34.230.187.212

Regular View Raw Data Timeline
Last Seen: 2025-03-19
Tags:
cloud

GeneralInformation

Hostnames ec2-34-230-187-212.compute-1.amazonaws.com
gsmarketing.com
Domains amazonaws.com gsmarketing.com 
Cloud Provider Amazon
Cloud Region us-east-1
Cloud Service EC2
Country United States
City Ashburn
Organization Amazon Technologies Inc.
ISP Amazon.com, Inc.
ASN AS14618

WebTechnologies

JavaScript frameworks
Programming languages
Web servers

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(2)
CVE-2025-24460
4.3In JetBrains TeamCity before 2024.12.1 improper access control allowed to see Projects’ names in the agent pool
CVE-2025-24459
4.6In JetBrains TeamCity before 2024.12.1 reflected XSS was possible on the Vault Connection page
2024(63)
CVE-2024-56356
5.9In JetBrains TeamCity before 2024.12 insecure XMLParser configuration could lead to potential XXE attack
CVE-2024-56355
4.6In JetBrains TeamCity before 2024.12 missing Content-Type header in RemoteBuildLogController response could lead to XSS
CVE-2024-56354
5.5In JetBrains TeamCity before 2024.12 password field value were accessible to users with view settings permission
CVE-2024-56353
5.5In JetBrains TeamCity before 2024.12 backup file exposed user credentials and session cookies
CVE-2024-56352
4.6In JetBrains TeamCity before 2024.12 stored XSS was possible via image name on the agent details page
CVE-2024-56351
6.3In JetBrains TeamCity before 2024.12 access tokens were not revoked after removing user roles
CVE-2024-56350
4.3In JetBrains TeamCity before 2024.12 build credentials allowed unauthorized viewing of projects
CVE-2024-56349
5.3In JetBrains TeamCity before 2024.12 improper access control allowed unauthorized users to modify build logs
CVE-2024-56348
4.3In JetBrains TeamCity before 2024.12 improper access control allowed viewing details of unauthorized agents
CVE-2024-47951
3.5In JetBrains TeamCity before 2024.07.3 stored XSS was possible via server global settings
CVE-2024-47950
3.5In JetBrains TeamCity before 2024.07.3 stored XSS was possible in Backup configuration settings
CVE-2024-47949
4.9In JetBrains TeamCity before 2024.07.3 path traversal allowed backup file write to arbitrary location
CVE-2024-47948
4.9In JetBrains TeamCity before 2024.07.3 path traversal leading to information disclosure was possible via server backups
CVE-2024-47161
4.3In JetBrains TeamCity before 2024.07.3 password could be exposed via Sonar runner REST API
CVE-2024-43810
4.6In JetBrains TeamCity before 2024.07.1 reflected XSS was possible in the AWS Core plugin
CVE-2024-43809
3.5In JetBrains TeamCity before 2024.07.1 reflected XSS was possible on the agentPushPreset page
CVE-2024-43808
3.7In JetBrains TeamCity before 2024.07.1 self XSS was possible in the HashiCorp Vault plugin
CVE-2024-43807
4.6In JetBrains TeamCity before 2024.07.1 multiple stored XSS was possible on Clouds page
CVE-2024-43114
7.5In JetBrains TeamCity before 2024.07.1 possible privilege escalation due to incorrect directory permissions
CVE-2024-41829
3.5In JetBrains TeamCity before 2024.07 an OAuth code for JetBrains Space could be stolen via Space Application connection
CVE-2024-41828
2.6In JetBrains TeamCity before 2024.07 comparison of authorization tokens took non-constant time
CVE-2024-41827
7.4In JetBrains TeamCity before 2024.07 access tokens could continue working after deletion or expiration
CVE-2024-41826
3.5In JetBrains TeamCity before 2024.07 stored XSS was possible on Show Connection page
CVE-2024-41825
4.6In JetBrains TeamCity before 2024.07 stored XSS was possible on the Code Inspection tab
CVE-2024-41824
6.4In JetBrains TeamCity before 2024.07 parameters of the "password" type could leak into the build log in some specific cases
CVE-2024-39879
5.0In JetBrains TeamCity before 2024.03.3 application token could be exposed in EC2 Cloud Profile settings
CVE-2024-39878
4.1In JetBrains TeamCity before 2024.03.3 private key could be exposed via testing GitHub App Connection
CVE-2024-36470
8.1In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5 authentication bypass was possible in specific edge cases
CVE-2024-36378
5.9In JetBrains TeamCity before 2024.03.2 server was susceptible to DoS attacks with incorrect auth tokens
CVE-2024-36377
6.5In JetBrains TeamCity before 2024.03.2 certain TeamCity API endpoints did not check user permissions
CVE-2024-36376
6.5In JetBrains TeamCity before 2024.03.2 users could perform actions that should not be available to them based on their permissions
CVE-2024-36375
5.3In JetBrains TeamCity before 2024.03.2 technical information regarding TeamCity server could be exposed
CVE-2024-36374
4.6In JetBrains TeamCity before 2024.03.2 stored XSS via build step settings was possible
CVE-2024-36373
4.6In JetBrains TeamCity before 2024.03.2 several stored XSS in untrusted builds settings were possible
CVE-2024-36372
4.6In JetBrains TeamCity before 2023.05.6 reflected XSS on the subscriptions page was possible
CVE-2024-36371
4.6In JetBrains TeamCity before 2023.05.6, 2023.11.5 stored XSS in Commit status publisher was possible
CVE-2024-36370
4.6In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5 stored XSS via OAuth connection settings was possible
CVE-2024-36369
4.6In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5 stored XSS via issue tracker integration was possible
CVE-2024-36368
4.6In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5 reflected XSS via OAuth provider configuration was possible
CVE-2024-36367
4.6In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5 stored XSS via third-party reports was possible
CVE-2024-36366
5.4In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5 an XSS could be executed via certain report grouping and filtering operations
CVE-2024-36365
6.8In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5, 2024.03.2 a third-party agent could impersonate a cloud agent
CVE-2024-36364
6.5In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5 improper access control in Pull Requests and Commit status publisher build features was possible
CVE-2024-36363
4.6In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5 several Stored XSS in code inspection reports were possible
CVE-2024-36362
6.5In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5, 2024.03.2 path traversal allowing to read files from server was possible
CVE-2024-35302
5.4In JetBrains TeamCity before 2023.11 stored XSS during restore from backup was possible
CVE-2024-35301
5.5In JetBrains TeamCity before 2024.03.1 commit status publisher didn't check project scope of the GitHub App token
CVE-2024-31140
4.1In JetBrains TeamCity before 2024.03 server administrators could remove arbitrary files from the server by installing tools
CVE-2024-31139
5.9In JetBrains TeamCity before 2024.03 xXE was possible in the Maven build steps detector
CVE-2024-31138
4.6In JetBrains TeamCity before 2024.03 xSS was possible via Agent Distribution settings
CVE-2024-31137
6.8In JetBrains TeamCity before 2024.03 reflected XSS was possible via Space connection configuration
CVE-2024-31136
7.4In JetBrains TeamCity before 2024.03 2FA could be bypassed by providing a special URL parameter
CVE-2024-31135
6.1In JetBrains TeamCity before 2024.03 open redirect was possible on the login page
CVE-2024-31134
6.5In JetBrains TeamCity before 2024.03 authenticated users without administrative permissions could register other users when self-registration was disabled
CVE-2024-29880
4.2In JetBrains TeamCity before 2023.11 users with access to the agent machine might obtain permissions of the user running the agent process
CVE-2024-28174
5.8In JetBrains TeamCity before 2023.11.4 presigned URL generation requests in S3 Artifact Storage plugin were authorized improperly
CVE-2024-27199
7.3In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
CVE-2024-27198
9.8In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
CVE-2024-24942
5.3In JetBrains TeamCity before 2023.11.3 path traversal allowed reading data within JAR archives
CVE-2024-24938
5.3In JetBrains TeamCity before 2023.11.2 limited directory traversal was possible in the Kotlin DSL documentation
CVE-2024-24937
4.6In JetBrains TeamCity before 2023.11.2 stored XSS via agent distribution was possible
CVE-2024-24936
4.3In JetBrains TeamCity before 2023.11.2 access control at the S3 Artifact Storage plugin endpoint was missed
CVE-2024-23917
9.8In JetBrains TeamCity before 2023.11.3 authentication bypass leading to RCE was possible
2023(1)
CVE-2023-50870
4.3In JetBrains TeamCity before 2023.11.1 a CSRF on login was possible

OpenPorts

80 / tcp
586566355 | 2025-03-11T21:26:40.989910
443 / tcp
-2120150950 | 2025-03-19T00:58:41.520658



Contact Us

Shodan ® - All rights reserved