149.202.75.21

Regular View Raw Data Timeline

GeneralInformation

Hostnames e-cryptoservice.uk
dns1.e-cryptoservice.uk
dns1.ecryptoservice.uk
Domains e-cryptoservice.uk ecryptoservice.uk 
Country France
City Calais
Organization OVH SAS
ISP OVH SAS
ASN AS16276

WebTechnologies

Blogs
Databases
Ecommerce
Form builders
Page builders
Programming languages
WordPress themes

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024(1)
CVE-2024-1442
6.0 A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *. Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
2023(2)
CVE-2023-44487
7.5The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2023-2183
4.1Grafana is an open-source platform for monitoring and observability. The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function. This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server. Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.
2022(1)
CVE-2022-23498
7.1Grafana is an open-source platform for monitoring and observability. When datasource query caching is enabled, Grafana caches all headers, including `grafana_session`. As a result, any user that queries a datasource where the caching is enabled can acquire another user’s session. To mitigate the vulnerability you can disable datasource query caching for all datasources. This issue has been patched in versions 9.2.10 and 9.3.4.
2021(2)
CVE-2021-23017
7.7A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVE-2021-3618
7.4ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
21 / tcp
-335950756 | 2025-03-20T18:37:24.703885
22 / tcp
700162544 | 2025-03-12T08:22:32.725845
25 / tcp
-1138766379 | 2025-03-14T10:27:13.308365
53 / tcp
-1308623737 | 2025-03-23T05:37:13.302098
53 / udp
-1308623737 | 2025-03-05T21:27:49.303768
80 / tcp
0 | 2025-03-22T10:15:07.789594
110 / tcp
1924648187 | 2025-03-22T07:00:16.715789
143 / tcp
-1712467009 | 2025-03-21T14:45:32.198880
443 / tcp
-2013446740 | 2025-03-22T10:37:53.981754
465 / tcp
-1974058684 | 2025-03-13T06:33:53.532840
587 / tcp
-1138766379 | 2025-03-21T18:05:10.992060
993 / tcp
-2011063995 | 2025-03-22T08:19:27.887453
995 / tcp
-784819759 | 2025-03-17T15:54:42.127094
2222 / tcp
-1320373215 | 2025-03-20T07:34:45.166490
3000 / tcp
-777961003 | 2025-03-23T01:00:45.529068
5432 / tcp
-726790289 | 2025-03-14T21:00:32.493273
5678 / tcp
-1048839981 | 2025-02-23T17:23:04.926127
6379 / tcp
-1011842871 | 2025-03-15T01:45:40.997354
9090 / tcp
2046880216 | 2025-03-21T04:59:22.637541
9100 / tcp
951545506 | 2025-03-21T00:53:02.094916
10000 / tcp
-1198704643 | 2025-03-08T16:39:50.502682
20000 / tcp
-366450061 | 2025-02-25T04:23:11.203967



Contact Us

Shodan ® - All rights reserved