Last Seen: 2025-04-24

GeneralInformation

andremiguelaa.com
    condo.andremiguelaa.com
    api.condo.andremiguelaa.com
    padel.andremiguelaa.com
dev.cantodoqueijo.pt
equizition.com
    api.equizition.com
equizition.pt
ifra.pt
    api.ifra.pt
    apif.ifra.pt
    f.ifra.pt
    quotes.ifra.pt
itsanashow.com
    api.itsanashow.com
ligaquiz.pt
    api.ligaquiz.pt
    gdbp.ligaquiz.pt
quizportugal.pt
    pororoca.quizportugal.pt
    quiznations.quizportugal.pt
salpicosdecor.pt

OpenPorts

22 / tcp
-1142705285 | 2025-04-22T03:04:42.347040
80 / tcp
589765266 | 2025-04-23T19:57:23.017969
443 / tcp
-752574406 | 2025-04-24T13:38:41.034283

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2023(1)
CVE-2023-44487
7.5The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
2021(2)
CVE-2021-23017
7.7A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVE-2021-3618
7.4ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.



Contact Us

Shodan ® - All rights reserved