10:21:18.784339
11112 / tcp
1187224035 | 2025-03-20T17:18:08.352488
11210 / tcp
-2071544956 | 2025-03-08T15:01:57.189510
11211 / tcp
-1040374710 | 2025-03-16T12:05:32.860103
11288 / tcp
-298312838 | 2025-03-20T09:15:36.945237
11300 / tcp
-678863072 | 2025-03-16T20:03:03.604656
11371 / tcp
1717773427 | 2025-03-16T21:16:43.189822
11434 / tcp
1321953252 | 2025-03-18T18:40:37.248309
11480 / tcp
-774328392 | 2025-02-28T22:06:17.975682
11602 / tcp
348307688 | 2025-03-10T09:08:03.939027
12000 / tcp
870837700 | 2025-03-19T17:31:26.493982
12019 / tcp
-223141156 | 2025-03-14T18:10:23.428311
12056 / tcp
1358263238 | 2025-03-06T09:27:01.970353
12084 / tcp
-2013186374 | 2025-02-27T12:04:46.151891
12101 / tcp
1840928411 | 2025-03-20T10:49:24.116458
12107 / tcp
15018106 | 2025-03-13T07:22:08.647303
12108 / tcp
2118510824 | 2025-02-22T20:07:56.275138
12118 / tcp
181165191 | 2025-03-06T06:10:42.128637
12119 / tcp
1709114732 | 2025-03-08T13:28:05.611922
12125 / tcp
-394678288 | 2025-03-20T14:16:47.770388
12126 / tcp
1925246213 | 2025-03-05T04:47:16.511264
12131 / tcp
1750475152 | 2025-03-09T16:35:02.927766
12133 / tcp
1599744153 | 2025-02-28T12:33:58.605400
12134 / tcp
1937533383 | 2025-03-03T22:16:51.894404
12135 / tcp
634583751 | 2025-03-19T20:50:03.889681
12139 / tcp
-1054795863 | 2025-03-13T17:28:20.775860
12145 / tcp
321271918 | 2025-03-10T12:06:14.565831
12155 / tcp
327682743 | 2025-03-16T21:05:30.425008
12157 / tcp
1827771671 | 2025-03-19T00:38:53.449992
12159 / tcp
1018218195 | 2025-03-05T18:19:36.062140
12164 / tcp
-1794022277 | 2025-03-06T09:20:59.759498
12165 / tcp
139503291 | 2025-03-15T18:23:31.380549
12178 / tcp
4200419 | 2025-03-18T09:54:43.884055
12181 / tcp
-1353029143 | 2025-02-27T21:09:02.197075
12186 / tcp
921225407 | 2025-03-20T16:46:27.219071
12187 / tcp
-827948305 | 2025-03-15T10:00:08.152099
12194 / tcp
-879027166 | 2025-03-14T21:06:10.437360
12197 / tcp
-1130434862 | 2025-02-27T17:47:17.064621
12205 / tcp
531989966 | 2025-03-15T05:14:42.798366
12207 / tcp
-333094637 | 2025-03-13T02:07:08.861503
12214 / tcp
-1260277190 | 2025-03-13T13:29:27.113924
12220 / tcp
1334131987 | 2025-03-18T23:45:27.452517
12221 / tcp
-1897076569 | 2025-03-17T08:20:26.161829
12224 / tcp
-942079601 | 2025-02-19T14:45:46.103355
12226 / tcp
1658553374 | 2025-02-27T06:58:48.163338
12237 / tcp
1888872841 | 2025-03-17T11:03:38.037730
12241 / tcp
-663852816 | 2025-02-28T23:15:59.145804
12246 / tcp
-50949508 | 2025-02-23T20:19:21.713671
12251 / tcp
803686933 | 2025-02-22T18:01:39.906693
12253 / tcp
5697529 | 2025-03-15T12:12:59.885867
12254 / tcp
1466074976 | 2025-02-22T18:10:45.847882
12262 / tcp
1455920006 | 2025-03-20T21:24:32.075660
12265 / tcp
-1832919704 | 2025-02-26T14:27:54.841413
12266 / tcp
-967739981 | 2025-02-25T22:52:17.317643
12271 / tcp
655438708 | 2025-03-09T22:01:56.222223
12272 / tcp
-1845179156 | 2025-02-25T18:06:01.469569
12273 / tcp
-952427762 | 2025-02-20T00:23:46.360626
12282 / tcp
1714891724 | 2025-03-16T08:46:48.996169
12287 / tcp
-972207177 | 2025-03-07T14:04:53.044527
12291 / tcp
-2075104942 | 2025-03-18T11:13:24.045590
12294 / tcp
218529768 | 2025-03-09T21:30:52.146159
12295 / tcp
-34332052 | 2025-03-05T05:13:13.085998
12296 / tcp
274716575 | 2025-03-15T23:09:26.300277
12298 / tcp
-2033111675 | 2025-03-13T08:59:40.127564
12302 / tcp
-746670113 | 2025-03-13T14:55:55.463478
12304 / tcp
-277899863 | 2025-02-27T19:46:15.202695
12305 / tcp
-2139923181 | 2025-03-08T14:49:37.497507
12306 / tcp
84900831 | 2025-03-09T12:28:25.965867
12309 / tcp
968496942 | 2025-03-15T16:58:38.945857
12312 / tcp
-683040120 | 2025-03-12T05:06:58.356989
12318 / tcp
-1596082789 | 2025-03-13T21:52:32.698050
12319 / tcp
-827896540 | 2025-03-18T01:00:45.562653
12320 / tcp
-647688395 | 2025-03-09T13:33:21.101467
12323 / tcp
1898704771 | 2025-03-13T01:38:04.308669
12330 / tcp
-788219154 | 2025-03-14T05:56:31.526899
12331 / tcp
1891732442 | 2025-02-25T22:46:02.135696
12332 / tcp
620510807 | 2025-03-06T07:28:33.932451
12333 / tcp
-541488686 | 2025-02-21T06:38:16.362478
12336 / tcp
1116421447 | 2025-02-26T23:09:49.555938
12342 / tcp
-372724030 | 2025-03-18T10:34:05.406628
12344 / tcp
-1390611166 | 2025-03-10T17:14:36.967819
12345 / tcp
-473902510 | 2025-03-14T10:16:32.421406
12346 / tcp
1349180 | 2025-03-13T03:26:57.689174
12353 / tcp
-990879039 | 2025-03-06T07:05:38.404555
12355 / tcp
-1239143630 | 2025-03-13T17:02:20.620758
12365 / tcp
-1157827125 | 2025-02-22T02:15:46.688431
12366 / tcp
-574107616 | 2025-03-18T02:26:36.452567
12367 / tcp
-787396011 | 2025-03-09T12:14:07.980928
12370 / tcp
-1327399870 | 2025-03-09T19:36:26.758615
12377 / tcp
1045714557 | 2025-03-18T17:32:57.478778
12379 / tcp
13673251 | 2025-03-06T05:14:32.143624
12388 / tcp
-1973387645 | 2025-02-24T00:08:22.787671
12389 / tcp
-663245418 | 2025-03-16T05:51:33.957847
12391 / tcp
-1208736947 | 2025-03-11T09:30:16.878233
12394 / tcp
-1582204669 | 2025-02-27T12:35:26.617906
12405 / tcp
753588289 | 2025-03-20T08:49:09.782809
12406 / tcp
735544455 | 2025-03-15T12:37:55.038361
12414 / tcp
1560025226 | 2025-02-28T09:35:08.890164
12417 / tcp
108975127 | 2025-02-25T05:33:22.170013
12419 / tcp
-1481297460 | 2025-02-24T23:13:11.790326
12423 / tcp
669610120 | 2025-03-12T14:21:24.640343
12429 / tcp
1128068751 | 2025-02-24T00:17:51.286162
12433 / tcp
-1396128788 | 2025-03-11T12:19:28.631401
12434 / tcp
1062459587 | 2025-02-27T15:46:57.051600
12439 / tcp
1990491084 | 2025-02-28T18:57:12.358178
12441 / tcp
122714330 | 2025-03-14T05:30:49.908954
12444 / tcp
-1627847578 | 2025-03-17T22:48:24.360332
12448 / tcp
74811379 | 2025-03-13T16:36:33.286239
12456 / tcp
726237766 | 2025-03-20T00:18:26.582788
12462 / tcp
1099083141 | 2025-03-13T11:04:14.657369
12464 / tcp
1084024001 | 2025-02-21T17:42:42.156540
12471 / tcp
-2091437930 | 2025-03-05T15:49:19.982225
12474 / tcp
1568047724 | 2025-03-11T16:05:08.212584
12479 / tcp
465624048 | 2025-03-11T00:01:36.988141
12481 / tcp
374183177 | 2025-03-11T21:33:11.361648
12485 / tcp
552848373 | 2025-03-20T19:27:26.355074
12492 / tcp
1268582573 | 2025-03-16T13:49:19.555483
12493 / tcp
-423784550 | 2025-03-04T17:23:29.222826
12494 / tcp
1326808196 | 2025-02-25T09:07:44.195036
12496 / tcp
-34473618 | 2025-02-24T20:24:22.934845
12497 / tcp
1959834421 | 2025-03-20T04:45:18.592221
12499 / tcp
-1481084149 | 2025-03-10T07:41:40.907581
12502 / tcp
983924382 | 2025-03-16T06:44:45.824946
12506 / tcp
-1507844568 | 2025-03-09T21:32:41.122168
12508 / tcp
-381616154 | 2025-02-23T22:43:10.870387
12510 / tcp
-1261732266 | 2025-02-26T21:01:22.820256
12514 / tcp
-1576892965 | 2025-02-20T17:38:50.906410
12517 / tcp
1785418612 | 2025-02-27T04:47:05.615325
12520 / tcp
-512141230 | 2025-03-04T01:08:36.840210
12522 / tcp
-1710971863 | 2025-02-26T01:53:19.722887
12526 / tcp
-2041965454 | 2025-02-24T01:42:41.877495
12527 / tcp
545130250 | 2025-02-19T07:09:18.123091
12528 / tcp
1968426961 | 2025-03-07T13:34:51.514947
12529 / tcp
-1650721881 | 2025-02-23T23:37:53.749443
12532 / tcp
1092865537 | 2025-03-17T07:09:13.105339
12533 / tcp
-946862560 | 2025-03-16T14:19:08.853362
12536 / tcp
-1672445039 | 2025-03-11T06:39:22.701403
12541 / tcp
-385303480 | 2025-02-27T06:23:19.294113
12544 / tcp
1649273950 | 2025-03-10T01:11:52.382797
12547 / tcp
-724605835 | 2025-02-27T17:42:43.262146
12556 / tcp
-2076529614 | 2025-03-18T03:48:30.971836
12561 / tcp
-498531673 | 2025-02-28T00:19:17.639653
12563 / tcp
382149721 | 2025-03-20T09:40:35.975971
12564 / tcp
-1087002930 | 2025-03-11T08:26:24.558682
12565 / tcp
1154091942 | 2025-02-26T23:49:10.296070
12568 / tcp
1901437634 | 2025-03-19T11:12:23.320294
12570 / tcp
1576797327 | 2025-03-06T05:53:40.126876
12576 / tcp
941664527 | 2025-03-11T04:15:43.223078
12581 / tcp
-1147986135 | 2025-02-19T13:03:30.549082
12583 / tcp
-423770806 | 2025-03-19T11:45:15.913723
12584 / tcp
2123429609 | 2025-03-15T10:42:57.290970
12601 / tcp
1109932981 | 2025-03-09T15:19:44.948753
13000 / tcp
-143539105 | 2025-02-24T08:12:58.277492
13047 / tcp
-861413723 | 2025-03-11T23:21:25.050663
13084 / tcp
1794367745 | 2025-03-10T07:47:15.997990
13579 / tcp
992798614 | 2025-03-17T04:22:10.108858
14024 / tcp
18435034 | 2025-03-05T02:13:58.769596
14026 / tcp
1993442464 | 2025-03-07T02:39:53.079908
14082 / tcp
894802162 | 2025-03-19T07:21:32.395163
14084 / tcp
100059182 | 2025-03-12T20:57:58.645924
14101 / tcp
666738417 | 2025-03-12T20:15:35.983408
14104 / tcp
1923748369 | 2025-02-28T18:45:11.193919
14147 / tcp
1701959588 | 2025-03-20T21:18:43.523514
14265 / tcp
40750501 | 2025-03-18T03:39:58.910401
14330 / tcp
-1518563849 | 2025-02-20T03:53:54.181673
14344 / tcp
-952427762 | 2025-03-12T18:11:03.969684
14400 / tcp
423654886 | 2025-03-14T04:26:30.190287
14404 / tcp
960185016 | 2025-02-24T10:45:00.704563
14407 / tcp
1197931241 | 2025-02-23T21:20:31.560631
14443 / tcp
-1611537073 | 2025-03-10T18:39:40.105037
14524 / tcp
-2135424309 | 2025-03-17T02:06:01.974735
14825 / tcp
1689215476 | 2025-03-14T10:26:11.669555
14880 / tcp
1787202159 | 2025-03-19T22:15:15.731176
14896 / tcp
-322761140 | 2025-02-23T21:15:05.875240
14901 / tcp
444768899 | 2025-03-18T23:46:59.753998
14903 / tcp
650524518 | 2025-03-19T00:35:35.118427
15038 / tcp
413972494 | 2025-02-25T08:06:44.834652
15042 / tcp
-797938804 | 2025-03-16T06:19:53.709003
15084 / tcp
-1949826069 | 2025-02-28T14:02:11.166754
15443 / tcp
1596295664 | 2025-03-14T05:37:59.796592
15673 / tcp
-2132779955 | 2025-03-11T10:07:44.232317
16005 / tcp
687499526 | 2025-03-17T17:20:57.510452
16006 / tcp
1937533383 | 2025-03-14T20:47:41.212977
16009 / tcp
-2044139066 | 2025-03-13T02:52:37.696989
16010 / tcp
-1244056500 | 2025-03-21T02:21:14.743018
16011 / tcp
1960981551 | 2025-02-24T11:16:38.962776
16013 / tcp
2070981198 | 2025-03-20T03:40:45.009904
16017 / tcp
-866367895 | 2025-03-11T18:41:44.036495
16020 / tcp
-333964151 | 2025-03-11T04:01:08.823412
16026 / tcp
1909377979 | 2025-02-19T15:19:12.070610
16030 / tcp
1135964555 | 2025-03-03T17:33:47.955188
16031 / tcp
-640724988 | 2025-03-15T09:24:25.853734
16033 / tcp
-1545937836 | 2025-03-15T12:22:09.920055
16035 / tcp
-191344291 | 2025-03-20T21:19:04.461204
16039 / tcp
-771788270 | 2025-03-04T04:45:16.388355
16041 / tcp
-1619104640 | 2025-03-16T10:44:53.855758
16050 / tcp
-1596082789 | 2025-03-04T13:13:12.108806
16052 / tcp
-1197905246 | 2025-02-22T00:44:11.883207
16058 / tcp
512485409 | 2025-03-03T18:13:54.670988
16059 / tcp
-724246829 | 2025-03-16T12:00:35.973152
16062 / tcp
1094518186 | 2025-03-13T22:00:07.849681
16070 / tcp
1358785131 | 2025-02-20T00:35:50.551785
16074 / tcp
1870527972 | 2025-03-13T23:21:13.902986
16080 / tcp
849032802 | 2025-03-19T18:17:13.768664
16086 / tcp
1936375276 | 2025-03-12T03:06:04.188588
16087 / tcp
1937533383 | 2025-03-20T05:21:52.424859
16093 / tcp
2096551664 | 2025-02-23T17:55:02.185971
16095 / tcp
1944574034 | 2025-03-15T09:10:51.212074
16101 / tcp
-440590928 | 2025-03-20T14:43:27.374276
16102 / tcp
-646809544 | 2025-02-28T00:23:51.311029
16404 / tcp
14044887 | 2025-03-16T14:12:50.233016
16464 / tcp
123971992 | 2025-03-21T00:47:11.375494
16601 / tcp
527178612 | 2025-03-13T06:48:19.998451
16666 / tcp
-1072364492 | 2025-03-05T09:06:28.741656
16992 / tcp
-100344513 | 2025-03-12T16:33:26.064405
16993 / tcp
1013541144 | 2025-03-15T11:02:12.897266
17000 / tcp
154789868 | 2025-03-17T03:20:29.311311
17082 / tcp
-211868266 | 2025-02-23T14:34:19.315543
17102 / tcp
-948602545 | 2025-02-27T18:51:48.100376
17771 / tcp
1091553186 | 2025-03-06T02:53:40.962667
17773 / tcp
-127671475 | 2025-03-13T15:05:30.105703
17776 / tcp
-1203599831 | 2025-03-17T07:54:10.354991
17779 / tcp
755977199 | 2025-03-19T17:24:19.289914
18000 / tcp
-154931051 | 2025-03-05T17:19:17.935371
18001 / tcp
-618535139 | 2025-02-28T19:56:03.785281
18002 / tcp
-1272140382 | 2025-02-24T10:59:02.187946
18008 / tcp
1413291012 | 2025-02-26T13:33:10.840686
18014 / tcp
-1931406432 | 2025-02-21T12:12:53.742602
18015 / tcp
1081011588 | 2025-03-08T16:45:50.490522
18017 / tcp
108453958 | 2025-02-26T09:27:27.539860
18019 / tcp
778497462 | 2025-03-18T07:44:35.687877
18029 / tcp
-1042226850 | 2025-03-18T05:37:38.994336
18031 / tcp
1872026123 | 2025-03-14T10:37:42.894430
18032 / tcp
-1905121103 | 2025-02-24T22:43:49.906343
18033 / tcp
1888909338 | 2025-03-20T01:53:36.064097
18041 / tcp
-713661668 | 2025-02-27T08:06:40.706699
18042 / tcp
-18483467 | 2025-03-21T00:50:28.792328
18043 / tcp
-631991764 | 2025-03-19T01:11:16.895662
18051 / tcp
652996130 | 2025-03-04T15:56:25.693372
18059 / tcp
-1341439309 | 2025-03-19T04:12:37.933121
18060 / tcp
-2107797057 | 2025-02-20T01:15:40.705225
18061 / tcp
-1864382563 | 2025-02-24T16:25:48.569298
18062 / tcp
925923718 | 2025-03-14T01:53:16.322612
18068 / tcp
-1403858635 | 2025-03-20T18:06:47.069145
18080 / tcp
853661750 | 2025-03-17T16:23:53.873692
18081 / tcp
-775689569 | 2025-03-17T07:17:51.668877
18086 / tcp
4474075 | 2025-02-20T15:02:36.945553
18089 / tcp
-1121366425 | 2025-02-21T09:32:59.482557
18092 / tcp
1298045051 | 2025-03-05T17:55:51.839786
18094 / tcp
1307254010 | 2025-03-17T02:38:20.742766
18097 / tcp
-1318093464 | 2025-02-25T06:48:57.975710
18098 / tcp
1242407104 | 2025-03-13T01:53:52.089306
18100 / tcp
-1815317136 | 2025-03-15T06:12:08.946532
18101 / tcp
1197420566 | 2025-02-24T17:11:46.799628
18103 / tcp
72034638 | 2025-03-06T07:14:49.646298
18105 / tcp
-503455657 | 2025-03-15T05:51:42.469469
18109 / tcp
-2024164955 | 2025-02-25T15:59:44.588197
18110 / tcp
-1152009481 | 2025-02-20T23:35:10.273764
18111 / tcp
1488781587 | 2025-03-15T13:56:23.517644
18112 / tcp
1415074961 | 2025-02-23T18:43:18.259034
18200 / tcp
953581693 | 2025-03-12T22:53:20.852281
18245 / tcp
-353034465 | 2025-03-20T04:07:59.081011
18368 / tcp
132646820 | 2025-03-05T18:14:00.244686
18443 / tcp
-1952328767 | 2025-03-15T11:03:13.327325
18553 / tcp
964175475 | 2025-03-14T12:57:16.047864
18802 / tcp
-1952296441 | 2025-03-08T15:39:37.345444
18888 / tcp
-2091706584 | 2025-03-20T19:49:33.801012
19000 / tcp
788852383 | 2025-03-20T08:12:06.723129
19014 / tcp
432812707 | 2025-03-12T21:24:11.973597
19015 / tcp
417366648 | 2025-02-27T21:55:05.497956
19017 / tcp
1671076297 | 2025-03-20T10:07:01.675985
19022 / tcp
2095221482 | 2025-02-25T12:30:16.561831
19080 / tcp
-1806459870 | 2025-03-07T17:30:45.520265
19082 / tcp
-554998372 | 2025-03-15T22:12:54.139430
19222 / tcp
1386693126 | 2025-02-23T20:28:51.533152
19902 / tcp
-647516764 | 2025-03-10T04:52:12.479823
19930 / tcp
-1596042972 | 2025-03-14T11:06:29.528607
19998 / tcp
1568668144 | 2025-03-15T17:45:22.548123
19999 / tcp
1399622571 | 2025-02-20T23:57:14.225833
20000 / tcp
-10525056 | 2025-03-19T01:50:50.673238
20018 / tcp
1937533383 | 2025-03-13T09:38:05.625965
20020 / tcp
-17431863 | 2025-03-14T20:33:07.861030
20040 / tcp
-1459299614 | 2025-03-20T14:52:53.543722
20050 / tcp
-1227397820 | 2025-03-06T22:04:21.092271
20082 / tcp
-2066353235 | 2025-03-14T20:55:19.688901
20084 / tcp
-13095386 | 2025-03-17T07:19:26.526463
20106 / tcp
1120781480 | 2025-02-22T20:23:20.651527
20201 / tcp
-633033362 | 2025-03-04T15:15:03.414297
20256 / tcp
-822123134 | 2025-03-20T16:31:24.285654
20440 / tcp
60826157 | 2025-03-08T20:07:29.605686
20547 / tcp
1134182261 | 2025-03-11T20:04:55.060502
20880 / tcp
-762965564 | 2025-03-17T09:30:58.646292
21025 / tcp
1193786093 | 2025-03-15T06:43:31.486925
21082 / tcp
-1359876317 | 2025-03-09T08:32:13.123777
21084 / tcp
1107283111 | 2025-02-27T02:52:26.132904
21241 / tcp
514757135 | 2025-03-13T09:49:25.662398
21245 / tcp
647701219 | 2025-02-27T00:42:32.979004
21249 / tcp
-277432071 | 2025-03-17T13:18:15.753523
21250 / tcp
581916981 | 2025-02-20T07:42:38.258740
21254 / tcp
200679938 | 2025-03-09T20:05:50.893874
21256 / tcp
1869032631 | 2025-02-24T12:54:22.358193
21262 / tcp
1699025375 | 2025-03-19T10:39:10.554620
21264 / tcp
1596878603 | 2025-03-18T14:30:26.170057
21265 / tcp
1470656410 | 2025-03-07T17:19:15.651351
21267 / tcp
755142741 | 2025-02-21T08:29:35.042267
21268 / tcp
648117731 | 2025-02-28T21:13:22.643612
21271 / tcp
1992824092 | 2025-03-20T03:34:22.478355
21273 / tcp
-2132667619 | 2025-03-13T00:57:16.632402
21274 / tcp
-828700116 | 2025-03-20T10:59:08.206370
21276 / tcp
-1304115657 | 2025-02-28T06:42:35.166297
21277 / tcp
1270198362 | 2025-03-10T23:25:57.742031
21279 / tcp
-1897513824 | 2025-02-23T10:20:03.903100
21281 / tcp
878835163 | 2025-02-24T12:22:33.915317
21282 / tcp
1845180901 | 2025-02-20T22:00:31.069298
21286 / tcp
-1287939843 | 2025-03-14T06:20:53.924177
21287 / tcp
-175562963 | 2025-02-28T12:30:06.780934
21288 / tcp
968782617 | 2025-03-11T21:00:46.541039
21289 / tcp
890101444 | 2025-03-10T13:32:44.413369
21295 / tcp
1168358609 | 2025-02-22T18:09:54.856433
21296 / tcp
1214102544 | 2025-03-18T19:35:18.941664
21298 / tcp
245291926 | 2025-03-06T03:40:15.733079
21299 / tcp
613761419 | 2025-03-07T01:06:46.489837
21300 / tcp
1851720529 | 2025-03-20T10:47:18.180935
21314 / tcp
-1072900185 | 2025-02-24T10:27:42.166869
21316 / tcp
-531954188 | 2025-03-10T02:31:09.883724
21317 / tcp
745873978 | 2025-03-10T17:13:08.598435
21320 / tcp
1803764096 | 2025-03-14T15:49:25.859547
21322 / tcp
697056866 | 2025-02-23T20:13:24.809561
21323 / tcp
-1993148486 | 2025-03-19T08:41:36.228666
21328 / tcp
-1018071751 | 2025-03-08T22:55:27.604752
21329 / tcp
-277597780 | 2025-02-23T23:20:48.371043
21330 / tcp
-901370944 | 2025-03-15T15:17:25.717927
21357 / tcp
1805154350 | 2025-03-19T04:46:48.355991
21379 / tcp
-781356924 | 2025-03-20T10:54:40.594230
21400 / tcp
-867604634 | 2025-02-22T18:20:56.432962
21443 / tcp
-1493381382 | 2025-03-16T03:18:48.348920
22000 / tcp
1050212126 | 2025-03-19T02:49:16.222629
22084 / tcp
231572850 | 2025-03-06T12:02:42.866887
22103 / tcp
-881909556 | 2025-03-10T01:56:13.922852
22107 / tcp
1198734448 | 2025-03-06T08:10:31.601831
22556 / tcp
905941776 | 2025-03-15T17:15:23.055962
22705 / tcp
-14950285 | 2025-02-25T13:05:46.561001
23023 / tcp
1715077619 | 2025-02-27T10:50:12.220007
23082 / tcp
-1920913657 | 2025-02-19T05:30:19.706914
23182 / tcp
-1843791966 | 2025-03-12T11:18:49.710750
23424 / tcp
-75587139 | 2025-03-17T13:25:51.174425
24245 / tcp
-211627924 | 2025-03-14T14:15:15.609949
24442 / tcp
1664719115 | 2025-03-03T21:19:24.495089
24472 / tcp
-1420757504 | 2025-03-07T16:00:16.358045
24808 / tcp
-1182528392 | 2025-02-25T16:42:29.694593
25001 / tcp
-1479734383 | 2025-03-11T14:30:25.758201
25004 / tcp
531594733 | 2025-03-09T09:14:15.700458
25006 / tcp
-1025989609 | 2025-03-19T20:57:46.855639
25084 / tcp
-1358551005 | 2025-03-16T08:20:33.907060
25105 / tcp
1407483081 | 2025-03-04T23:06:28.811643
25565 / tcp
-1975063460 | 2025-02-26T01:36:21.444681
25782 / tcp
1960638322 | 2025-03-03T22:13:39.725708
26656 / tcp
-2139051334 | 2025-03-13T06:40:11.489524
26657 / tcp
128598516 | 2025-03-12T04:12:52.011082
27015 / tcp
-2100512006 | 2025-03-18T23:29:38.111326
28015 / tcp
396117154 | 2025-03-16T00:46:41.773678
28017 / tcp
307407142 | 2025-03-17T01:28:56.487203
28080 / tcp
438698094 | 2025-03-14T02:59:30.916047
28443 / tcp
1493790097 | 2025-03-14T09:28:30.151890
29798 / tcp
1937533383 | 2025-03-09T20:05:26.375046
29842 / tcp
-1504955535 | 2025-03-15T21:46:14.231573
30000 / tcp
1255824972 | 2025-03-15T12:13:05.566495
30002 / tcp
1196887800 | 2025-03-18T08:35:09.160374
30003 / tcp
-1492755981 | 2025-03-07T10:38:43.142478
30004 / tcp
964027284 | 2025-02-26T19:57:05.068930
30007 / tcp
-1577671945 | 2025-02-23T22:29:47.420097
30017 / tcp
1633747784 | 2025-03-13T05:30:51.044370
30022 / tcp
-127143346 | 2025-03-18T21:56:35.128692
30023 / tcp
129315871 | 2025-03-19T12:14:40.656695
30101 / tcp
1188157013 | 2025-02-27T10:58:05.283044
30110 / tcp
1332199026 | 2025-03-11T14:56:26.262386
30113 / tcp
1713235664 | 2025-03-09T12:32:17.255793
30120 / tcp
-1869198808 | 2025-02-20T18:55:13.742282
30122 / tcp
-1037064708 | 2025-03-19T21:37:33.996294
30123 / tcp
-1983047348 | 2025-02-23T15:10:32.228696
30222 / tcp
1829962179 | 2025-03-09T06:12:18.385500
30301 / tcp
907965557 | 2025-03-15T19:38:32.176070
30303 / tcp
895790244 | 2025-03-19T22:24:57.382915
30322 / tcp
-299217967 | 2025-03-09T04:29:29.608268
30422 / tcp
1370660742 | 2025-03-13T12:05:59.728650
30444 / tcp
-904631681 | 2025-03-14T13:23:23.776706
30479 / tcp
127454591 | 2025-03-07T12:29:57.420920
30522 / tcp
-1051162295 | 2025-03-12T14:51:10.999726
30622 / tcp
681072949 | 2025-03-12T11:14:36.529786
30701 / tcp
2082021300 | 2025-03-19T04:56:29.321811
30722 / tcp
-1801533075 | 2025-03-13T13:50:34.367915
30822 / tcp
1367362941 | 2025-03-12T20:04:06.899189
30892 / tcp
372463063 | 2025-03-10T23:35:19.750925
30894 / tcp
-757210766 | 2025-03-04T00:43:34.515152
30922 / tcp
-946816026 | 2025-03-20T23:15:53.490559
31017 / tcp
2114072926 | 2025-03-15T14:11:25.168195
31022 / tcp
-1487796883 | 2025-03-13T08:31:43.325329
31122 / tcp
-1044242883 | 2025-03-09T14:37:28.199583
31222 / tcp
-2071582137 | 2025-03-13T04:50:55.867464
31322 / tcp
-655141629 | 2025-03-09T16:21:23.105974
31337 / tcp
-1449365682 | 2025-02-26T20:09:25.101395
31422 / tcp
-420731483 | 2025-03-13T03:02:54.243472
31443 / tcp
1478788800 | 2025-03-12T19:32:58.581465
31444 / tcp
1479205203 | 2025-03-17T10:22:58.645601
31522 / tcp
1091724734 | 2025-03-13T01:15:09.304965
31622 / tcp
514187883 | 2025-03-12T23:32:03.212197
31722 / tcp
1258769153 | 2025-03-12T22:04:08.381802
31822 / tcp
229174108 | 2025-03-20T19:19:08.066215
31922 / tcp
1395664872 | 2025-03-11T06:37:06.575517
32001 / tcp
272755841 | 2025-03-11T08:24:34.962032
32101 / tcp
-417056136 | 2025-02-21T00:50:27.960967
32122 / tcp
-1826385988 | 2025-03-20T03:56:12.098648
32202 / tcp
878080502 | 2025-02-19T12:06:03.246066
32222 / tcp
-1586950573 | 2025-03-09T07:56:49.548779
32322 / tcp
1060693315 | 2025-03-16T15:14:00.673951
32400 / tcp
1312864294 | 2025-03-20T11:17:58.888336
32422 / tcp
57531296 | 2025-03-09T16:35:16.275978
32522 / tcp
-143458157 | 2025-03-08T17:15:23.339603
32622 / tcp
-1609971176 | 2025-03-21T04:00:18.883263
32764 / tcp
-1396196407 | 2025-03-10T17:13:44.499221
32800 / tcp
-617196093 | 2025-03-15T14:27:47.613286
32922 / tcp
568755661 | 2025-03-11T02:42:03.550803
33022 / tcp
74811379 | 2025-02-27T16:59:10.337318
33060 / tcp
389911705 | 2025-03-18T17:11:24.982661
33122 / tcp
-119275912 | 2025-03-04T14:42:35.948822
33222 / tcp
938964518 | 2025-03-20T00:35:03.540551
33322 / tcp
-1814027805 | 2025-02-23T17:56:42.960908
33389 / tcp
1359158599 | 2025-03-18T17:38:12.831739
33422 / tcp
-343220948 | 2025-03-19T17:44:46.505391
33522 / tcp
516497728 | 2025-03-20T14:48:19.005158
33622 / tcp
-1663183500 | 2025-03-08T19:57:27.714784
33722 / tcp
2014620702 | 2025-03-18T04:40:21.347909
33822 / tcp
-826171746 | 2025-03-18T11:36:46.142924
33922 / tcp
-363929083 | 2025-03-18T02:51:17.259724
34022 / tcp
-509974477 | 2025-03-20T17:38:36.931220
34222 / tcp
590116321 | 2025-03-20T02:21:01.389889
34225 / tcp
1699020053 | 2025-02-22T09:31:59.043801
34322 / tcp
12916129 | 2025-03-19T18:53:43.906939
34422 / tcp
-1426736769 | 2025-03-15T01:45:16.133307
34522 / tcp
842448652 | 2025-03-19T12:21:51.837330
34622 / tcp
-1936529415 | 2025-03-19T10:27:11.938344
34722 / tcp
-850768297 | 2025-03-04T00:28:47.522299
34822 / tcp
-1455237304 | 2025-03-19T07:14:05.616075
34922 / tcp
-411465431 | 2025-03-18T20:12:20.026442
35000 / tcp
801274298 | 2025-03-17T10:49:22.180420
35022 / tcp
403871072 | 2025-03-19T03:08:24.182810
35100 / tcp
-936073404 | 2025-02-24T08:32:47.703385
35122 / tcp
-1290074275 | 2025-03-19T01:27:40.273909
35222 / tcp
-1049382607 | 2025-03-18T09:51:50.364618
35241 / tcp
1630746822 | 2025-03-17T14:12:41.488526
35322 / tcp
1428673060 | 2025-03-17T09:19:02.240030
35422 / tcp
918585245 | 2025-03-18T23:39:59.758908
35522 / tcp
-720084265 | 2025-03-17T01:28:18.426501
35622 / tcp
-1621794056 | 2025-03-18T08:37:42.753198
35722 / tcp
1386433423 | 2025-03-17T10:47:34.835517
35822 / tcp
861498804 | 2025-03-17T18:27:58.056629
35922 / tcp
-1961581195 | 2025-03-16T21:47:21.077461
36022 / tcp
-31448199 | 2025-03-17T22:24:43.718496
36122 / tcp
-1487234147 | 2025-03-13T10:21:45.919461
36222 / tcp
-1932077845 | 2025-03-17T20:00:25.073473
36322 / tcp
1686503790 | 2025-03-17T12:28:42.057160
36422 / tcp
-29703277 | 2025-03-15T08:51:35.539797
36522 / tcp
-723700298 | 2025-03-18T17:05:03.783013
36622 / tcp
-1979024716 | 2025-03-16T08:17:12.109462
36722 / tcp
-292227068 | 2025-03-17T05:24:08.677634
36822 / tcp
-550534 | 2025-03-18T15:58:34.503555
36922 / tcp
-188336287 | 2025-03-18T13:18:47.176039
36984 / tcp
-151031496 | 2025-03-05T02:39:35.016699
37022 / tcp
-1706827414 | 2025-03-16T20:03:40.290541
37080 / tcp
489945226 | 2025-03-15T16:09:56.322616
37122 / tcp
1212928746 | 2025-03-16T23:40:56.839616
37215 / tcp
678163041 | 2025-02-26T13:22:06.165060
37222 / tcp
-60405417 | 2025-03-14T20:57:10.772089
37322 / tcp
402622355 | 2025-03-16T12:03:15.897499
37422 / tcp
1127418327 | 2025-03-15T15:21:40.229795
37522 / tcp
1674715730 | 2025-03-16T09:51:34.249296
37622 / tcp
1220773698 | 2025-03-16T02:26:14.251312
37722 / tcp
1401463564 | 2025-03-16T00:43:11.976976
37777 / tcp
-1041006212 | 2025-03-10T22:08:23.072339
37822 / tcp
-1177347064 | 2025-03-14T02:03:36.067999
37922 / tcp
1603831968 | 2025-03-18T01:19:29.333242
38022 / tcp
1908957745 | 2025-03-17T23:16:23.978930
38122 / tcp
1366999980 | 2025-03-15T17:48:44.970142
38322 / tcp
-1080430794 | 2025-03-15T14:06:43.781938
38333 / tcp
-1976297902 | 2025-03-15T22:27:03.799487
38522 / tcp
1298868685 | 2025-03-14T00:18:06.025620
38622 / tcp
-1640754732 | 2025-03-14T09:07:57.662596
38722 / tcp
630023892 | 2025-03-13T23:19:43.619663
38822 / tcp
-1257669602 | 2025-03-12T16:30:29.844058
38922 / tcp
-1822338460 | 2025-03-13T17:02:16.056696
39001 / tcp
-732568731 | 2025-03-16T09:44:22.210700
39022 / tcp
486185676 | 2025-03-13T20:48:25.664306
39122 / tcp
-299804506 | 2025-03-13T19:03:08.230652
39222 / tcp
-173428845 | 2025-03-13T20:38:35.473317
39322 / tcp
-1049458743 | 2025-03-11T12:34:20.198765
39422 / tcp
824957284 | 2025-03-11T13:14:22.434864
39522 / tcp
578931933 | 2025-03-11T10:18:26.842229
39622 / tcp
524966507 | 2025-03-11T08:13:10.553240
39922 / tcp
-1457934179 | 2025-02-26T17:42:05.423927
40000 / tcp
-1929512555 | 2025-03-21T04:12:25.752447
40005 / tcp
-745216308 | 2025-03-19T23:38:54.379749
40022 / tcp
1200263639 | 2025-03-09T11:12:57.708936
40099 / tcp
-1584839969 | 2025-03-13T07:23:24.293936
40122 / tcp
363385849 | 2025-02-26T14:14:27.514252
40222 / tcp
1029779254 | 2025-03-04T11:13:22.898707
40322 / tcp
981340609 | 2025-03-08T21:40:15.768293
40522 / tcp
-1167022067 | 2025-03-04T07:33:11.090221
40622 / tcp
1916757443 | 2025-02-26T12:31:26.975277
41122 / tcp
862988067 | 2025-02-27T16:00:17.874561
41222 / tcp
-2033494889 | 2025-03-05T01:15:38.316583
41443 / tcp
1864506114 | 2025-03-14T03:46:16.306075
41522 / tcp
-2025174878 | 2025-03-04T22:21:20.674937
41800 / tcp
-1438493700 | 2025-02-25T00:54:21.334785
41922 / tcp
-679113975 | 2025-03-07T16:28:41.924767
42022 / tcp
427338785 | 2025-03-04T17:15:46.890012
42122 / tcp
-762787475 | 2025-03-05T02:59:20.603995
42222 / tcp
-1671368227 | 2025-03-04T23:28:28.477274
42420 / tcp
-402917697 | 2025-03-04T20:37:58.965801
42422 / tcp
-2051005254 | 2025-03-04T20:19:19.878835
42901 / tcp
1370752579 | 2025-03-14T11:17:13.790916
42922 / tcp
-1580798011 | 2025-02-28T15:46:03.630341
43221 / tcp
855118264 | 2025-02-19T08:27:24.398309
43322 / tcp
1357809911 | 2025-02-27T22:10:42.539271
43422 / tcp
1718875536 | 2025-02-27T21:18:16.878630
43522 / tcp
-1581521247 | 2025-02-27T18:48:46.405553
43622 / tcp
-1646288285 | 2025-02-27T01:33:52.245173
43722 / tcp
1224860243 | 2025-02-27T04:11:17.583419
43822 / tcp
2131271383 | 2025-02-23T06:02:25.885121
43922 / tcp
-1742660067 | 2025-02-27T10:35:25.958887
44021 / tcp
1564663932 | 2025-02-26T02:11:29.245416
44022 / tcp
272385022 | 2025-02-27T09:53:17.309954
44122 / tcp
1331731985 | 2025-02-26T22:50:53.028396
44158 / tcp
-1990494084 | 2025-03-19T17:44:24.905506
44222 / tcp
-1008260758 | 2025-03-10T23:11:19.111678
44305 / tcp
-952427762 | 2025-03-15T18:45:14.944852
44320 / tcp
-12524752 | 2025-03-19T14:20:52.654730
44322 / tcp
580530390 | 2025-02-26T10:53:32.454375
44332 / tcp
1934966535 | 2025-03-18T18:07:19.555751
44334 / tcp
-710867994 | 2025-03-20T17:33:15.592510
44336 / tcp
-302357767 | 2025-03-13T10:53:00.796828
44337 / tcp
-634427477 | 2025-03-12T01:29:31.132545
44340 / tcp
-853473953 | 2025-03-17T02:21:37.385894
44350 / tcp
1609279430 | 2025-03-11T13:48:05.428083
44410 / tcp
-79934033 | 2025-03-06T20:38:29.099487
44420 / tcp
1741326753 | 2025-03-20T09:17:57.890623
44422 / tcp
-1384020832 | 2025-02-26T09:04:53.439791
44510 / tcp
-1397202695 | 2025-03-13T23:50:19.041993
44622 / tcp
629563299 | 2025-02-23T03:58:26.039058
44722 / tcp
481221376 | 2025-02-26T05:41:49.136421
44818 / tcp
767725671 | 2025-02-24T00:22:55.976886
45001 / tcp
1909313481 | 2025-03-20T09:46:53.223216
45003 / tcp
-1854422965 | 2025-03-17T06:42:35.031922
45006 / tcp
599823672 | 2025-03-09T14:49:41.359266
45022 / tcp
2094781042 | 2025-03-10T17:06:20.847529
45111 / tcp
1460852790 | 2025-03-04T15:36:53.407815
45122 / tcp
-616659390 | 2025-02-25T13:10:28.095612
45222 / tcp
1603906670 | 2025-02-25T19:41:28.835029
45322 / tcp
-40225972 | 2025-02-25T19:14:31.944975
45522 / tcp
-726768859 | 2025-02-25T16:32:57.779174
45622 / tcp
-370150081 | 2025-02-25T15:12:27.058711
45822 / tcp
1523837186 | 2025-03-10T13:03:49.313707
45886 / tcp
-537816538 | 2025-02-25T13:30:39.416106
45922 / tcp
2041052376 | 2025-03-10T14:39:47.274464
46022 / tcp
1104182778 | 2025-02-25T08:14:41.403259
46122 / tcp
-1587352165 | 2025-02-25T06:29:52.428890
46222 / tcp
-468797265 | 2025-02-24T23:31:25.231651
46422 / tcp
2018881481 | 2025-02-24T09:30:41.680890
46443 / tcp
1695882760 | 2025-03-19T04:11:02.129816
46622 / tcp
-1268926197 | 2025-02-24T05:33:32.442633
46862 / tcp
-382239993 | 2025-03-13T08:32:12.275917
46922 / tcp
-995649488 | 2025-02-24T00:49:05.867108
47000 / tcp
-1955947830 | 2025-03-06T13:49:49.909196
47001 / tcp
1948616586 | 2025-03-15T22:58:08.732665
47122 / tcp
1483388751 | 2025-02-23T23:16:36.663053
47222 / tcp
-884792201 | 2025-02-23T21:20:17.637790
47322 / tcp
-130049833 | 2025-02-25T04:43:02.086724
47422 / tcp
-808665070 | 2025-02-25T01:15:34.161955
47522 / tcp
-1239823902 | 2025-02-25T10:44:20.191466
47622 / tcp
307720803 | 2025-02-25T03:01:45.961328
47722 / tcp
-1298584533 | 2025-03-10T11:23:40.973131
47822 / tcp
220437119 | 2025-03-10T09:28:31.516468
47922 / tcp
1401463564 | 2025-03-10T07:51:12.824474
47990 / tcp
-595724579 | 2025-03-18T07:53:36.887368
48001 / tcp
1067197276 | 2025-03-18T20:21:57.365826
48022 / tcp
847190339 | 2025-03-07T11:21:19.475733
48222 / tcp
-1210778760 | 2025-03-10T04:18:15.100655
48322 / tcp
-39122574 | 2025-03-10T02:35:00.273469
48422 / tcp
1895613790 | 2025-03-10T00:49:52.658396
48522 / tcp
-1062335909 | 2025-03-09T23:07:25.195655
48622 / tcp
1820752983 | 2025-02-24T19:48:41.892242
48722 / tcp
279571477 | 2025-02-24T16:49:53.370239
48822 / tcp
-1146818521 | 2025-02-24T18:04:40.397305
48889 / tcp
1678748427 | 2025-03-13T10:01:39.567325
48922 / tcp
-61045474 | 2025-02-19T23:13:10.021586
49122 / tcp
327818156 | 2025-02-21T10:31:14.164086
49152 / tcp
1778168782 | 2025-03-20T07:28:34.898921
49210 / tcp
893492580 | 2025-03-06T14:07:46.820210
49222 / tcp
-1726106331 | 2025-02-23T00:30:03.636840
49322 / tcp
-1021854965 | 2025-02-20T22:02:01.196900
49422 / tcp
918204925 | 2025-02-23T02:14:53.381579
49501 / tcp
-206645019 | 2025-02-26T04:59:57.334505
49502 / tcp
-475388603 | 2025-02-23T23:46:40.052552
49622 / tcp
1500854189 | 2025-02-22T13:19:58.483655
49684 / tcp
-1830205037 | 2025-03-17T15:22:44.857111
49688 / tcp
506825920 | 2025-02-24T22:24:59.584267
49694 / tcp
1070868775 | 2025-03-11T11:25:57.996329
49722 / tcp
837089584 | 2025-02-23T00:38:17.364697
49822 / tcp
-1095630002 | 2025-02-22T20:56:42.988687
49922 / tcp
956198866 | 2025-02-22T19:11:56.410661
50000 / tcp
-1531769032 | 2025-03-20T23:59:12.649267
50001 / tcp
1556014089 | 2025-02-27T08:00:40.386912
50002 / tcp
49484225 | 2025-03-18T10:08:23.215021
50022 / tcp
-200141509 | 2025-02-22T11:33:58.284734
50050 / tcp
1208823540 | 2025-03-18T00:43:45.937172
50073 / tcp
-395427084 | 2025-03-06T05:08:59.864870
50085 / tcp
-1588470421 | 2025-02-28T05:24:37.352115
50100 / tcp
387580613 | 2025-02-25T19:20:16.655041
50101 / tcp
2019904789 | 2025-03-17T00:29:20.681224
50103 / tcp
669527024 | 2025-03-16T19:42:55.877378
50104 / tcp
-313312528 | 2025-02-23T23:20:57.821188
50160 / tcp
1680401304 | 2025-03-17T11:10:51.603665
50222 / tcp
544316136 | 2025-02-22T07:47:14.007234
50443 / tcp
191746700 | 2025-03-11T04:50:30.357612
50500 / tcp
1807316849 | 2025-02-26T18:37:59.381759
50622 / tcp
-1465129084 | 2025-02-21T20:21:11.088856
50722 / tcp
-213857265 | 2025-02-21T01:18:00.307947
50805 / tcp
-1015655604 | 2025-03-07T13:37:49.160808
50822 / tcp
348189159 | 2025-02-20T20:17:01.239832
50922 / tcp
1375840935 | 2025-02-21T16:40:30.379993
51003 / tcp
-793377030 | 2025-02-28T06:12:50.992016
51007 / tcp
611332140 | 2025-02-28T21:10:08.907773
51106 / tcp
1775204867 | 2025-03-20T10:48:06.640977
51222 / tcp
-39016754 | 2025-02-21T13:14:56.647267
51235 / tcp
2117268175 | 2025-02-27T03:24:51.237148
51294 / tcp
1235676008 | 2025-02-24T09:02:22.181995
51322 / tcp
-237572548 | 2025-02-21T12:06:38.393694
51422 / tcp
-1000154089 | 2025-02-21T08:30:08.498186
51622 / tcp
-450114902 | 2025-02-21T03:16:34.364517
51822 / tcp
1736904991 | 2025-02-20T16:48:19.648972
51922 / tcp
1269859384 | 2025-02-20T09:53:49.108787
52022 / tcp
-1825039336 | 2025-03-07T01:07:23.955165
52122 / tcp
917577018 | 2025-02-20T08:06:47.527956
52322 / tcp
-620019926 | 2025-02-20T06:21:46.187355
52522 / tcp
656422905 | 2025-02-19T09:09:32.733710
52536 / tcp
-326051216 | 2025-02-20T06:59:21.292323
52622 / tcp
-898238269 | 2025-02-20T01:04:17.575195
52822 / tcp
15370016 | 2025-02-19T21:30:33.373002
52869 / tcp
1428380152 | 2025-03-04T14:09:29.370150
52931 / tcp
-1650994795 | 2025-02-26T09:21:10.135357
53022 / tcp
-1243348084 | 2025-03-07T08:33:15.455248
53200 / tcp
1827645524 | 2025-03-18T02:24:14.336360
53322 / tcp
-1342351358 | 2025-02-19T16:12:20.286860
53481 / tcp
-926231723 | 2025-03-20T09:58:47.516502
53522 / tcp
-578051894 | 2025-02-19T15:03:56.889256
53622 / tcp
-1716286569 | 2025-02-19T12:42:39.050122
53806 / tcp
1728618573 | 2025-03-06T15:32:01.170588
53922 / tcp
256417436 | 2025-02-19T08:02:59.033949
54022 / tcp
-1371549635 | 2025-02-19T06:04:44.531211
54138 / tcp
295652808 | 2025-02-27T20:20:03.717048
54857 / tcp
-269406940 | 2025-03-04T05:54:47.559844
54922 / tcp
544927970 | 2025-03-07T10:45:44.186604
55000 / tcp
323436422 | 2025-03-19T23:29:54.907501
55022 / tcp
-310026850 | 2025-03-07T04:28:01.812451
55222 / tcp
-1300772584 | 2025-03-07T03:10:59.643454
55422 / tcp
1679029770 | 2025-03-06T18:13:48.094608
55442 / tcp
0 | 2025-03-21T00:20:25.773444
55443 / tcp
-1758663047 | 2025-03-19T15:50:52.678191
55470 / tcp
-1906405359 | 2025-02-24T18:49:00.682813
55481 / tcp
-168372893 | 2025-02-19T16:55:01.901032
55522 / tcp
-1781655531 | 2025-03-06T23:24:35.364131
55553 / tcp
291416009 | 2025-03-18T18:45:50.687120
55554 / tcp
583970992 | 2025-03-20T09:05:18.007489
55622 / tcp
-995288707 | 2025-03-06T17:40:23.148742
55822 / tcp
1542865218 | 2025-03-06T21:38:57.971043
57522 / tcp
218529768 | 2025-03-06T13:13:04.957305
57784 / tcp
1150243882 | 2025-03-09T15:02:42.032227
57786 / tcp
-2085946681 | 2025-03-11T10:04:16.302596
57787 / tcp
2109529148 | 2025-03-13T16:19:44.526579
57822 / tcp
-374106675 | 2025-03-06T06:38:55.020180
57922 / tcp
-1434605435 | 2025-03-06T04:57:04.827923
58000 / tcp
-1377476160 | 2025-03-16T15:48:22.644818
58122 / tcp
402308071 | 2025-03-06T03:41:14.524622
58222 / tcp
-2011187073 | 2025-03-06T01:39:15.413095
58378 / tcp
-139346171 | 2025-03-14T20:50:40.516146
58392 / tcp
1201879520 | 2025-02-26T11:34:23.292034
58422 / tcp
1916880443 | 2025-03-05T21:59:16.465115
58443 / tcp
-1985322857 | 2025-03-08T13:50:56.092774
58522 / tcp
74635588 | 2025-03-05T20:15:53.122628
58532 / tcp
604394981 | 2025-03-18T14:31:25.356560
58722 / tcp
855642306 | 2025-03-05T18:42:31.766140
58822 / tcp
140136825 | 2025-03-05T16:49:32.278940
58922 / tcp
-743754273 | 2025-03-05T15:20:57.660853
59012 / tcp
688867761 | 2025-02-26T09:14:03.826369
59022 / tcp
-411888921 | 2025-03-05T13:22:43.933088
59122 / tcp
296035385 | 2025-03-05T11:41:22.806846
59222 / tcp
-284323345 | 2025-03-05T09:57:17.233561
59322 / tcp
-1297461326 | 2025-03-05T08:11:54.143970
59443 / tcp
1937533383 | 2025-03-08T22:20:17.067527
59522 / tcp
1058605823 | 2025-03-03T19:04:11.969610
60001 / tcp
762031964 | 2025-03-15T03:10:38.748005
60010 / tcp
1014106017 | 2025-03-18T13:47:51.906521
60030 / tcp
604810445 | 2025-03-19T17:02:13.459606
60099 / tcp
-991642327 | 2025-03-16T02:46:44.876069
60102 / tcp
846420209 | 2025-02-27T08:00:24.275633
60129 / tcp
-1535420773 | 2025-03-20T05:19:01.381526
61613 / tcp
1188110683 | 2025-03-17T04:08:47.311753
61616 / tcp
-506144885 | 2025-03-20T09:07:34.716930
61617 / tcp
2008891383 | 2025-03-11T22:37:49.723879
61619 / tcp
1011655472 | 2025-03-12T07:12:20.293421
62016 / tcp
-1005072299 | 2025-02-21T11:14:12.013439
62078 / tcp
453197220 | 2025-03-20T12:31:06.799907
62237 / tcp
-392609004 | 2025-03-14T01:21:10.315139
62443 / tcp
1786971308 | 2025-02-21T21:17:37.799420
63210 / tcp
2144757241 | 2025-03-18T07:03:59.723724
63256 / tcp
487707539 | 2025-03-07T13:03:49.322349
63257 / tcp
2088495833 | 2025-03-11T15:00:21.797334
63260 / tcp
-582565430 | 2025-03-14T03:04:16.385557
63676 / tcp
-1668272671 | 2025-03-16T23:03:27.866874
64295 / tcp
461307293 | 2025-03-20T00:01:51.284287
64671 / tcp
766761826 | 2025-03-10T21:35:26.434186
64683 / tcp
1722667711 | 2025-03-17T12:31:48.572216
64738 / tcp
-576679093 | 2025-03-15T04:55:24.456568
65000 / tcp
-1721757029 | 2025-03-15T16:44:51.409741
65432 / tcp
-876779457 | 2025-02-20T23:15:43.808929



Contact Us

Shodan ® - All rights reserved