Last Seen: 2025-04-22

GeneralInformation

21 / tcp
-766195958 | 2025-04-18T20:17:05.072017
80 / tcp
1376608229 | 2025-04-06T08:17:52.557819
554 / tcp
525478276 | 2025-03-31T09:21:43.177288
5523 / tcp
1931338368 | 2025-03-27T21:02:47.003809
8095 / tcp
1931338368 | 2025-03-26T20:18:44.135942
8156 / tcp
1931338368 | 2025-04-07T19:49:06.756676
8176 / tcp
1931338368 | 2025-04-09T21:08:00.416725
8598 / tcp
1931338368 | 2025-04-20T21:38:51.938104
8818 / tcp
1931338368 | 2025-04-06T10:42:37.609489
9194 / tcp
1931338368 | 2025-04-20T04:38:05.094270
9247 / tcp
1931338368 | 2025-03-27T03:17:23.908325
12134 / tcp
1931338368 | 2025-04-02T14:08:54.402646
12157 / tcp
1931338368 | 2025-04-02T22:51:16.236984
12488 / tcp
1931338368 | 2025-04-10T12:30:50.393177
12489 / tcp
1931338368 | 2025-04-22T08:34:01.449630
14147 / tcp
-1446286725 | 2025-04-22T16:37:53.385413
18225 / tcp
1931338368 | 2025-04-06T11:27:03.912020
23023 / tcp
1584967455 | 2025-04-12T11:51:40.092601
24442 / tcp
1931338368 | 2025-04-22T01:52:37.713689
27017 / tcp
1584967455 | 2025-03-31T16:25:14.039280
27036 / tcp
660634114 | 2025-04-03T01:46:34.083700
27105 / tcp
1931338368 | 2025-04-17T11:33:41.865194

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2017(1)
CVE-2017-7269
9.8Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
2009(4)
CVE-2009-4445
6.0Microsoft Internet Information Services (IIS), when used in conjunction with unspecified third-party upload applications, allows remote attackers to create empty files with arbitrary extensions via a filename containing an initial extension followed by a : (colon) and a safe extension, as demonstrated by an upload of a .asp:.jpg file that results in creation of an empty .asp file, related to support for the NTFS Alternate Data Streams (ADS) filename syntax. NOTE: it could be argued that this is a vulnerability in the third-party product, not IIS, because the third-party product should be applying its extension restrictions to the portion of the filename before the colon.
CVE-2009-4444
6.0Microsoft Internet Information Services (IIS) 5.x and 6.x uses only the portion of a filename before a ; (semicolon) character to determine the file extension, which allows remote attackers to bypass intended extension restrictions of third-party upload applications via a filename with a (1) .asp, (2) .cer, or (3) .asa first extension, followed by a semicolon and a safe extension, as demonstrated by the use of asp.dll to handle a .asp;.jpg file.
CVE-2009-2521
5.0Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability."
CVE-2009-1535
7.5The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.0 allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a %c0%af (Unicode / character) at an arbitrary position in the URI, as demonstrated by inserting %c0%af into a "/protected/" initial pathname component to bypass the password protection on the protected\ folder, aka "IIS 5.1 and 6.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1122.
2008(1)
CVE-2008-1446
9.0Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
2005(1)
CVE-2005-2089
4.3Microsoft IIS 5.0 and 6.0 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes IIS to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."



Contact Us

Shodan ® - All rights reserved