139.196.119.71

Regular View Raw Data Timeline
Last Seen: 2025-03-22

GeneralInformation

Hostnames cn-shanghai.oss-vpc.aliyuncs.com
cn-shanghai.oss.aliyuncs.com
Domains aliyuncs.com 
Country China
City Shanghai
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2024(2)
CVE-2024-25117
6.8php-svg-lib is a scalable vector graphics (SVG) file parsing/rendering library. Prior to version 0.5.2, php-svg-lib fails to validate that font-family doesn't contain a PHAR url, which might leads to RCE on PHP < 8.0, and doesn't validate if external references are allowed. This might leads to bypass of restrictions or RCE on projects that are using it, if they do not strictly revalidate the fontName that is passed by php-svg-lib. The `Style::fromAttributes(`), or the `Style::parseCssStyle()` should check the content of the `font-family` and prevents it to use a PHAR url, to avoid passing an invalid and dangerous `fontName` value to other libraries. The same check as done in the `Style::fromStyleSheets` might be reused. Libraries using this library as a dependency might be vulnerable to some bypass of restrictions, or even remote code execution, if they do not double check the value of the `fontName` that is passed by php-svg-lib. Version 0.5.2 contains a fix for this issue.
CVE-2024-6387
8.1A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2022(3)
CVE-2022-31629
6.5In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
CVE-2022-31628
2.3In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
CVE-2022-4900
6.2A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.
2021(2)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020(3)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
CVE-2020-11579
7.5An issue was discovered in Chadha PHPKB 9.0 Enterprise Edition. installer/test-connection.php (part of the installation process) allows a remote unauthenticated attacker to disclose local files on hosts running PHP before 7.2.16, or on hosts where the MySQL ALLOW LOCAL DATA INFILE option is enabled.
2019(13)
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-9641
9.8An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.
CVE-2019-9639
7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.
CVE-2019-9638
7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len.
CVE-2019-9637
7.5An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
CVE-2019-9024
7.5An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.
CVE-2019-9023
9.8An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.
CVE-2019-9021
9.8An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.
CVE-2019-9020
9.8An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.
CVE-2019-6977
8.8gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(19)
CVE-2018-20783
7.5In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c.
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-19520
8.8An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management.
CVE-2018-19396
7.5ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
CVE-2018-19395
7.5ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
CVE-2018-17082
6.1The Apache2 component in PHP before 5.6.38, 7.0.x before 7.0.32, 7.1.x before 7.1.22, and 7.2.x before 7.2.10 allows XSS via the body of a "Transfer-Encoding: chunked" request, because the bucket brigade is mishandled in the php_handler function in sapi/apache2handler/sapi_apache2.c.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2018-15132
7.5An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.
CVE-2018-14883
7.5An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.
CVE-2018-14851
5.5exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.
CVE-2018-10549
8.8An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
CVE-2018-10548
7.5An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.
CVE-2018-10547
6.1An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
CVE-2018-10546
7.5An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
CVE-2018-10545
4.7An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.
CVE-2018-7584
9.8In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
CVE-2018-5712
6.1An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.
CVE-2018-5711
5.5gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
2017(16)
CVE-2017-16642
7.5In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2017-12933
9.8The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
CVE-2017-12868
9.8The secureCompare method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.13 and earlier, when used with PHP before 5.6, allows attackers to conduct session fixation attacks or possibly bypass authentication by leveraging missing character conversions before an XOR operation.
CVE-2017-11628
7.8In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
CVE-2017-11147
9.1In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
CVE-2017-11145
7.5In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.
CVE-2017-11144
7.5In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.
CVE-2017-11143
7.5In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
CVE-2017-11142
7.5In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.
CVE-2017-9226
9.8An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
CVE-2017-9224
9.8An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.
CVE-2017-8923
9.8The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
CVE-2017-7963
7.5The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating "There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.
CVE-2017-7890
6.5The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.
CVE-2017-7272
7.4PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
2016(83)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10712
7.5In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10397
7.5In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).
CVE-2016-10161
7.5The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call.
CVE-2016-10159
7.5Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive.
CVE-2016-10158
7.5The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-9935
9.8The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.
CVE-2016-9934
7.5ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted serialized data in a wddxPacket XML document, as demonstrated by a PDORow string.
CVE-2016-9933
7.5Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.
CVE-2016-9138
9.8PHP through 5.6.27 and 7.x through 7.0.12 mishandles property modification during __wakeup processing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data, as demonstrated by Exception::__toString with DateInterval::__wakeup.
CVE-2016-9137
9.8Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.
CVE-2016-8670
9.8Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.
CVE-2016-7478
7.5Zend/zend_exceptions.c in PHP, possibly 5.x before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (infinite loop) via a crafted Exception object in serialized data, a related issue to CVE-2015-8876.
CVE-2016-7418
7.5The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service (invalid pointer access and out-of-bounds read) or possibly have unspecified other impact via an incorrect boolean element in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
CVE-2016-7417
9.8ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.
CVE-2016-7416
7.5ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x before 7.0.11 does not properly restrict the locale length provided to the Locale class in the ICU library, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a MessageFormatter::formatMessage call with a long first argument.
CVE-2016-7414
9.8The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.
CVE-2016-7413
9.8Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call.
CVE-2016-7412
8.1ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata.
CVE-2016-7411
9.8ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles object-deserialization failures, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an unserialize call that references a partially constructed object.
CVE-2016-7132
7.5ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray element inside a boolean element, leading to incorrect pop processing.
CVE-2016-7131
7.5ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via a malformed wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a tag that lacks a < (less than) character.
CVE-2016-7130
7.5The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid base64 binary value, as demonstrated by a wddx_deserialize call that mishandles a binary element in a wddxPacket XML document.
CVE-2016-7129
9.8The php_wddx_process_data function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via an invalid ISO 8601 time value, as demonstrated by a wddx_deserialize call that mishandles a dateTime element in a wddxPacket XML document.
CVE-2016-7128
5.3The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset that exceeds the file size, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image.
CVE-2016-7127
9.8The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate gamma values, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by providing different signs for the second and third arguments.
CVE-2016-7126
9.8The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value in the third argument.
CVE-2016-7125
7.5ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
CVE-2016-7124
9.8ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call.
CVE-2016-6297
8.8Integer overflow in the php_stream_zip_opener function in ext/zip/zip_stream.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted zip:// URL.
CVE-2016-6296
9.8Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.
CVE-2016-6295
9.8ext/snmp/snmp.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via crafted serialized data, a related issue to CVE-2016-5773.
CVE-2016-6294
9.8The locale_accept_from_http function in ext/intl/locale/locale_methods.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument.
CVE-2016-6292
6.5The exif_process_user_comment function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted JPEG image.
CVE-2016-6291
9.8The exif_process_IFD_in_MAKERNOTE function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds array access and memory corruption), obtain sensitive information from process memory, or possibly have unspecified other impact via a crafted JPEG image.
CVE-2016-6290
9.8ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.
CVE-2016-6289
7.8Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive.
CVE-2016-6288
9.8The php_url_parse_ex function in ext/standard/url.c in PHP before 5.5.38 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via vectors involving the smart_str data type.
CVE-2016-6207
6.5Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
CVE-2016-5773
9.8php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data containing a ZipArchive object.
CVE-2016-5772
9.8Double free vulnerability in the php_wddx_process_data function in wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted XML data that is mishandled in a wddx_deserialize call.
CVE-2016-5771
9.8spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.
CVE-2016-5770
9.8Integer overflow in the SplFileObject::fread function in spl_directory.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer argument, a related issue to CVE-2016-5096.
CVE-2016-5769
9.8Multiple integer overflows in mcrypt.c in the mcrypt extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted length value, related to the (1) mcrypt_generic and (2) mdecrypt_generic functions.
CVE-2016-5768
9.8Double free vulnerability in the _php_mb_regex_ereg_replace_exec function in php_mbregex.c in the mbstring extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by leveraging a callback exception.
CVE-2016-5767
8.8Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
CVE-2016-5766
8.8Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.
CVE-2016-5399
7.8The bzread function in ext/bz2/bz2.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted bz2 archive.
CVE-2016-5385
8.1PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.
CVE-2016-5116
9.1gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name.
CVE-2016-5114
9.1sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstrated by a long URI in a configuration with custom REQUEST_URI logging.
CVE-2016-5096
8.6Integer overflow in the fread function in ext/standard/file.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer in the second argument.
CVE-2016-5095
8.6Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.
CVE-2016-5094
8.6Integer overflow in the php_html_entities function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from the htmlspecialchars function.
CVE-2016-5093
8.6The get_icu_value_internal function in ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\0' character, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted locale_get_primary_language call.
CVE-2016-4544
9.8The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate TIFF start data, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
CVE-2016-4543
9.8The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
CVE-2016-4542
9.8The exif_process_IFD_TAG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not properly construct spprintf arguments, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
CVE-2016-4541
9.8The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.
CVE-2016-4540
9.8The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.
CVE-2016-4539
9.8The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero.
CVE-2016-4538
9.8The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 modifies certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.
CVE-2016-4537
9.8The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer for the scale argument, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.
CVE-2016-4343
8.8The phar_make_dirstream function in ext/phar/dirstream.c in PHP before 5.6.18 and 7.x before 7.0.3 mishandles zero-size ././@LongLink files, which allows remote attackers to cause a denial of service (uninitialized pointer dereference) or possibly have unspecified other impact via a crafted TAR archive.
CVE-2016-4342
8.8ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive.
CVE-2016-4073
9.8Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call.
CVE-2016-4072
9.8The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.
CVE-2016-4071
9.8Format string vulnerability in the php_snmp_error function in ext/snmp/snmp.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via format string specifiers in an SNMP::get call.
CVE-2016-4070
7.5Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not).
CVE-2016-3185
7.1The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c.
CVE-2016-3142
8.2The phar_parse_zipfile function in zip.c in the PHAR extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location.
CVE-2016-3141
9.8Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-3074
9.8Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.
CVE-2016-2554
9.8Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-1903
9.1The gdImageRotateInterpolated function in ext/gd/libgd/gd_interpolation.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a large bgd_color argument to the imagerotate function.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015(80)
CVE-2015-9253
6.5An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
CVE-2015-8994
7.5An issue was discovered in PHP 5.x and 7.x, when the configuration uses apache2handler/mod_php or php-fpm with OpCache enabled. With 5.x after 5.6.28 or 7.x after 7.0.13, the issue is resolved in a non-default configuration with the opcache.validate_permission=1 setting. The vulnerability details are as follows. In PHP SAPIs where PHP interpreters share a common parent process, Zend OpCache creates a shared memory object owned by the common parent during initialization. Child PHP processes inherit the SHM descriptor, using it to cache and retrieve compiled script bytecode ("opcode" in PHP jargon). Cache keys vary depending on configuration, but filename is a central key component, and compiled opcode can generally be run if a script's filename is known or can be guessed. Many common shared-hosting configurations change EUID in child processes to enforce privilege separation among hosted users (for example using mod_ruid2 for the Apache HTTP Server, or php-fpm user settings). In these scenarios, the default Zend OpCache behavior defeats script file permissions by sharing a single SHM cache among all child PHP processes. PHP scripts often contain sensitive information: Think of CMS configurations where reading or running another user's script usually means gaining privileges to the CMS database.
CVE-2015-8935
6.1The sapi_header_op function in main/SAPI.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 supports deprecated line folding without considering browser compatibility, which allows remote attackers to conduct cross-site scripting (XSS) attacks against Internet Explorer by leveraging (1) %0A%20 or (2) %0D%0A%20 mishandling in the header function.
CVE-2015-8879
7.5The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table.
CVE-2015-8878
5.9main/php_open_temporary_file.c in PHP before 5.5.28 and 5.6.x before 5.6.12 does not ensure thread safety, which allows remote attackers to cause a denial of service (race condition and heap memory corruption) by leveraging an application that performs many temporary-file accesses.
CVE-2015-8877
7.5The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function.
CVE-2015-8876
9.8Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not validate certain Exception objects, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data.
CVE-2015-8874
7.5Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call.
CVE-2015-8873
7.5Stack consumption vulnerability in Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to cause a denial of service (segmentation fault) via recursive method calls.
CVE-2015-8867
7.5The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
CVE-2015-8866
9.6ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when PHP-FPM is used, does not isolate each thread from libxml_disable_entity_loader changes in other threads, which allows remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161.
CVE-2015-8865
7.3The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly execute arbitrary code via a crafted magic file.
CVE-2015-8838
5.9ext/mysqlnd/mysqlnd.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 uses a client SSL option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
CVE-2015-8835
9.8The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not properly retrieve keys, which allows remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c.
CVE-2015-8394
9.8PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-8393
7.5pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.
CVE-2015-8391
9.8The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-8390
9.8PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-8389
9.8PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-8387
7.3PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-8386
9.8PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-8383
9.8PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-7804
6.8Off-by-one error in the phar_parse_zipfile function in ext/phar/zip.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (uninitialized pointer dereference and application crash) by including the / filename in a .zip PHAR archive.
CVE-2015-7803
6.8The phar_get_entry_data function in ext/phar/util.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that does not exist.
CVE-2015-6838
7.5The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation after the principal argument loop, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837.
CVE-2015-6837
7.5The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation during initial error checking, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838.
CVE-2015-6836
7.3The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
CVE-2015-6835
9.8The session deserializer in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 mishandles multiple php_var_unserialize calls, which allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted session content.
CVE-2015-6834
9.8Multiple use-after-free vulnerabilities in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 allow remote attackers to execute arbitrary code via vectors related to (1) the Serializable interface, (2) the SplObjectStorage class, and (3) the SplDoublyLinkedList class, which are mishandled during unserialization.
CVE-2015-6833
7.5Directory traversal vulnerability in the PharData class in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call.
CVE-2015-6832
7.3Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
CVE-2015-6831
7.3Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5590
7.3Stack-based buffer overflow in the phar_fix_filepath function in ext/phar/phar.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value, as demonstrated by mishandling of an e-mail attachment by the imap PHP extension.
CVE-2015-5589
9.8The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted TAR archive that is mishandled in a Phar::convertToData call.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
CVE-2015-4644
7.5The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not validate token extraction for table names, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352.
CVE-2015-4643
9.8Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022.
CVE-2015-4642
9.8The escapeshellarg function in ext/standard/exec.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 on Windows allows remote attackers to execute arbitrary OS commands via a crafted string to an application that accepts command-line arguments for a call to the PHP system function.
CVE-2015-4605
7.5The mcopy function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly restrict a certain offset value, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a "Python script text executable" rule.
CVE-2015-4604
7.5The mget function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly maintain a certain pointer relationship, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a "Python script text executable" rule.
CVE-2015-4603
9.8The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
CVE-2015-4602
9.8The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
CVE-2015-4601
9.8PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600.
CVE-2015-4600
9.8The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.
CVE-2015-4599
9.8The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
CVE-2015-4598
6.5PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.
CVE-2015-4148
5.0The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.
CVE-2015-4147
7.5The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a "type confusion" issue.
CVE-2015-4116
9.8Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP before 5.5.27 and 5.6.x before 5.6.11 allows remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation.
CVE-2015-4026
7.5The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
CVE-2015-4025
7.5PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
CVE-2015-4024
5.0Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
CVE-2015-4022
7.5Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
CVE-2015-4021
5.0The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.
CVE-2015-3416
7.5The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
CVE-2015-3415
7.5The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
CVE-2015-3414
7.5SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
CVE-2015-3412
5.3PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.
CVE-2015-3411
6.5PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.
CVE-2015-3330
6.8The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via pipelined HTTP requests that result in a "deconfigured interpreter."
CVE-2015-3329
7.5Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
CVE-2015-3307
7.5The phar_parse_metadata function in ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (heap metadata corruption) or possibly have unspecified other impact via a crafted tar archive.
CVE-2015-3152
5.9Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
CVE-2015-2787
7.5Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.
CVE-2015-2783
5.8ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.
CVE-2015-2348
5.0The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
CVE-2015-2331
7.5Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.
CVE-2015-2326
5.5The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".
CVE-2015-2325
7.8The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
CVE-2015-2305
6.8Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
CVE-2015-2301
7.5Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.
CVE-2015-1352
5.0The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP through 5.6.7 does not validate token extraction for table names, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.
CVE-2015-1351
7.5Use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c in the OPcache extension in PHP through 5.6.7 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
CVE-2015-0273
7.5Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allow remote attackers to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function.
CVE-2015-0235
10Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
CVE-2015-0232
6.8The exif_process_unicode function in ext/exif/exif.c in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image.
CVE-2015-0231
7.5Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.
2014(40)
CVE-2014-9912
9.8The get_icu_disp_value_src_php function in ext/intl/locale/locale_methods.c in PHP before 5.3.29, 5.4.x before 5.4.30, and 5.5.x before 5.5.14 does not properly restrict calls to the ICU uresbund.cpp component, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a locale_get_display_name call with a long first argument.
CVE-2014-9767
4.3Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive.
CVE-2014-9709
5.0The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.
CVE-2014-9705
7.5Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.
CVE-2014-9653
7.5readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.
CVE-2014-9652
5.0The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
CVE-2014-9427
7.5sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.
CVE-2014-9426
7.3The apprentice_load function in libmagic/apprentice.c in the Fileinfo component in PHP through 5.6.4 attempts to perform a free operation on a stack-based character array, which allows remote attackers to cause a denial of service (memory corruption or application crash) or possibly have unspecified other impact via unknown vectors. NOTE: this is disputed by the vendor because the standard erealloc behavior makes the free operation unreachable
CVE-2014-9425
7.5Double free vulnerability in the zend_ts_hash_graceful_destroy function in zend_ts_hash.c in the Zend Engine in PHP through 5.5.20 and 5.6.x through 5.6.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
CVE-2014-8142
7.5Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.
CVE-2014-5459
3.6The PEAR_REST class in REST.php in PEAR in PHP through 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.
CVE-2014-5120
6.4gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.
CVE-2014-4721
2.6The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.
CVE-2014-4698
4.6Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments.
CVE-2014-4670
4.6Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.
CVE-2014-4049
5.1Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.
CVE-2014-3981
3.3acinclude.m4, as used in the configure script in PHP 5.5.13 and earlier, allows local users to overwrite arbitrary files via a symlink attack on the /tmp/phpglibccheck file.
CVE-2014-3710
5.0The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
CVE-2014-3670
6.8The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function.
CVE-2014-3669
7.5Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value.
CVE-2014-3668
5.0Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation.
CVE-2014-3597
6.8Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP before 5.4.32 and 5.5.x before 5.5.16 allow remote DNS servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted DNS record, related to the dns_get_record function and the dn_expand function. NOTE: this issue exists because of an incomplete fix for CVE-2014-4049.
CVE-2014-3587
4.3Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1571.
CVE-2014-3538
5.0file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345.
CVE-2014-3515
7.5The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.
CVE-2014-3487
4.3The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
CVE-2014-3480
4.3The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
CVE-2014-3479
4.3The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.
CVE-2014-3478
5.0Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-2497
4.3The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.
CVE-2014-2270
4.3softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
CVE-2014-1943
5.0Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
CVE-2014-0238
5.0The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long.
CVE-2014-0237
5.0The cdf_unpack_summary_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (performance degradation) by triggering many file_printf calls.
CVE-2014-0236
7.5file before 5.18, as used in the Fileinfo component in PHP before 5.6.0, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a zero root_storage value in a CDF file, related to cdf.c and readcdf.c.
CVE-2014-0207
4.3The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.
CVE-2014-0185
7.2sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
2013(4)
CVE-2013-7456
7.6gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.1.1, as used in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7, allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted image that is mishandled by the imagescale function.
CVE-2013-7345
5.0The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.
CVE-2013-6501
4.6The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2012(1)
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011(2)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010(3)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(2)
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

OpenPorts

1117192123254349517079809596979910210411111311912113514317517919522231131434038942744244344445348750250351351554855459363666677178980888088895399299399510231025105010991153117711881234123512921293133713431344137713881414143315151521159916041700172318001801183018831926195719621970200020022008204820562062206720702078208020812083208720902091210321212126215021542195220022022211222222322323233223452376238224042444250625532559256125622568262827612762299530013013305030603063306530713077307930833094309831333134314531473157315931623256326032683269329933103388338934053408341034433558357237903793400040224064416041904242428243214369443344344437444344444500450545724821484049114949500150045006500750105140517252225224523352385253525752625269543554395456556955915604561356725804585859105917593859845985598660006001600260066009606063796443650065436581663366666667666866976775700171007171717373027401741574437493754876347654768777787799798080018009801380238024802880298031803680378046804980588069807480788081808280838085808780998110811581258129813081398140814381538160817181748178818181848191819782008249825182848291831783188333840284068407841084158416841784218422845184858502850585068510854485458551855485648566857085748593859685998605862186438649872887718812882288478851885688648867888088848899890789088916900190029008901090179018902690309034904290499051906390669074907890919092909591009101910591109113911791259134914391449148915191539155916091639164916991939197919992039211921892239226924392449301930493069309931093339351939894189443953096339802987698859898990999289943994499979999100011000910020100241002610031100371003910050100511013410210102501025510348103981044310935110001106511112112101128811300116801200012001120841210912115121171211912120121261212912132121411214212143121491215112152121621216512172121731217612178121821218412185122031221412218122191223012232122411224312255122921229912311123151231612326123331234212345123461236012362123731237412375123911239812405124111241512418124381244012443124501245212466124731247612477124781248612488124891249212496125021252012528125331253512541125471255512556125571256212566125781257912582125871402614082141471426514344144061452414825150011503815042154431600616007160091602516029160451606316069160911610316402168311701017084180041801418020180281803618055180591806918076180811808618200182451836818553190001909119443199302000120084201512020020443205472080020880208942100221025210812123321234212502125121252212552125721286213072131421325213272137922206225562418124245244722500625565257822665627015270172710528015280802984229984300023000330006300083001930022301223012330301303223042230468305223082230922317223182231922320013202232122323033232232422326223276432922330223306033122332223342233522336223372234022341223442234522346223472234822350003510135122352223524035241352503532235422355223582236022361223632236522366223692236984372153722237322375223762237722377773782237922380223832238333385223862238722388223892239122392223932239622398223992240022401224032240622407224102241122414434152241800418224222242422429014322243422435224362243722438224392244022441004415844303444004442244444445204481845122452224532245522457864582145888459224602246122462224644346522470804712247222473224742247522476224772247990481004812248222483224862248722491224915249622496824982249922500005001350050500735010050222505225062250722508225099550996512355132251422514435192252122525365341353480534855413855000550225538855422555225555355554556225572257022579225842258522585325872258922590225912259222593225944359522600016002261613616166161761619620786321063256632576473865000
11 / tcp
1911457608 | 2025-02-28T18:16:08.871724
17 / tcp
-82008689 | 2025-03-03T18:25:47.845154
19 / tcp
1978059005 | 2025-03-20T19:22:21.311065
21 / tcp
-1248408558 | 2025-03-13T06:37:57.143472
23 / tcp
-1288412979 | 2025-03-22T04:28:23.751192
25 / tcp
-1839934832 | 2025-03-20T22:19:39.671945
43 / tcp
-79865617 | 2025-03-16T04:46:48.330133
49 / tcp
1685693176 | 2025-03-20T14:57:27.463508
51 / tcp
819727972 | 2025-03-20T19:13:11.407677
70 / tcp
-1056270173 | 2025-03-17T22:10:37.529391
79 / tcp
-877598700 | 2025-03-18T07:48:22.557476
80 / tcp
2094639657 | 2025-03-18T19:59:27.696430
95 / tcp
-2096652808 | 2025-03-06T00:59:30.455837
96 / tcp
-1399940268 | 2025-03-17T05:09:37.943444
97 / tcp
-1888448627 | 2025-02-23T04:33:51.109464
99 / tcp
1713556628 | 2025-02-26T20:25:40.753177
102 / tcp
740837454 | 2025-03-15T07:01:00.312402
104 / tcp
1911457608 | 2025-03-06T10:02:56.161792
111 / tcp
366084633 | 2025-03-17T03:14:28.577353
113 / tcp
1921398876 | 2025-03-10T01:42:23.052419
119 / tcp
141730637 | 2025-03-16T12:14:09.444158
121 / tcp
-122096153 | 2025-03-16T14:17:56.961725
135 / tcp
1141948216 | 2025-03-16T22:05:42.054931
143 / tcp
-100373866 | 2025-03-21T16:50:40.013191
175 / tcp
-1399940268 | 2025-03-17T20:30:26.447321
179 / tcp
-399606100 | 2025-03-18T02:22:02.592868
195 / tcp
1690634669 | 2025-03-10T11:22:10.017504
222 / tcp
-926139304 | 2025-02-20T09:27:38.032429
311 / tcp
-1547976805 | 2025-03-06T15:54:36.930844
314 / tcp
-1839934832 | 2025-03-15T15:39:47.917222
340 / tcp
1770729856 | 2025-03-13T07:02:48.654753
389 / tcp
-1743283776 | 2025-02-24T08:46:25.455989
427 / tcp
1801635450 | 2025-03-19T11:32:05.971158
442 / tcp
-297128567 | 2025-03-19T19:17:26.598874
443 / tcp
-1651963754 | 2025-03-13T21:36:21.098477
444 / tcp
2087396567 | 2025-03-15T12:13:25.249898
453 / tcp
-1059554316 | 2025-02-25T21:30:40.378752
487 / tcp
1761482307 | 2025-03-18T21:48:38.372939
502 / tcp
-2096652808 | 2025-03-05T05:56:09.458712
503 / tcp
-1399940268 | 2025-03-11T18:52:03.950703
513 / tcp
-1399940268 | 2025-02-25T21:40:41.340056
515 / tcp
1308377066 | 2025-03-12T16:03:16.648037
548 / tcp
-1769206458 | 2025-03-12T13:56:59.318218
554 / tcp
902688621 | 2025-03-06T12:43:59.315171
593 / tcp
-1112304903 | 2025-03-04T18:55:30.324097
636 / tcp
826560219 | 2025-02-20T16:12:21.303938
666 / tcp
-1960639992 | 2025-02-23T11:11:13.962714
771 / tcp
639175818 | 2025-03-12T03:12:25.792516
789 / tcp
-1399940268 | 2025-03-14T10:37:57.064844
808 / tcp
-1166978945 | 2025-02-20T20:42:56.879408
880 / tcp
-1256415508 | 2025-03-11T05:15:19.751025
888 / tcp
20021069 | 2025-03-19T22:57:12.496866
953 / tcp
-1399940268 | 2025-03-18T23:20:09.513900
992 / tcp
-936692830 | 2025-03-18T05:23:17.202173
993 / tcp
-1399940268 | 2025-03-18T13:50:57.277999
995 / tcp
-1199842642 | 2025-03-13T04:25:14.412737
1023 / tcp
504717326 | 2025-03-10T14:29:24.145210
1025 / tcp
-1737707071 | 2025-03-07T05:39:31.772978
1050 / tcp
-1839934832 | 2025-03-09T15:37:55.106309
1099 / tcp
-2096652808 | 2025-03-13T22:05:26.777807
1153 / tcp
-1399940268 | 2025-02-25T00:16:22.793827
1177 / tcp
2087396567 | 2025-02-22T00:58:48.335504
1188 / tcp
1911457608 | 2025-03-11T16:34:37.190235
1234 / tcp
1911457608 | 2025-03-09T23:34:36.517470
1235 / tcp
-585940771 | 2025-03-21T00:09:11.800606
1292 / tcp
-274082663 | 2025-03-09T04:36:30.638738
1293 / tcp
-1139539254 | 2025-03-04T20:04:49.644573
1337 / tcp
660175493 | 2025-02-21T15:57:25.992671
1343 / tcp
165188539 | 2025-03-09T14:25:51.808727
1344 / tcp
-2033111675 | 2025-02-28T18:15:22.623666
1377 / tcp
408230060 | 2025-03-11T19:48:24.373030
1388 / tcp
921225407 | 2025-03-12T03:32:14.259431
1414 / tcp
-1399940268 | 2025-03-04T23:40:08.543480
1433 / tcp
555056254 | 2025-03-09T06:52:34.694554
1515 / tcp
504717326 | 2025-03-16T17:51:22.860334
1521 / tcp
-186520940 | 2025-03-08T11:32:28.316284
1599 / tcp
1991883981 | 2025-03-19T00:21:56.600197
1604 / tcp
2087396567 | 2025-03-09T22:11:57.769414
1700 / tcp
1527391096 | 2025-03-14T03:37:12.527183
1723 / tcp
1103582599 | 2025-03-21T16:29:11.150688
1800 / tcp
-1399940268 | 2025-03-09T09:46:29.527281
1801 / tcp
1266492139 | 2025-03-19T21:15:45.645516
1830 / tcp
1615193817 | 2025-03-15T09:16:30.020535
1883 / tcp
1741579575 | 2025-03-14T17:00:53.652509
1926 / tcp
539065883 | 2025-03-17T18:44:38.991284
1957 / tcp
1991883981 | 2025-03-10T04:45:23.534280
1962 / tcp
-1399940268 | 2025-02-25T15:44:27.711462
1970 / tcp
-1888448627 | 2025-02-23T11:56:18.434011
2000 / tcp
-1399940268 | 2025-02-27T16:50:11.982452
2002 / tcp
-1746074029 | 2025-03-22T05:33:14.518344
2008 / tcp
1996932384 | 2025-03-15T03:13:57.484419
2048 / tcp
455076604 | 2025-02-20T12:22:51.078169
2056 / tcp
205347087 | 2025-03-17T18:07:04.718808
2062 / tcp
-1399940268 | 2025-03-15T12:52:32.685866
2067 / tcp
-2089734047 | 2025-03-09T07:17:10.387191
2070 / tcp
307999478 | 2025-03-04T19:15:35.754563
2078 / tcp
819727972 | 2025-02-20T16:24:00.311387
2080 / tcp
-1538260461 | 2025-02-27T04:30:59.072062
2081 / tcp
-1839934832 | 2025-02-26T08:59:37.571912
2083 / tcp
1741579575 | 2025-03-10T07:49:40.098277
2087 / tcp
1519486042 | 2025-03-14T19:49:21.934247
2090 / tcp
639175818 | 2025-03-13T16:07:59.313302
2091 / tcp
-1230049476 | 2025-02-23T23:43:26.946427
2103 / tcp
826567260 | 2025-03-19T10:59:58.782177
2121 / tcp
141730637 | 2025-03-12T08:00:39.432157
2126 / tcp
-1222481761 | 2025-02-24T16:25:47.589328
2150 / tcp
1911457608 | 2025-03-17T14:50:49.322032
2154 / tcp
1690634669 | 2025-03-20T22:35:13.445923
2195 / tcp
-1399940268 | 2025-03-12T05:16:56.313775
2200 / tcp
1023953321 | 2025-03-22T02:24:59.638572
2202 / tcp
819727972 | 2025-03-21T11:34:03.793434
2211 / tcp
-1399940268 | 2025-02-28T03:07:14.524100
2222 / tcp
-1659353189 | 2025-03-05T02:21:04.638813
2232 / tcp
1919228981 | 2025-03-10T16:00:30.666807
2323 / tcp
1662205251 | 2025-02-21T15:48:14.325340
2332 / tcp
-1230049476 | 2025-03-17T22:36:14.536251
2345 / tcp
-1730858130 | 2025-02-28T14:15:52.135909
2376 / tcp
819727972 | 2025-03-22T05:37:55.477673
2382 / tcp
1911457608 | 2025-03-12T18:00:44.081357
2404 / tcp
1308377066 | 2025-03-14T00:38:18.416381
2444 / tcp
117101543 | 2025-02-28T20:49:05.505735
2506 / tcp
-1733106930 | 2025-03-21T22:20:02.659948
2553 / tcp
-1996280214 | 2025-03-20T08:03:29.373568
2559 / tcp
45131230 | 2025-03-08T15:54:38.385876
2561 / tcp
-1795027372 | 2025-03-14T02:36:20.022471
2562 / tcp
632542934 | 2025-03-12T10:14:22.980907
2568 / tcp
819727972 | 2025-03-14T09:18:10.810209
2628 / tcp
-1013082686 | 2025-02-23T13:18:46.151148
2761 / tcp
-653033013 | 2025-03-06T22:57:19.358215
2762 / tcp
819727972 | 2025-02-24T06:45:41.197444
2995 / tcp
-1839934832 | 2025-03-05T02:46:50.970949
3001 / tcp
-1795027372 | 2025-03-17T03:13:00.403684
3013 / tcp
-1568680103 | 2025-02-24T07:45:11.396490
3050 / tcp
819727972 | 2025-03-21T03:03:33.538623
3060 / tcp
50497985 | 2025-02-27T08:38:17.650053
3063 / tcp
-1399940268 | 2025-03-17T11:20:44.418158
3065 / tcp
-1399940268 | 2025-03-14T02:25:39.279693
3071 / tcp
198844676 | 2025-03-22T00:40:19.299393
3077 / tcp
198844676 | 2025-03-11T18:55:37.289666
3079 / tcp
-1399940268 | 2025-02-20T11:07:06.993286
3083 / tcp
-2017887953 | 2025-03-18T04:08:35.708775
3094 / tcp
-1279886438 | 2025-03-15T05:17:37.605389
3098 / tcp
745343730 | 2025-02-21T06:50:41.203324
3133 / tcp
-2089734047 | 2025-03-15T23:43:46.278949
3134 / tcp
-2089734047 | 2025-03-19T03:31:58.019971
3145 / tcp
1208318993 | 2025-02-26T12:20:28.078648
3147 / tcp
-2089734047 | 2025-03-05T11:50:04.259522
3157 / tcp
-345718689 | 2025-03-21T09:41:58.696007
3159 / tcp
50497985 | 2025-03-19T08:18:17.326736
3162 / tcp
-1888448627 | 2025-03-20T02:24:59.649443
3256 / tcp
2087396567 | 2025-03-14T17:50:34.223452
3260 / tcp
-862070606 | 2025-03-07T05:40:20.578722
3268 / tcp
-1547976805 | 2025-03-21T21:36:56.418552
3269 / tcp
321971019 | 2025-03-15T02:31:27.462237
3299 / tcp
1911457608 | 2025-03-03T21:10:47.150420
3310 / tcp
1911457608 | 2025-03-19T15:39:51.448348
3388 / tcp
1615193817 | 2025-03-22T00:39:26.399663
3389 / tcp
1131713579 | 2025-03-14T03:54:55.032509
3405 / tcp
1911457608 | 2025-03-16T11:57:39.455573
3408 / tcp
-1032713145 | 2025-02-28T22:45:57.881020
3410 / tcp
-2017887953 | 2025-02-27T03:42:36.006498
3443 / tcp
1282941221 | 2025-03-17T03:07:16.920967
3558 / tcp
-2089734047 | 2025-02-24T09:06:49.193397
3572 / tcp
-339084706 | 2025-03-14T13:50:50.359232
3790 / tcp
-971970408 | 2025-03-14T18:00:36.970656
3793 / tcp
-358801646 | 2025-03-04T12:18:07.266521
4000 / tcp
1300162323 | 2025-03-18T12:41:57.686223
4022 / tcp
1763259671 | 2025-03-19T14:40:23.015813
4064 / tcp
-1810987450 | 2025-03-12T23:04:17.610555
4160 / tcp
819727972 | 2025-03-12T07:50:17.754104
4190 / tcp
632542934 | 2025-03-10T13:33:23.898963
4242 / tcp
-1341662640 | 2025-03-19T23:23:46.157443
4282 / tcp
-1888448627 | 2025-03-14T07:27:26.558337
4321 / tcp
-1250504565 | 2025-03-09T11:49:33.295395
4369 / tcp
-1399940268 | 2025-03-19T12:36:08.518128
4433 / tcp
-641479109 | 2025-02-22T00:33:11.664516
4434 / tcp
597764502 | 2025-02-23T07:44:47.749611
4437 / tcp
819727972 | 2025-03-09T21:29:47.976160
4443 / tcp
141533638 | 2025-03-21T21:55:43.390560
4444 / tcp
1911457608 | 2025-03-20T18:03:18.622085
4500 / tcp
-2089734047 | 2025-03-14T01:27:34.271322
4505 / tcp
51259122 | 2025-02-25T20:19:58.444901
4572 / tcp
-1375131644 | 2025-03-05T23:44:59.054805
4821 / tcp
165188539 | 2025-02-28T12:49:06.792092
4840 / tcp
321971019 | 2025-03-21T18:20:56.731082
4911 / tcp
-1996280214 | 2025-03-20T08:20:27.021615
4949 / tcp
2087396567 | 2025-03-10T04:29:41.104322
5001 / tcp
-971970408 | 2025-02-24T15:55:40.673307
5004 / tcp
-1947777893 | 2025-03-11T21:12:26.285878
5006 / tcp
2087396567 | 2025-03-14T23:09:44.878673
5007 / tcp
1911457608 | 2025-03-18T21:53:07.392630
5010 / tcp
-1611764932 | 2025-03-19T10:30:39.405422
5140 / tcp
-1399940268 | 2025-03-15T14:59:22.052400
5172 / tcp
2087396567 | 2025-03-17T06:41:30.108274
5222 / tcp
996960436 | 2025-03-17T04:06:57.426186
5224 / tcp
410249975 | 2025-03-18T02:29:27.784117
5233 / tcp
-903067560 | 2025-03-14T03:38:18.627832
5238 / tcp
165188539 | 2025-03-04T22:24:28.924452
5253 / tcp
1504401647 | 2025-03-19T11:01:57.622130
5257 / tcp
-1888448627 | 2025-03-08T13:50:39.490068
5262 / tcp
1504401647 | 2025-03-21T05:48:51.806535
5269 / tcp
-1854630806 | 2025-03-19T03:56:42.816874
5435 / tcp
819727972 | 2025-03-10T07:29:54.829312
5439 / tcp
1911457608 | 2025-03-10T22:55:17.606843
5456 / tcp
-1399940268 | 2025-02-21T10:30:25.733928
5569 / tcp
-1888448627 | 2025-03-10T01:46:48.683578
5591 / tcp
1363464823 | 2025-03-18T21:53:09.578052
5604 / tcp
-1139539254 | 2025-03-12T14:06:39.542293
5613 / tcp
1308377066 | 2025-03-10T07:00:37.344451
5672 / tcp
575925250 | 2025-03-09T22:45:43.100054
5804 / tcp
-1013082686 | 2025-03-17T12:10:47.961213
5858 / tcp
-971970408 | 2025-03-17T09:45:07.763374
5910 / tcp
-916278850 | 2025-03-12T22:57:34.061215
5917 / tcp
1996932384 | 2025-03-18T23:16:01.988921
5938 / tcp
165188539 | 2025-02-23T17:30:58.249644
5984 / tcp
1999272906 | 2025-03-10T18:56:41.885048
5985 / tcp
-2118655245 | 2025-03-20T04:45:53.167028
5986 / tcp
1991883981 | 2025-03-20T22:46:07.220753
6000 / tcp
1282941221 | 2025-03-17T14:07:04.695487
6001 / tcp
120534451 | 2025-02-22T20:08:33.960226
6002 / tcp
1632932802 | 2025-03-16T05:32:28.217912
6006 / tcp
-1399940268 | 2025-02-23T19:45:03.818874
6009 / tcp
1159729119 | 2025-03-21T17:08:24.955153
6060 / tcp
-1399940268 | 2025-03-19T08:28:40.577304
6379 / tcp
321971019 | 2025-03-15T00:00:06.220803
6443 / tcp
660175493 | 2025-03-09T07:07:23.430339
6500 / tcp
-249504111 | 2025-03-21T14:48:37.200181
6543 / tcp
-451429873 | 2025-02-20T13:12:56.768914
6581 / tcp
2098371729 | 2025-03-22T02:42:19.176850
6633 / tcp
-1032713145 | 2025-02-27T03:40:55.341821
6666 / tcp
4935895 | 2025-02-21T20:53:10.008335
6667 / tcp
-1730858130 | 2025-03-10T17:45:27.192090
6668 / tcp
-1795027372 | 2025-03-07T07:55:22.698663
6697 / tcp
1308377066 | 2025-03-04T22:14:26.851640
6775 / tcp
-1261090339 | 2025-02-26T00:03:23.363628
7001 / tcp
-829704895 | 2025-02-22T20:56:23.455705
7100 / tcp
369374303 | 2025-02-28T18:58:55.279244
7171 / tcp
408230060 | 2025-03-16T06:32:04.902375
7173 / tcp
1655023012 | 2025-03-21T08:33:18.785085
7302 / tcp
-1327660293 | 2025-03-17T15:02:46.693825
7401 / tcp
89142341 | 2025-03-11T00:44:16.724329
7415 / tcp
1763259671 | 2025-03-13T17:12:31.833956
7443 / tcp
-512831750 | 2025-03-12T03:30:22.811609
7493 / tcp
-2107996212 | 2025-03-15T14:15:25.360893
7548 / tcp
2087396567 | 2025-02-28T16:46:52.339417
7634 / tcp
-2089734047 | 2025-03-19T16:49:37.246110
7654 / tcp
-1399940268 | 2025-02-21T18:02:11.174821
7687 / tcp
1911457608 | 2025-03-04T22:18:07.417700
7778 / tcp
-457235091 | 2025-03-11T12:15:34.894596
7799 / tcp
-1013082686 | 2025-03-13T06:07:21.676374
7980 / tcp
1353260875 | 2025-03-11T19:40:06.336260
8001 / tcp
2103111368 | 2025-03-16T17:27:03.924793
8009 / tcp
2087396567 | 2025-03-06T10:16:35.504886
8013 / tcp
-1399940268 | 2025-02-28T12:20:19.539487
8023 / tcp
575925250 | 2025-03-21T18:53:15.206891
8024 / tcp
-1399940268 | 2025-03-14T00:25:50.124930
8028 / tcp
575925250 | 2025-02-26T00:51:37.809812
8029 / tcp
722711397 | 2025-03-16T06:09:55.752195
8031 / tcp
-2102434810 | 2025-03-06T15:55:38.585773
8036 / tcp
-1626979812 | 2025-02-28T11:20:21.842669
8037 / tcp
-1099385124 | 2025-02-20T08:28:29.948445
8046 / tcp
632542934 | 2025-03-07T06:16:33.793733
8049 / tcp
-2089734047 | 2025-03-08T13:42:45.842551
8058 / tcp
-345718689 | 2025-03-16T09:46:54.284117
8069 / tcp
-2118655245 | 2025-03-15T20:56:53.356570
8074 / tcp
-303199180 | 2025-03-06T23:28:50.699685
8078 / tcp
-1114821551 | 2025-02-28T17:27:27.502197
8081 / tcp
-2081419599 | 2025-03-13T22:11:01.116962
8082 / tcp
1574088840 | 2025-03-05T12:17:04.921917
8083 / tcp
401555314 | 2025-03-19T15:19:45.864460
8085 / tcp
-1032713145 | 2025-03-16T01:53:49.855243
8087 / tcp
-2089734047 | 2025-03-08T16:28:19.385620
8099 / tcp
-1416565584 | 2025-03-20T04:27:55.077812
8110 / tcp
-1888448627 | 2025-03-21T00:38:38.801812
8115 / tcp
671605376 | 2025-03-04T17:43:46.796508
8125 / tcp
-1327660293 | 2025-02-24T22:45:20.460894
8129 / tcp
819727972 | 2025-02-25T08:44:50.470512
8130 / tcp
632542934 | 2025-03-06T18:35:10.204185
8139 / tcp
-1760806421 | 2025-02-25T03:56:11.431474
8140 / tcp
808560482 | 2025-02-23T19:20:35.272920
8143 / tcp
1911457608 | 2025-03-18T08:29:56.588994
8153 / tcp
-1148066627 | 2025-03-17T19:30:43.421282
8160 / tcp
-1399940268 | 2025-03-04T10:30:09.030705
8171 / tcp
-747911285 | 2025-03-20T21:30:27.455982
8174 / tcp
1911457608 | 2025-03-14T10:53:18.211024
8178 / tcp
-1810987450 | 2025-03-16T11:11:41.176508
8181 / tcp
-971970408 | 2025-02-24T08:40:11.823731
8184 / tcp
-457235091 | 2025-03-16T22:42:49.929291
8191 / tcp
-1399940268 | 2025-03-18T21:21:40.110284
8197 / tcp
-1538260461 | 2025-03-13T06:25:06.552140
8200 / tcp
1320285193 | 2025-03-18T21:56:58.789593
8249 / tcp
-1899074860 | 2025-03-16T13:28:15.862314
8251 / tcp
-1399940268 | 2025-02-25T02:03:25.278588
8284 / tcp
-1888448627 | 2025-02-27T04:32:39.498741
8291 / tcp
-1733645023 | 2025-03-21T19:21:27.569501
8317 / tcp
-1399940268 | 2025-03-15T20:48:31.020643
8318 / tcp
1911457608 | 2025-03-20T23:06:34.603470
8333 / tcp
1096654864 | 2025-03-15T15:09:29.046418
8402 / tcp
937743584 | 2025-03-13T08:48:27.437917
8406 / tcp
1911457608 | 2025-03-13T15:06:20.576198
8407 / tcp
1011407350 | 2025-03-13T17:36:09.436507
8410 / tcp
1767345577 | 2025-03-19T04:21:56.759325
8415 / tcp
-375604792 | 2025-03-05T06:39:39.795983
8416 / tcp
165188539 | 2025-02-28T14:10:18.009831
8417 / tcp
2143387245 | 2025-02-26T22:10:39.521333
8421 / tcp
1761482307 | 2025-02-21T18:53:55.085179
8422 / tcp
-1399940268 | 2025-02-27T03:09:34.464777
8451 / tcp
-407828767 | 2025-03-10T14:44:09.148620
8485 / tcp
937756010 | 2025-02-22T20:11:01.677905
8502 / tcp
165188539 | 2025-03-10T06:35:48.487153
8505 / tcp
-1399940268 | 2025-03-21T18:35:42.283248
8506 / tcp
1212285915 | 2025-03-07T17:33:02.485837
8510 / tcp
-1375131644 | 2025-03-15T07:53:06.965567
8544 / tcp
-1888448627 | 2025-03-03T17:37:01.640252
8545 / tcp
819727972 | 2025-03-19T06:17:52.805028
8551 / tcp
-2089734047 | 2025-03-14T20:30:28.420409
8554 / tcp
819727972 | 2025-03-07T09:17:13.912929
8564 / tcp
-1428621233 | 2025-02-23T18:38:30.067217
8566 / tcp
-1477838366 | 2025-03-10T13:49:24.481304
8570 / tcp
-1399940268 | 2025-03-14T10:37:58.913460
8574 / tcp
-653033013 | 2025-03-04T15:48:13.080424
8593 / tcp
1353260875 | 2025-02-22T21:22:19.406838
8596 / tcp
2103111368 | 2025-03-16T21:24:14.286274
8599 / tcp
2103111368 | 2025-03-08T21:45:24.196021
8605 / tcp
-1399940268 | 2025-02-23T20:51:01.760607
8621 / tcp
321971019 | 2025-03-19T12:08:34.879151
8643 / tcp
321971019 | 2025-03-12T04:25:19.161107
8649 / tcp
842535728 | 2025-03-17T02:15:44.914113
8728 / tcp
1911457608 | 2025-03-10T17:50:40.777638
8771 / tcp
-454087041 | 2025-02-22T05:58:14.986074
8812 / tcp
-2096652808 | 2025-03-04T12:42:19.507889
8822 / tcp
819727972 | 2025-03-05T03:20:56.798669
8847 / tcp
-2089734047 | 2025-03-20T08:56:59.249983
8851 / tcp
-1399940268 | 2025-03-15T08:21:21.424219
8856 / tcp
-339084706 | 2025-03-06T05:54:55.546176
8864 / tcp
-1399940268 | 2025-03-16T23:47:56.549855
8867 / tcp
1911457608 | 2025-03-15T10:26:22.795258
8880 / tcp
-1248408558 | 2025-03-20T12:58:25.286716
8884 / tcp
819727972 | 2025-03-09T13:00:12.279919
8899 / tcp
372433470 | 2025-03-22T05:41:01.482173
8907 / tcp
1623746877 | 2025-02-24T19:01:19.331789
8908 / tcp
-1399940268 | 2025-03-10T15:20:39.374505
8916 / tcp
-1399940268 | 2025-03-06T16:49:00.912351
9001 / tcp
-1026951088 | 2025-03-03T22:16:28.628395
9002 / tcp
819727972 | 2025-03-21T16:22:25.970032
9008 / tcp
-1839934832 | 2025-03-18T00:11:21.378416
9010 / tcp
-2096652808 | 2025-03-13T17:43:05.367320
9017 / tcp
-1327660293 | 2025-03-10T15:51:37.359735
9018 / tcp
1911457608 | 2025-03-18T05:55:27.638004
9026 / tcp
1830697416 | 2025-03-12T13:29:55.409263
9030 / tcp
-1399940268 | 2025-03-05T19:44:28.693392
9034 / tcp
-1013082686 | 2025-02-28T13:06:23.933157
9042 / tcp
-345718689 | 2025-03-13T05:15:50.428311
9049 / tcp
-1399940268 | 2025-02-27T18:01:05.671064
9051 / tcp
-1316398834 | 2025-02-20T10:29:13.842248
9063 / tcp
1911457608 | 2025-03-15T01:46:34.324615
9066 / tcp
-784071826 | 2025-03-20T03:33:16.361008
9074 / tcp
1282941221 | 2025-03-16T18:05:06.047249
9078 / tcp
-1399940268 | 2025-03-11T07:14:34.148072
9091 / tcp
117101543 | 2025-03-11T15:15:04.599364
9092 / tcp
819727972 | 2025-03-19T04:43:44.574347
9095 / tcp
971933601 | 2025-03-17T07:30:44.139290
9100 / tcp
677934968 | 2025-03-11T14:33:41.884679
9101 / tcp
820958131 | 2025-03-07T01:10:21.150885
9105 / tcp
-1996280214 | 2025-03-13T00:40:33.162906
9110 / tcp
-1056270173 | 2025-03-18T22:57:30.144832
9113 / tcp
-1399940268 | 2025-03-14T22:32:36.070674
9117 / tcp
-1733106930 | 2025-03-20T22:21:12.063801
9125 / tcp
45131230 | 2025-03-11T05:23:58.125820
9134 / tcp
-1699556818 | 2025-02-24T18:23:18.756622
9143 / tcp
1911457608 | 2025-02-23T11:47:45.308352
9144 / tcp
-358801646 | 2025-03-19T07:15:46.440389
9148 / tcp
1632932802 | 2025-03-19T05:55:34.808104
9151 / tcp
-358801646 | 2025-02-21T19:16:25.987736
9153 / tcp
1911457608 | 2025-03-14T22:01:54.750550
9155 / tcp
-1399940268 | 2025-03-03T22:34:36.217469
9160 / tcp
-2089734047 | 2025-03-17T16:17:34.496428
9163 / tcp
-1399940268 | 2025-03-11T13:19:29.745957
9164 / tcp
921225407 | 2025-03-06T16:18:25.325974
9169 / tcp
-2089734047 | 2025-03-13T17:35:52.702623
9193 / tcp
1208318993 | 2025-03-19T09:30:20.689238
9197 / tcp
-1140468363 | 2025-03-04T07:26:51.477481
9199 / tcp
165188539 | 2025-03-07T07:07:40.487779
9203 / tcp
-2017887953 | 2025-03-03T22:18:24.391373
9211 / tcp
-1947777893 | 2025-03-19T21:05:49.358337
9218 / tcp
-2089734047 | 2025-03-08T22:46:40.484489
9223 / tcp
398077695 | 2025-03-08T19:46:21.985748
9226 / tcp
-358801646 | 2025-02-21T17:35:56.784191
9243 / tcp
45131230 | 2025-03-05T03:53:29.730740
9244 / tcp
-1626979812 | 2025-03-22T01:51:23.226985
9301 / tcp
819727972 | 2025-03-14T14:14:18.827268
9304 / tcp
-1730858130 | 2025-03-12T03:32:18.872810
9306 / tcp
-1019343788 | 2025-03-17T15:57:01.715693
9309 / tcp
-2089734047 | 2025-03-11T21:52:57.796311
9310 / tcp
1911457608 | 2025-03-18T07:23:16.886549
9333 / tcp
-1399940268 | 2025-03-18T12:42:02.969311
9351 / tcp
-585940771 | 2025-03-05T21:17:40.060288
9398 / tcp
-971970408 | 2025-03-13T14:56:49.827392
9418 / tcp
-833168972 | 2025-03-16T00:10:30.827104
9443 / tcp
-1282536397 | 2025-03-18T22:44:08.769942
9530 / tcp
921225407 | 2025-03-20T04:32:09.735638
9633 / tcp
539065883 | 2025-03-22T01:04:13.581245
9802 / tcp
-358801646 | 2025-03-04T16:05:52.289012
9876 / tcp
2070013657 | 2025-03-18T17:53:26.443893
9885 / tcp
-1261090339 | 2025-03-21T19:14:31.066299
9898 / tcp
1320285193 | 2025-03-08T18:44:23.411988
9909 / tcp
-1453516345 | 2025-03-20T01:53:07.294956
9928 / tcp
-1399940268 | 2025-02-28T16:11:34.825110
9943 / tcp
1833368189 | 2025-02-25T04:41:49.346551
9944 / tcp
-971970408 | 2025-03-18T06:09:59.873887
9997 / tcp
-1399940268 | 2025-03-12T07:16:14.161377
9999 / tcp
1161309183 | 2025-03-18T11:24:31.379935
10001 / tcp
1492413928 | 2025-03-19T08:04:59.385435
10009 / tcp
-709267009 | 2025-03-13T22:40:59.807181
10020 / tcp
632542934 | 2025-03-05T22:46:08.054441
10024 / tcp
-234408721 | 2025-03-07T17:02:33.391448
10026 / tcp
1282941221 | 2025-03-14T11:11:46.811928
10031 / tcp
321971019 | 2025-02-26T07:19:15.366725
10037 / tcp
-1399940268 | 2025-03-06T22:58:59.666044
10039 / tcp
1911457608 | 2025-03-18T10:16:47.828158
10050 / tcp
-971970408 | 2025-03-12T12:50:57.213516
10051 / tcp
1741579575 | 2025-03-14T15:50:18.312154
10134 / tcp
-1428621233 | 2025-03-14T16:16:52.565688
10210 / tcp
-1399940268 | 2025-03-19T03:24:26.948219
10250 / tcp
599074451 | 2025-02-23T07:36:59.811244
10255 / tcp
-2089734047 | 2025-03-12T13:43:43.860020
10348 / tcp
1426971893 | 2025-02-25T15:49:57.275604
10398 / tcp
1911457608 | 2025-03-18T22:23:29.514251
10443 / tcp
1082732927 | 2025-03-15T04:19:00.222899
10935 / tcp
1492413928 | 2025-02-26T21:18:56.408885
11000 / tcp
-1730858130 | 2025-03-06T18:39:27.153852
11065 / tcp
50497985 | 2025-02-28T08:17:22.485000
11112 / tcp
-1399940268 | 2025-03-17T10:00:04.127731
11210 / tcp
-1399940268 | 2025-03-17T16:17:51.429218
11288 / tcp
-904840257 | 2025-02-25T19:47:46.177951
11300 / tcp
1011407350 | 2025-03-05T00:05:36.523059
11680 / tcp
-1399940268 | 2025-03-15T05:10:26.073588
12000 / tcp
-1368104760 | 2025-02-23T05:26:51.508784
12001 / tcp
671605376 | 2025-03-14T00:16:59.695633
12084 / tcp
671605376 | 2025-03-12T17:34:51.317959
12109 / tcp
971933601 | 2025-02-26T09:39:16.708402
12115 / tcp
-1810987450 | 2025-03-04T13:15:09.257185
12117 / tcp
-2017887953 | 2025-03-17T11:14:35.342163
12119 / tcp
-1032713145 | 2025-03-17T18:47:50.403269
12120 / tcp
-441419608 | 2025-03-21T20:10:13.622449
12126 / tcp
-1399940268 | 2025-03-15T03:22:16.379185
12129 / tcp
-2031152423 | 2025-03-15T04:17:21.354595
12132 / tcp
117101543 | 2025-02-28T19:08:42.852884
12141 / tcp
-1476017887 | 2025-03-16T20:08:22.321504
12142 / tcp
1911457608 | 2025-03-14T21:17:24.615936
12143 / tcp
-653033013 | 2025-03-15T22:39:49.452999
12149 / tcp
-1810987450 | 2025-03-07T11:13:47.087360
12151 / tcp
-2033111675 | 2025-03-21T23:55:47.374889
12152 / tcp
-747911285 | 2025-03-10T22:58:47.465589
12162 / tcp
-1327660293 | 2025-02-25T14:27:32.381279
12165 / tcp
-904840257 | 2025-03-07T03:15:14.454225
12172 / tcp
-1538260461 | 2025-02-24T23:17:06.470989
12173 / tcp
-1538260461 | 2025-03-19T23:07:18.021211
12176 / tcp
-1399940268 | 2025-03-05T20:42:30.359985
12178 / tcp
-1538260461 | 2025-03-10T03:00:40.653168
12182 / tcp
-1399940268 | 2025-03-16T19:21:57.735173
12184 / tcp
1189133115 | 2025-03-12T08:27:30.897182
12185 / tcp
-1399940268 | 2025-03-14T22:14:13.931381
12203 / tcp
-1399940268 | 2025-02-21T04:31:14.949004
12214 / tcp
-375604792 | 2025-03-09T20:09:32.551832
12218 / tcp
1911457608 | 2025-03-18T07:06:02.719981
12219 / tcp
1911457608 | 2025-02-22T20:48:15.340718
12230 / tcp
1911457608 | 2025-02-27T11:50:34.216318
12232 / tcp
-1810987450 | 2025-03-19T17:53:29.066550
12241 / tcp
-1888448627 | 2025-03-06T02:40:18.033408
12243 / tcp
1911457608 | 2025-02-22T15:29:34.984225
12255 / tcp
-653033013 | 2025-03-11T20:30:58.859501
12292 / tcp
1308377066 | 2025-03-04T22:46:23.999182
12299 / tcp
1363464823 | 2025-03-16T16:51:52.806370
12311 / tcp
-375604792 | 2025-02-21T17:15:06.662515
12315 / tcp
-1399940268 | 2025-03-08T14:44:50.567463
12316 / tcp
1911457608 | 2025-03-16T09:22:33.363239
12326 / tcp
1911457608 | 2025-03-06T22:03:34.888281
12333 / tcp
-1045760528 | 2025-03-06T10:15:22.551653
12342 / tcp
-274082663 | 2025-02-28T15:47:38.655986
12345 / tcp
296364507 | 2025-03-09T23:06:54.249451
12346 / tcp
1492413928 | 2025-03-04T15:54:11.840155
12360 / tcp
-1399940268 | 2025-03-10T02:23:57.151408
12362 / tcp
1574088840 | 2025-02-27T16:13:03.150387
12373 / tcp
-457235091 | 2025-03-18T15:11:03.882007
12374 / tcp
-1399940268 | 2025-03-06T13:26:06.249440
12375 / tcp
1911457608 | 2025-03-22T01:45:27.742684
12391 / tcp
-1327660293 | 2025-02-23T20:01:20.700983
12398 / tcp
-303199180 | 2025-03-03T20:24:23.684360
12405 / tcp
-1399940268 | 2025-03-15T14:20:14.154043
12411 / tcp
-1327660293 | 2025-02-25T19:11:40.962572
12415 / tcp
-1013082686 | 2025-03-10T14:22:22.005536
12418 / tcp
-904840257 | 2025-02-28T01:45:26.219245
12438 / tcp
-1399940268 | 2025-03-10T18:50:06.636048
12440 / tcp
1632932802 | 2025-02-21T21:31:43.328621
12443 / tcp
-1730858130 | 2025-03-16T15:31:36.784836
12450 / tcp
1911457608 | 2025-03-16T19:01:43.892734
12452 / tcp
-980525298 | 2025-03-14T01:12:51.687675
12466 / tcp
-1097188123 | 2025-02-22T23:29:38.840120
12473 / tcp
1911457608 | 2025-03-05T20:19:30.431313
12476 / tcp
-1399940268 | 2025-03-07T02:23:20.112928
12477 / tcp
-1045760528 | 2025-03-13T23:21:48.180271
12478 / tcp
820958131 | 2025-02-27T22:07:08.628177
12486 / tcp
-1399940268 | 2025-03-12T17:51:30.772755
12488 / tcp
-1399940268 | 2025-02-24T13:20:06.437485
12489 / tcp
-2096652808 | 2025-03-16T06:38:51.202344
12492 / tcp
1911457608 | 2025-03-17T20:41:15.382012
12496 / tcp
-1399940268 | 2025-03-17T06:03:53.495163
12502 / tcp
-1399940268 | 2025-02-27T05:46:35.502549
12520 / tcp
-1399940268 | 2025-03-13T01:42:08.028985
12528 / tcp
-358801646 | 2025-02-21T06:37:10.589022
12533 / tcp
1911457608 | 2025-03-17T19:57:51.412306
12535 / tcp
819727972 | 2025-03-04T20:53:10.340662
12541 / tcp
-1019343788 | 2025-03-11T04:33:28.850317
12547 / tcp
-1399940268 | 2025-03-14T03:07:31.944260
12555 / tcp
1282941221 | 2025-03-18T13:14:36.265288
12556 / tcp
165188539 | 2025-03-19T00:44:51.030321
12557 / tcp
740837454 | 2025-03-04T10:02:47.355468
12562 / tcp
-1265999252 | 2025-03-15T23:05:50.218220
12566 / tcp
1615193817 | 2025-03-19T08:21:43.686433
12578 / tcp
-2017887953 | 2025-03-01T01:15:38.102804
12579 / tcp
321971019 | 2025-03-06T05:26:56.541620
12582 / tcp
1911457608 | 2025-02-22T13:21:00.169385
12587 / tcp
-2031152423 | 2025-03-17T18:04:44.823966
14026 / tcp
1911457608 | 2025-03-10T08:55:56.260324
14082 / tcp
165188539 | 2025-03-14T16:47:52.992540
14147 / tcp
921225407 | 2025-03-19T17:33:02.434353
14265 / tcp
1632932802 | 2025-03-12T21:32:39.174780
14344 / tcp
1767345577 | 2025-02-23T05:19:14.249533
14406 / tcp
114471724 | 2025-03-04T00:16:21.022484
14524 / tcp
921225407 | 2025-03-10T17:56:03.313382
14825 / tcp
1911457608 | 2025-03-22T02:44:15.089377
15001 / tcp
-891714208 | 2025-02-20T18:50:40.458641
15038 / tcp
-1399940268 | 2025-03-10T15:57:29.305454
15042 / tcp
-1399940268 | 2025-03-06T17:39:15.421211
15443 / tcp
1212921144 | 2025-03-14T05:21:19.933983
16006 / tcp
1911457608 | 2025-03-07T01:23:10.653310
16007 / tcp
-1399940268 | 2025-03-09T05:23:48.458357
16009 / tcp
-1399940268 | 2025-03-17T16:55:46.949800
16025 / tcp
1975288991 | 2025-03-10T02:35:59.575563
16029 / tcp
-1399940268 | 2025-03-16T17:54:37.417468
16045 / tcp
-1399940268 | 2025-03-12T19:20:31.772924
16063 / tcp
819727972 | 2025-02-27T21:27:14.271301
16069 / tcp
-1399940268 | 2025-03-05T13:58:41.586684
16091 / tcp
-1399940268 | 2025-03-17T10:01:15.336019
16103 / tcp
-1888448627 | 2025-03-03T17:59:55.274356
16402 / tcp
-1399940268 | 2025-03-21T10:51:39.488972
16831 / tcp
-653033013 | 2025-03-13T18:25:36.435419
17010 / tcp
1911457608 | 2025-03-17T08:11:19.830423
17084 / tcp
1623746877 | 2025-03-09T08:56:47.210883
18004 / tcp
1911457608 | 2025-02-22T01:22:29.618381
18014 / tcp
-1099385124 | 2025-03-14T12:36:31.076566
18020 / tcp
1911457608 | 2025-03-21T21:34:05.125176
18028 / tcp
1911457608 | 2025-03-05T09:22:00.437116
18036 / tcp
117101543 | 2025-03-13T00:35:22.146621
18055 / tcp
921225407 | 2025-03-16T15:29:38.404678
18059 / tcp
1911457608 | 2025-03-19T21:06:37.868341
18069 / tcp
-441419608 | 2025-02-22T20:35:38.983692
18076 / tcp
1011407350 | 2025-03-14T15:00:36.351203
18081 / tcp
897328069 | 2025-03-20T17:54:55.092464
18086 / tcp
709622286 | 2025-02-21T07:28:58.276054
18200 / tcp
-1399940268 | 2025-03-13T14:41:42.024952
18245 / tcp
1741579575 | 2025-03-21T19:51:50.005186
18368 / tcp
-1779118422 | 2025-02-24T02:56:45.653886
18553 / tcp
2087396567 | 2025-03-14T12:17:16.837203
19000 / tcp
-1013082686 | 2025-03-08T18:18:41.022216
19091 / tcp
-1327660293 | 2025-03-05T23:37:04.241106
19443 / tcp
722711397 | 2025-03-15T22:20:06.224672
19930 / tcp
1308377066 | 2025-03-14T10:33:05.453603
20001 / tcp
820958131 | 2025-03-19T10:21:40.311907
20084 / tcp
740837454 | 2025-03-17T15:57:15.892404
20151 / tcp
-2089734047 | 2025-02-22T14:37:19.482157
20200 / tcp
1911457608 | 2025-02-22T21:17:20.753362
20443 / tcp
1911457608 | 2025-03-04T02:06:31.662805
20547 / tcp
819727972 | 2025-03-21T03:29:51.862430
20800 / tcp
-1730858130 | 2025-02-23T23:29:44.996843
20880 / tcp
1370263973 | 2025-02-25T13:16:28.492044
20894 / tcp
-1399940268 | 2025-03-15T11:35:00.658904
21002 / tcp
709622286 | 2025-03-21T21:14:01.833012
21025 / tcp
819727972 | 2025-02-28T19:56:24.641348
21081 / tcp
-2089734047 | 2025-02-28T17:40:01.607531
21233 / tcp
1308377066 | 2025-02-26T19:49:40.868782
21234 / tcp
1911457608 | 2025-03-18T15:34:34.228446
21250 / tcp
1911457608 | 2025-02-27T13:26:49.073995
21251 / tcp
1762042191 | 2025-02-26T10:13:16.651237
21252 / tcp
-1399940268 | 2025-02-24T12:37:21.471181
21255 / tcp
-1399940268 | 2025-03-05T18:16:13.065405
21257 / tcp
-1105333987 | 2025-03-21T02:01:44.550595
21286 / tcp
819727972 | 2025-03-20T07:17:21.645413
21307 / tcp
-2089734047 | 2025-03-12T23:19:22.991362
21314 / tcp
-1399940268 | 2025-03-22T03:58:48.639027
21325 / tcp
165188539 | 2025-03-11T18:03:46.748252
21327 / tcp
819727972 | 2025-03-10T22:42:14.754288
21379 / tcp
-801484042 | 2025-03-15T05:59:08.159881
22206 / tcp
1911457608 | 2025-03-17T20:13:54.973041
22556 / tcp
921225407 | 2025-03-15T22:27:04.230421
24181 / tcp
819727972 | 2025-02-22T19:14:24.036983
24245 / tcp
-1729629024 | 2025-03-14T14:00:28.011749
24472 / tcp
-1032713145 | 2025-03-14T16:14:35.709664
25006 / tcp
-1399940268 | 2025-02-28T12:11:39.172691
25565 / tcp
-2096652808 | 2025-03-15T06:37:56.401542
25782 / tcp
-1013082686 | 2025-03-14T19:00:38.722775
26656 / tcp
2087396567 | 2025-03-13T06:46:01.223256
27015 / tcp
1083545183 | 2025-02-23T23:33:43.364954
27017 / tcp
1763259671 | 2025-03-16T16:06:09.089411
27105 / tcp
1911457608 | 2025-02-24T08:21:00.076421
28015 / tcp
1077013874 | 2025-03-22T03:17:47.794306
28080 / tcp
-1148066627 | 2025-03-11T00:39:25.036943
29842 / tcp
819727972 | 2025-02-22T10:52:06.126250
29984 / tcp
-1399940268 | 2025-02-27T09:20:55.279816
30002 / tcp
-1681927087 | 2025-02-26T00:02:59.869117
30003 / tcp
1375509841 | 2025-03-12T10:28:15.217678
30006 / tcp
632542934 | 2025-03-14T05:39:56.920877
30008 / tcp
-1032713145 | 2025-03-10T14:46:37.993647
30019 / tcp
1830697416 | 2025-02-28T06:31:37.905640
30022 / tcp
-79865617 | 2025-03-18T22:12:24.616320
30122 / tcp
-1611764932 | 2025-03-11T04:21:57.355390
30123 / tcp
1541211644 | 2025-03-14T06:56:17.068840
30301 / tcp
-971970408 | 2025-03-15T19:55:54.727095
30322 / tcp
-2017887953 | 2025-03-09T04:14:33.475308
30422 / tcp
-2033111675 | 2025-03-13T13:23:31.610551
30468 / tcp
-303199180 | 2025-02-27T02:02:32.702062
30522 / tcp
-1611764932 | 2025-03-12T15:18:48.159183
30822 / tcp
-1648456501 | 2025-03-12T19:49:10.110057
30922 / tcp
2087396567 | 2025-03-21T00:48:06.604560
31722 / tcp
2087396567 | 2025-03-12T21:34:52.558893
31822 / tcp
2087396567 | 2025-03-20T19:55:25.516769
31922 / tcp
104385780 | 2025-03-11T06:01:31.525732
32001 / tcp
-1399940268 | 2025-03-12T01:30:39.138181
32022 / tcp
-138733098 | 2025-03-12T04:42:40.496664
32122 / tcp
1919228981 | 2025-03-20T03:20:17.748596
32303 / tcp
-1399940268 | 2025-03-16T03:34:18.765387
32322 / tcp
-971970408 | 2025-03-16T14:59:39.855376
32422 / tcp
-319440554 | 2025-03-09T15:09:55.274423
32622 / tcp
-971970408 | 2025-03-11T19:37:06.611954
32764 / tcp
740837454 | 2025-03-08T18:47:27.574126
32922 / tcp
-971970408 | 2025-03-11T02:26:41.446047
33022 / tcp
819727972 | 2025-02-27T16:44:18.734327
33060 / tcp
-971970408 | 2025-03-18T09:51:41.161742
33122 / tcp
-2033111675 | 2025-03-04T14:28:59.854433
33222 / tcp
-905685638 | 2025-03-19T23:54:18.971534
33422 / tcp
1741579575 | 2025-03-19T16:56:29.714604
33522 / tcp
539065883 | 2025-02-26T15:43:05.034073
33622 / tcp
-971970408 | 2025-03-08T20:42:21.480315
33722 / tcp
819727972 | 2025-03-18T04:49:53.155457
34022 / tcp
1830187220 | 2025-03-20T17:23:27.688280
34122 / tcp
599074451 | 2025-03-20T15:39:30.821918
34422 / tcp
819727972 | 2025-02-28T05:41:44.788702
34522 / tcp
-971970408 | 2025-03-19T12:21:40.020661
34622 / tcp
-1261090339 | 2025-03-19T09:51:54.441860
34722 / tcp
104385780 | 2025-03-19T08:10:47.511201
34822 / tcp
-653033013 | 2025-03-19T06:28:27.190843
35000 / tcp
455076604 | 2025-03-19T18:55:28.667424
35101 / tcp
1723769361 | 2025-03-21T20:20:26.188463
35122 / tcp
2087396567 | 2025-03-19T01:09:09.022660
35222 / tcp
-441419608 | 2025-03-18T09:36:33.508182
35240 / tcp
1762042191 | 2025-03-08T22:44:35.727787
35241 / tcp
-358801646 | 2025-02-22T02:42:39.311183
35250 / tcp
165188539 | 2025-03-10T07:29:00.938380
35322 / tcp
1189133115 | 2025-03-04T05:33:17.662157
35422 / tcp
-1559123399 | 2025-03-19T00:13:03.371829
35522 / tcp
1741579575 | 2025-03-17T01:36:16.179735
35822 / tcp
-1230049476 | 2025-03-17T17:54:00.639303
36022 / tcp
-409020351 | 2025-02-27T05:31:55.985140
36122 / tcp
-358801646 | 2025-03-13T10:30:16.346728
36322 / tcp
819727972 | 2025-03-17T12:13:35.443449
36522 / tcp
2087396567 | 2025-02-28T20:46:43.618240
36622 / tcp
2087396567 | 2025-03-16T07:50:36.139597
36922 / tcp
1741579575 | 2025-03-18T13:30:49.068586
36984 / tcp
1911457608 | 2025-03-10T09:16:51.198945
37215 / tcp
2087396567 | 2025-03-21T10:41:23.512395
37222 / tcp
50497985 | 2025-03-14T19:43:24.318486
37322 / tcp
1636811864 | 2025-03-16T11:27:58.866041
37522 / tcp
2087396567 | 2025-03-16T10:59:43.526457
37622 / tcp
2087396567 | 2025-03-16T02:10:40.037331
37722 / tcp
-616720387 | 2025-03-16T00:40:57.972661
37777 / tcp
-1399940268 | 2025-03-19T06:10:22.027551
37822 / tcp
2087396567 | 2025-03-14T01:46:01.975945
37922 / tcp
671605376 | 2025-03-18T00:46:52.733894
38022 / tcp
1519486042 | 2025-03-17T23:01:13.302377
38322 / tcp
1741579575 | 2025-03-15T15:23:17.222247
38333 / tcp
2087396567 | 2025-03-15T21:31:20.127317
38522 / tcp
-1839934832 | 2025-02-21T14:56:27.584420
38622 / tcp
-616720387 | 2025-03-14T08:52:23.766215
38722 / tcp
-1032713145 | 2025-03-14T01:00:54.298465
38822 / tcp
539065883 | 2025-03-12T16:30:39.667869
38922 / tcp
671605376 | 2025-03-13T15:22:34.960955
39122 / tcp
996960436 | 2025-03-13T18:58:45.835326
39222 / tcp
-79865617 | 2025-03-13T17:03:15.550453
39322 / tcp
2087396567 | 2025-03-11T11:49:33.541268
39622 / tcp
-971970408 | 2025-03-11T07:59:29.125545
39822 / tcp
2087396567 | 2025-03-12T05:56:53.037161
39922 / tcp
410249975 | 2025-02-26T17:43:35.978907
40022 / tcp
1082732927 | 2025-03-09T11:10:55.871250
40122 / tcp
-971970408 | 2025-02-26T14:14:43.218413
40322 / tcp
-1461540015 | 2025-03-08T21:24:35.773758
40622 / tcp
1852418385 | 2025-02-26T12:15:26.114813
40722 / tcp
-358801646 | 2025-03-08T14:35:28.050064
41022 / tcp
-2096652808 | 2025-03-08T23:07:05.089837
41122 / tcp
2087396567 | 2025-02-27T14:59:00.046735
41443 / tcp
171352214 | 2025-03-14T03:30:42.883041
41522 / tcp
1282941221 | 2025-03-04T21:25:50.923236
41800 / tcp
1911457608 | 2025-03-13T17:16:47.994423
41822 / tcp
1741579575 | 2025-03-07T17:56:28.917017
42222 / tcp
-1139539254 | 2025-03-04T23:50:29.344093
42422 / tcp
1850902677 | 2025-03-04T23:10:45.338604
42901 / tcp
-1399940268 | 2025-03-20T02:29:23.005218
43222 / tcp
539065883 | 2025-03-01T00:29:18.374772
43422 / tcp
1690634669 | 2025-02-27T20:12:14.014874
43522 / tcp
1978059005 | 2025-02-27T18:27:08.769779
43622 / tcp
-1839934832 | 2025-02-21T18:06:14.357412
43722 / tcp
-2096652808 | 2025-02-27T03:51:25.053094
43822 / tcp
-971970408 | 2025-02-27T01:59:00.032197
43922 / tcp
1996932384 | 2025-02-27T09:54:39.061010
44022 / tcp
1741579575 | 2025-02-27T08:22:55.356267
44100 / tcp
1919228981 | 2025-03-12T09:24:12.358248
44158 / tcp
-433302150 | 2025-03-15T17:55:53.924379
44303 / tcp
820958131 | 2025-02-26T15:43:32.749601
44400 / tcp
-1810987450 | 2025-03-19T02:39:33.235804
44422 / tcp
2087396567 | 2025-02-26T00:28:45.374939
44444 / tcp
380146262 | 2025-03-18T17:46:57.839968
44520 / tcp
165188539 | 2025-02-27T19:46:27.696821
44818 / tcp
-1399940268 | 2025-03-04T13:40:00.573023
45122 / tcp
-971970408 | 2025-02-25T13:10:28.961457
45222 / tcp
1741579575 | 2025-02-25T19:24:48.175909
45322 / tcp
-971970408 | 2025-02-25T11:12:24.324843
45522 / tcp
-971970408 | 2025-02-25T16:22:10.061367
45786 / tcp
1911457608 | 2025-03-20T04:19:31.022094
45821 / tcp
-1839934832 | 2025-02-24T12:15:05.443664
45888 / tcp
2143387245 | 2025-03-07T10:15:36.179085
45922 / tcp
-2031152423 | 2025-03-10T14:24:48.349960
46022 / tcp
-1392039491 | 2025-02-25T08:32:35.126975
46122 / tcp
2087396567 | 2025-02-25T06:09:44.788023
46222 / tcp
2087396567 | 2025-02-24T23:06:00.724190
46443 / tcp
1332894250 | 2025-02-22T08:57:01.956779
46522 / tcp
819727972 | 2025-02-24T06:09:12.309437
47080 / tcp
-585940771 | 2025-03-06T05:06:19.258949
47122 / tcp
-1729629024 | 2025-02-23T22:50:04.847974
47222 / tcp
2087396567 | 2025-02-23T21:05:07.274880
47322 / tcp
546151771 | 2025-02-23T20:55:26.327302
47422 / tcp
-653033013 | 2025-02-25T01:17:41.887095
47522 / tcp
2087396567 | 2025-02-23T15:51:45.057223
47622 / tcp
-1795027372 | 2025-02-25T02:35:19.133504
47722 / tcp
320677201 | 2025-03-10T10:57:02.303710
47990 / tcp
2087396567 | 2025-02-21T05:54:02.987429
48100 / tcp
-1399940268 | 2025-03-04T07:04:12.357474
48122 / tcp
1741579575 | 2025-03-10T06:26:07.972359
48222 / tcp
819727972 | 2025-03-10T04:09:57.245056
48322 / tcp
-1148066627 | 2025-03-10T03:09:48.407835
48622 / tcp
539065883 | 2025-02-24T19:39:42.824627
48722 / tcp
1519486042 | 2025-02-23T11:40:55.493078
49122 / tcp
2087396567 | 2025-02-21T06:28:39.433470
49152 / tcp
130818875 | 2025-03-20T06:59:36.312887
49622 / tcp
-319440554 | 2025-02-22T13:09:26.700118
49682 / tcp
165188539 | 2025-03-15T21:46:22.317764
49822 / tcp
1208318993 | 2025-02-22T20:47:07.142733
49922 / tcp
2087396567 | 2025-02-22T21:13:58.505484
50000 / tcp
-971970408 | 2025-03-04T22:06:19.335278
50013 / tcp
-297128567 | 2025-02-27T17:17:49.697246
50050 / tcp
-321444299 | 2025-03-16T13:16:22.878571
50073 / tcp
-1032713145 | 2025-02-22T17:30:49.398166
50100 / tcp
-1373613804 | 2025-03-22T01:46:14.423430
50222 / tcp
2087396567 | 2025-02-22T08:49:53.261766
50522 / tcp
-971970408 | 2025-02-21T23:27:38.794570
50622 / tcp
233634112 | 2025-02-21T19:51:00.644835
50722 / tcp
1887224352 | 2025-02-20T23:30:43.281472
50822 / tcp
539065883 | 2025-02-20T20:23:33.619744
50995 / tcp
819727972 | 2025-03-18T06:42:59.282458
50996 / tcp
-1730858130 | 2025-03-14T21:21:11.696573
51235 / tcp
165188539 | 2025-03-18T18:53:33.105256
51322 / tcp
504717326 | 2025-02-21T10:04:39.479445
51422 / tcp
660175493 | 2025-02-21T09:09:27.464750
51443 / tcp
2087396567 | 2025-03-12T01:50:49.101092
51922 / tcp
2087396567 | 2025-02-20T09:37:19.842680
52122 / tcp
819727972 | 2025-02-20T08:08:14.759529
52536 / tcp
1308377066 | 2025-03-09T16:24:03.743894
53413 / tcp
504717326 | 2025-03-22T02:17:02.108443
53480 / tcp
-1730858130 | 2025-03-13T22:22:18.972662
53485 / tcp
671605376 | 2025-02-21T20:29:57.087728
54138 / tcp
165188539 | 2025-03-06T19:59:52.668307
55000 / tcp
1911457608 | 2025-03-17T22:36:46.982476
55022 / tcp
819727972 | 2025-03-07T04:11:33.962126
55388 / tcp
-1036370807 | 2025-03-10T07:20:53.606196
55422 / tcp
1492413928 | 2025-03-06T18:03:33.736473
55522 / tcp
2087396567 | 2025-03-06T23:07:18.010317
55553 / tcp
472902042 | 2025-03-18T18:45:43.699402
55554 / tcp
-1839934832 | 2025-03-09T14:57:47.080398
55622 / tcp
819727972 | 2025-03-06T16:14:47.940178
55722 / tcp
2087396567 | 2025-03-06T19:46:51.753000
57022 / tcp
1212921144 | 2025-03-06T14:36:26.629683
57922 / tcp
-358801646 | 2025-03-06T04:41:20.323690
58422 / tcp
104385780 | 2025-03-05T21:43:03.577473
58522 / tcp
1741579575 | 2025-03-05T20:00:42.060816
58532 / tcp
1282941221 | 2025-02-26T06:53:25.386087
58722 / tcp
-2080784861 | 2025-03-05T18:17:13.567047
58922 / tcp
2033888749 | 2025-03-05T15:50:49.069785
59022 / tcp
2087396567 | 2025-03-05T13:08:20.738366
59122 / tcp
-319440554 | 2025-03-05T11:24:48.792731
59222 / tcp
-2031152423 | 2025-03-05T09:50:13.412819
59322 / tcp
2087396567 | 2025-03-05T07:55:48.881004
59443 / tcp
-1399940268 | 2025-03-21T02:35:17.998143
59522 / tcp
2087396567 | 2025-03-03T20:04:59.371185
60001 / tcp
-321444299 | 2025-03-15T05:10:58.327361
60022 / tcp
-616720387 | 2025-03-03T18:04:46.101167
61613 / tcp
-1013082686 | 2025-03-19T10:54:05.175537
61616 / tcp
-1969169410 | 2025-03-09T17:33:52.017146
61617 / tcp
-1032713145 | 2025-03-20T20:51:04.219789
61619 / tcp
-2089734047 | 2025-02-28T17:41:15.748931
62078 / tcp
-2023550675 | 2025-03-20T12:14:39.494037
63210 / tcp
-2017887953 | 2025-03-14T23:12:59.744317
63256 / tcp
-358801646 | 2025-03-21T21:00:51.513365
63257 / tcp
1741579575 | 2025-03-11T14:43:41.149282
64738 / tcp
2087396567 | 2025-03-15T04:48:45.672531
65000 / tcp
1121806355 | 2025-03-11T10:59:47.916297



Contact Us

Shodan ® - All rights reserved