Last Seen: 2025-04-17
Tags:
eol-product

GeneralInformation

25673j.com
wogngk.gjlslg.gougng.js.25673w.com
wogngk.gjlslg.gougng.js.25673z.com
fw3s2.43f3er.h56h.5525673.com
fwe3.d3wesg4.2dwe.569.bio
5733hc.top
5888.bio
dwebi2.d239d.sw.66688.bio
cegs.dewc345.689.bio
gjeas.wrnou78.699.bio
dew7.bqu8.dqucb.77788.bio
pay.8844hc.top
899.bio
34wef.34tf.j76yt.979.bio
988.bio
d32dwd.w3eygfdfsdfh5er.23w4etgrdf34.4e5hdbg4ef.er4.99k.bio
app2255667733.com
3wr4fs.f3c4e.sqf33.dgqyuagvdi7iq3a.monster
www.ds20009.cc
www.ds30003.cc
www.ds30018.cc
www.ds50005.cc
www.ds60008.cc
www.ds80009.cc
www.ds90011.cc
www.ds90015.cc
pay.hc2248.top
hc3329.top
pay.hc766200.com
pay.hc773223.com
hc7877.top
hc8608.top
hc8805.top
pay.hc9555.top
hc9755.top
hc9877.top
hc9998.top
quwsh.isduhf.j2255667733.com
bi23.grth6.csibvieuw.4nvldnv.k22.bio
hrtgef.3dwerg.fyj6hr.3qdc.s33.bio
ha99node4.yb876.com
www.ha99node4.yb876.com
pay.yt2330.top
pay.yt233368.com
yt5050.top
yt5836.top
yt5950.top
pay.yt652877.com
yt6642.top
pay.yt8021.top
yt8525.top
yt9053.top
yt9187.top

OpenPorts

80 / tcp
-1398803919 | 2025-04-17T01:04:08.725369
443 / tcp
-1436303652 | 2025-04-14T15:10:01.903237

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2021(2)
CVE-2021-23017
7.7A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVE-2021-3618
7.4ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
2019(1)
CVE-2019-20372
5.3NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
2018(1)
CVE-2018-16845
8.2nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.
2017(2)
CVE-2017-20005
9.8NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module.
CVE-2017-7529
7.5Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
2016(2)
CVE-2016-4450
7.5os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.
CVE-2016-1247
7.8The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.



Contact Us

Shodan ® - All rights reserved