45.79.221.107

Regular View Raw Data Timeline

GeneralInformation

Hostnames 45-79-221-107.ip.linodeusercontent.com
Domains linodeusercontent.com 
Cloud Provider Linode
Cloud Region us-ga
Country United States
City Atlanta
Organization Linode
ISP Akamai Connected Cloud
ASN AS63949

WebTechnologies

Blogs
Databases
Programming languages
Web frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2024(9)
CVE-2024-45802
7.5Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to Input Validation, Premature Release of Resource During Expected Lifetime, and Missing Release of Resource after Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks by a trusted server against all clients using the proxy. This bug is fixed in the default build configuration of Squid version 6.10.
CVE-2024-25617
5.3Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Collapse of Data into Unsafe Value bug ,Squid may be vulnerable to a Denial of Service attack against HTTP header parsing. This problem allows a remote client or a remote server to perform Denial of Service when sending oversized headers in HTTP messages. In versions of Squid prior to 6.5 this can be achieved if the request_header_max_size or reply_header_max_size settings are unchanged from the default. In Squid version 6.5 and later, the default setting of these parameters is safe. Squid will emit a critical warning in cache.log if the administrator is setting these parameters to unsafe values. Squid will not at this time prevent these settings from being changed to unsafe values. Users are advised to upgrade to version 6.5. There are no known workarounds for this vulnerability. This issue is also tracked as SQUID-2024:2
CVE-2024-25111
8.6Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.
CVE-2024-22201
7.5Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6.
CVE-2024-10006
8.3A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using Headers in L7 traffic intentions could bypass HTTP header based access rules.
CVE-2024-10005
8.1A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using URL paths in L7 traffic intentions could bypass HTTP request path-based access rules.
CVE-2024-8184
5.9There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory.
CVE-2024-6763
3.7Eclipse Jetty is a lightweight, highly scalable, Java-based web server and Servlet engine . It includes a utility class, HttpURI, for URI/URL parsing. The HttpURI class does insufficient validation on the authority segment of a URI. However the behaviour of HttpURI differs from the common browsers in how it handles a URI that would be considered invalid if fully validated against the RRC. Specifically HttpURI and the browser may differ on the value of the host extracted from an invalid URI and thus a combination of Jetty and a vulnerable browser may be vulnerable to a open redirect attack or to a SSRF attack if the URI is used after passing validation checks.
CVE-2024-0727
5.5Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
2023(34)
CVE-2023-50269
8.6Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives.
CVE-2023-49288
8.6Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.
CVE-2023-49286
8.6Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerable to a Denial of Service attack against its Helper process management. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-49285
8.6Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-46847
8.6Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.
CVE-2023-46846
9.3SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.
CVE-2023-46728
7.5Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.
CVE-2023-46724
8.6Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.
CVE-2023-45725
5.7Design document functions which receive a user http request object may expose authorization or session cookie headers of the user who accesses the document. These design document functions are: *   list *   show *   rewrite *   update An attacker can leak the session component using an HTML-like output, insert the session as an external resource (such as an image), or store the credential in a _local document with an "update" function. For the attack to succeed the attacker has to be able to insert the design documents into the database, then manipulate a user to access a function from that design document. Workaround: Avoid using design documents from untrusted sources which may attempt to access or manipulate request object's headers
CVE-2023-44487
7.5The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2023-41900
3.5Jetty is a Java based web server and servlet engine. Versions 9.4.21 through 9.4.51, 10.0.15, and 11.0.15 are vulnerable to weak authentication. If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an already authenticated user, then the current request will still treat the user as authenticated. The authentication is then cleared from the session and subsequent requests will not be treated as authenticated. So a request on a previously authenticated session could be allowed to bypass authentication after it had been rejected by the `LoginService`. This impacts usages of the jetty-openid which have configured a nested `LoginService` and where that `LoginService` will is capable of rejecting previously authenticated users. Versions 9.4.52, 10.0.16, and 11.0.16 have a patch for this issue.
CVE-2023-40167
5.3Jetty is a Java based web server and servlet engine. Prior to versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1, Jetty accepts the `+` character proceeding the content-length value in a HTTP/1 header field. This is more permissive than allowed by the RFC and other servers routinely reject such requests with 400 responses. There is no known exploit scenario, but it is conceivable that request smuggling could result if jetty is used in combination with a server that does not close the connection after sending such a 400 response. Versions 9.4.52, 10.0.16, 11.0.16, and 12.0.1 contain a patch for this issue. There is no workaround as there is no known exploit scenario.
CVE-2023-36479
3.5Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2.
CVE-2023-36478
7.5Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to exceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295 will overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), and this length value is a very large positive number when multiplied by 2, then the user can cause a very large buffer to be allocated on the server. Users of HTTP/2 can be impacted by a remote denial of service attack. The issue has been fixed in versions 11.0.16, 10.0.16, and 9.4.53. There are no known workarounds.
CVE-2023-26268
4.4Design documents with matching document IDs, from databases on the same cluster, may share a mutable Javascript environment when using these design document functions: * validate_doc_update * list * filter * filter views (using view functions as filters) * rewrite * update This doesn't affect map/reduce or search (Dreyfus) index functions. Users are recommended to upgrade to a version that is no longer affected by this issue (Apache CouchDB 3.3.2 or 3.2.3). Workaround: Avoid using design documents from untrusted sources which may attempt to cache or store data in the Javascript environment.
CVE-2023-26049
2.4Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue.
CVE-2023-26048
5.3Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).
CVE-2023-22084
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.43 and prior, 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22028
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.43 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22026
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.42 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22015
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.42 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-22007
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.41 and prior and 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-21980
7.1Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 5.7.41 and prior and 8.0.32 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H).
CVE-2023-21977
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-5824
7.5A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
CVE-2023-5678
5.3Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
CVE-2023-4807
7.8Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue.
CVE-2023-3817
5.3Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
CVE-2023-2650
6.5Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(n^2) with 'n' being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer's certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.
CVE-2023-0466
5.3The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.
CVE-2023-0465
5.3Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
CVE-2023-0464
7.5A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
CVE-2023-0286
7.4There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
CVE-2023-0215
7.5The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.
2022(29)
CVE-2022-41318
8.6A buffer over-read was discovered in libntlmauth in Squid 2.5 through 5.6. Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers are vulnerable to reading unintended memory locations. In some configurations, cleartext credentials from these locations are sent to a client. This is fixed in 5.7.
CVE-2022-41317
6.5An issue was discovered in Squid 4.9 through 4.17 and 5.0.6 through 5.6. Due to inconsistent handling of internal URIs, there can be Exposure of Sensitive Information about clients using the proxy via an HTTPS request to an internal cache manager URL. This is fixed in 5.7.
CVE-2022-24706
9.8In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.
CVE-2022-22707
5.9In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a non-default configuration. The non-default configuration requires handling of the Forwarded header in a somewhat unusual manner. Also, a 32-bit system is much more likely to be affected than a 64-bit system.
CVE-2022-21617
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-21608
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-21595
4.4Vulnerability in the MySQL Server product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-21592
4.3Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 5.7.39 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
CVE-2022-21589
4.3Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.39 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
CVE-2022-21460
4.4Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).
CVE-2022-21454
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-21451
4.4Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-21444
4.4Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-21427
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-21417
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-21367
5.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Compiling). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
CVE-2022-21344
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-21304
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-21303
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-21270
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2022-21245
4.3Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
CVE-2022-4450
7.5The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.
CVE-2022-4304
5.9A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.
CVE-2022-2097
5.3AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).
CVE-2022-2068
9.8In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).
CVE-2022-2048
7.5In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
CVE-2022-2047
2.7In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario.
CVE-2022-1292
9.8The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
CVE-2022-0778
7.5The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
2021(48)
CVE-2021-46784
6.5In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses.
CVE-2021-38295
7.3In Apache CouchDB, a malicious user with permission to create documents in a database is able to attach a HTML attachment to a document. If a CouchDB admin opens that attachment in a browser, e.g. via the CouchDB admin interface Fauxton, any JavaScript code embedded in that HTML attachment will be executed within the security context of that admin. A similar route is available with the already deprecated _show and _list functionality. This privilege escalation vulnerability allows an attacker to add or remove data in any database or make configuration changes. This issue affected Apache CouchDB prior to 3.1.2
CVE-2021-35624
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).
CVE-2021-34428
2.9For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
CVE-2021-33620
6.5Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server.
CVE-2021-32761
7.5Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote code execution. The vulnerability involves changing the default `proto-max-bulk-len` configuration parameter to a very large value and constructing specially crafted commands bit commands. This problem only affects Redis on 32-bit platforms, or compiled as a 32-bit binary. Redis versions 5.0.`3m 6.0.15, and 6.2.5 contain patches for this issue. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `proto-max-bulk-len` configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.
CVE-2021-31808
6.5An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to an input-validation bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy). A client sends an HTTP Range request to trigger this.
CVE-2021-31807
6.5An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. An integer overflow problem allows a remote server to achieve Denial of Service when delivering responses to HTTP Range requests. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent.
CVE-2021-31806
6.5An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.
CVE-2021-28662
6.5An issue was discovered in Squid 4.x before 4.15 and 5.x before 5.0.6. If a remote server sends a certain response header over HTTP or HTTPS, there is a denial of service. This header can plausibly occur in benign network traffic.
CVE-2021-28652
4.9An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to incorrect parser validation, it allows a Denial of Service attack against the Cache Manager API. This allows a trusted client to trigger memory leaks that. over time, lead to a Denial of Service via an unspecified short query string. This attack is limited to clients with Cache Manager API access privilege.
CVE-2021-28651
7.5An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a buffer-management bug, it allows a denial of service. When resolving a request with the urn: scheme, the parser leaks a small amount of memory. However, there is an unspecified attack methodology that can easily trigger a large amount of memory consumption.
CVE-2021-28169
5.3For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
CVE-2021-28165
7.5In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
CVE-2021-28163
2.7In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory that is a symlink, the contents of the webapps directory is deployed as a static webapp, inadvertently serving the webapps themselves and anything else that might be in that directory.
CVE-2021-28116
3.7Squid through 4.14 and 5.x through 5.0.5, in some configurations, allows information disclosure because of an out-of-bounds read in WCCP protocol data. This can be leveraged as part of a chain for remote code execution as nobody.
CVE-2021-23841
5.9The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
CVE-2021-23840
7.5Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
CVE-2021-23017
7.7A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVE-2021-22570
6.5Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
CVE-2021-4160
5.9There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. For the 1.0.2 release it is addressed in git commit 6fc1aaaf3 that is available to premium support customers only. It will be made available in 1.0.2zc when it is released. The issue only affects OpenSSL on MIPS platforms. Fixed in OpenSSL 3.0.1 (Affected 3.0.0). Fixed in OpenSSL 1.1.1m (Affected 1.1.1-1.1.1l). Fixed in OpenSSL 1.0.2zc-dev (Affected 1.0.2-1.0.2zb).
CVE-2021-4044
7.5Internally libssl in OpenSSL calls X509_verify_cert() on the client side to verify a certificate supplied by a server. That function may return a negative return value to indicate an internal error (for example out of memory). Such a negative return value is mishandled by OpenSSL and will cause an IO function (such as SSL_connect() or SSL_do_handshake()) to not indicate success and a subsequent call to SSL_get_error() to return the value SSL_ERROR_WANT_RETRY_VERIFY. This return value is only supposed to be returned by OpenSSL if the application has previously called SSL_CTX_set_cert_verify_callback(). Since most applications do not do this the SSL_ERROR_WANT_RETRY_VERIFY return value from SSL_get_error() will be totally unexpected and applications may not behave correctly as a result. The exact behaviour will depend on the application but it could result in crashes, infinite loops or other similar incorrect responses. This issue is made more serious in combination with a separate bug in OpenSSL 3.0 that will cause X509_verify_cert() to indicate an internal error when processing a certificate chain. This will occur where a certificate does not include the Subject Alternative Name extension but where a Certificate Authority has enforced name constraints. This issue can occur even with valid chains. By combining the two issues an attacker could induce incorrect, application dependent behaviour. Fixed in OpenSSL 3.0.1 (Affected 3.0.0).
CVE-2021-3712
7.4ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
CVE-2021-3711
9.8In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).
CVE-2021-3618
7.4ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
CVE-2021-3470
5.3A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.
CVE-2021-3450
7.4The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).
CVE-2021-3449
5.9An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
CVE-2021-2356
5.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H).
CVE-2021-2226
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
CVE-2021-2202
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2194
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2180
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2179
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2178
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2174
4.4Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2171
4.4Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2169
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2166
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2162
4.3Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plug-in). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
CVE-2021-2154
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2146
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2060
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.50 and prior, 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2032
4.3Vulnerability in the MySQL Server product of Oracle MySQL (component: Information Schema). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
CVE-2021-2022
4.4Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.6.50 and prior, 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2014
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PAM Auth Plugin). Supported versions that are affected are 5.7.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2011
5.9Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-2010
4.2Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.50 and prior, 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Client accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Client. CVSS 3.1 Base Score 4.2 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L).
2020(42)
CVE-2020-27223
5.3In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.
CVE-2020-27218
4.8In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
CVE-2020-27216
7.0In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
CVE-2020-25097
8.6An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.
CVE-2020-24606
8.6Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.
CVE-2020-15811
6.5An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
CVE-2020-15810
6.5An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.
CVE-2020-15358
5.5In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
CVE-2020-15049
9.9An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
CVE-2020-14869
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14867
4.4Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14852
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Charsets). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14846
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14845
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14839
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14837
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14830
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14827
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
CVE-2020-14814
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14812
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14793
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14790
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14789
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14776
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14775
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14771
2.2Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-14769
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14765
6.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14760
5.5Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
CVE-2020-14672
4.9Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-14147
7.7An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
CVE-2020-14058
7.5An issue was discovered in Squid before 4.12 and 5.x before 5.0.3. Due to use of a potentially dangerous function, Squid and the default certificate validation helper are vulnerable to a Denial of Service when opening a TLS connection to an attacker-controlled server for HTTPS. This occurs because unrecognized error values are mapped to NULL, but later code expects that each error value is mapped to a valid error string.
CVE-2020-11945
9.8An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a short integer). Remote code execution may occur if the pooled token credentials are freed (instead of replayed as valid credentials).
CVE-2020-8517
7.5An issue was discovered in Squid before 4.10. Due to incorrect input validation, the NTLM authentication credentials parser in ext_lm_group_acl may write to memory outside the credentials buffer. On systems with memory access protections, this can result in the helper process being terminated unexpectedly. This leads to the Squid process also terminating and a denial of service for all clients using the proxy.
CVE-2020-8450
7.3An issue was discovered in Squid before 4.10. Due to incorrect buffer management, a remote client can cause a buffer overflow in a Squid instance acting as a reverse proxy.
CVE-2020-8449
7.5An issue was discovered in Squid before 4.10. Due to incorrect input validation, it can interpret crafted HTTP requests in unexpected ways to access server resources prohibited by earlier security filters.
CVE-2020-7043
9.1An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL before 1.0.2. tunnel.c mishandles certificate validation because hostname comparisons do not consider '\0' characters, as demonstrated by a good.example.com\x00evil.example.com attack.
CVE-2020-7042
5.3An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because the hostname check operates on uninitialized memory. The outcome is that a valid certificate is never accepted (only a malformed certificate may be accepted).
CVE-2020-7041
5.3An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.
CVE-2020-1971
5.9The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
CVE-2020-1968
3.7The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
CVE-2020-1938
7.5When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible.
2019(30)
CVE-2019-20372
5.3NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
CVE-2019-18860
6.1Squid before 4.9, when certain web browsers are used, mishandles HTML in the host (aka hostname) parameter to cachemgr.cgi.
CVE-2019-18679
7.5An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.
CVE-2019-18678
5.3An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.
CVE-2019-18677
6.1An issue was discovered in Squid 3.x and 4.x through 4.8 when the append_domain setting is used (because the appended characters do not properly interact with hostname length restrictions). Due to incorrect message processing, it can inappropriately redirect traffic to origins it should not be delivered to.
CVE-2019-18676
7.5An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.
CVE-2019-13345
6.1The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter.
CVE-2019-12529
5.9An issue was discovered in Squid 2.x through 2.7.STABLE9, 3.x through 3.5.28, and 4.x through 4.7. When Squid is configured to use Basic Authentication, the Proxy-Authorization header is parsed via uudecode. uudecode determines how many bytes will be decoded by iterating over the input and checking its table. The length is then used to start decoding the string. There are no checks to ensure that the length it calculates isn't greater than the input buffer. This leads to adjacent memory being decoded as well. An attacker would not be able to retrieve the decoded data unless the Squid maintainer had configured the display of usernames on error pages.
CVE-2019-12528
7.5An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.
CVE-2019-12526
9.8An issue was discovered in Squid before 4.9. URN response handling in Squid suffers from a heap-based buffer overflow. When receiving data from a remote server in response to an URN request, Squid fails to ensure that the response can fit within the buffer. This leads to attacker controlled data overflowing in the heap.
CVE-2019-12525
9.8An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1.
CVE-2019-12524
9.8An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.
CVE-2019-12523
9.1An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.
CVE-2019-12522
4.5An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root.
CVE-2019-12521
5.9An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.
CVE-2019-12520
7.5An issue was discovered in Squid through 4.7 and 5. When receiving a request, Squid checks its cache to see if it can serve up a response. It does this by making a MD5 hash of the absolute URL of the request. If found, it servers the request. The absolute URL can include the decoded UserInfo (username and password) for certain protocols. This decoded info is prepended to the domain. This allows an attacker to provide a username that has special characters to delimit the domain, and treat the rest of the URL as a path or query string. An attacker could first make a request to their domain using an encoded username, then when a request for the target domain comes in that decodes to the exact URL, it will serve the attacker's HTML instead of the real HTML. On Squid servers that also act as reverse proxies, this allows an attacker to gain access to features that only reverse proxies can use, such as ESI.
CVE-2019-12519
9.8An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expression, it could either evaluate the top of the stack, or add a new member to the stack. When adding a new member, there is no check to ensure that the stack won't overflow.
CVE-2019-11072
9.8lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer states "The feature which can be abused to cause the crash is a new feature in lighttpd 1.4.50, and is not enabled by default. It must be explicitly configured in the config file (e.g. lighttpd.conf). Certain input will trigger an abort() in lighttpd when that feature is enabled. lighttpd detects the underflow or realloc() will fail (in both 32-bit and 64-bit executables), also detected in lighttpd. Either triggers an explicit abort() by lighttpd. This is not exploitable beyond triggering the explicit abort() with subsequent application exit.
CVE-2019-10247
5.3In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.
CVE-2019-10241
6.1In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.
CVE-2019-9516
7.5Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.
CVE-2019-9513
7.5Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
CVE-2019-9511
7.5Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
CVE-2019-7317
5.3png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
CVE-2019-1563
3.7In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
CVE-2019-1559
5.9If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
CVE-2019-1552
3.3OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be '/usr/local'. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of 'C:/usr/local', which may be world writable, which enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
CVE-2019-1551
5.3There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
CVE-2019-1547
4.7Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
CVE-2019-0190
7.5A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service. This bug can be only triggered with Apache HTTP Server version 2.4.37 when using OpenSSL version 1.1.1 or later, due to an interaction in changes to handling of renegotiation attempts.
2018(22)
CVE-2018-1000027
7.5The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later.
CVE-2018-1000024
7.5The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later.
CVE-2018-19132
5.9Squid before 4.4, when SNMP is enabled, allows a denial of service (Memory Leak) via an SNMP packet.
CVE-2018-19131
6.1Squid before 4.4 has XSS via a crafted X.509 certificate during HTTP(S) error page generation for certificate errors.
CVE-2018-19052
7.5An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
CVE-2018-17188
7.2Prior to CouchDB version 2.3.0, CouchDB allowed for runtime-configuration of key components of the database. In some cases, this lead to vulnerabilities where CouchDB admin users could access the underlying operating system as the CouchDB user. Together with other vulnerabilities, it allowed full system entry for unauthenticated users. Rather than waiting for new vulnerabilities to be discovered, and fixing them as they come up, the CouchDB development team decided to make changes to avoid this entire class of vulnerabilities.
CVE-2018-16845
8.2nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.
CVE-2018-16844
5.3nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
CVE-2018-16843
5.3nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
CVE-2018-12545
7.5In Eclipse Jetty version 9.3.x and 9.4.x, the server is vulnerable to Denial of Service conditions if a remote client sends either large SETTINGs frames container containing many settings, or many small SETTINGs frames. The vulnerability is due to the additional CPU and memory allocations required to handle changed settings.
CVE-2018-12536
5.3In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.
CVE-2018-12453
7.5Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.
CVE-2018-12326
8.4Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
CVE-2018-11769
7.2CouchDB administrative users before 2.2.0 can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows a CouchDB admin user to gain arbitrary remote code execution, bypassing CVE-2017-12636 and CVE-2018-8007.
CVE-2018-11219
9.8An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
CVE-2018-11218
9.8Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.
CVE-2018-8007
7.2Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user that CouchDB runs under, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows an existing CouchDB admin user to gain arbitrary remote code execution, bypassing already disclosed CVE-2017-12636. Mitigation: All users should upgrade to CouchDB releases 1.7.2 or 2.1.2.
CVE-2018-5407
4.7Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
CVE-2018-0739
6.5Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
CVE-2018-0737
5.9The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
CVE-2018-0734
5.9The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
CVE-2018-0732
7.5During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
2017(13)
CVE-2017-20005
9.8NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module.
CVE-2017-12636
7.2CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.
CVE-2017-12635
9.8Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.
CVE-2017-9735
7.5Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
CVE-2017-7658
9.8In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.
CVE-2017-7657
9.8In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.
CVE-2017-7656
7.5In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.
CVE-2017-7529
7.5Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
CVE-2017-7269
9.8Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
CVE-2017-3738
5.9There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.
CVE-2017-3737
5.9OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.
CVE-2017-3736
6.5There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.
CVE-2017-3735
5.3While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
2016(36)
CVE-2016-10517
7.4networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port).
CVE-2016-10003
7.5Incorrect HTTP Request header comparison in Squid HTTP Proxy 3.5.0.1 through 3.5.22, and 4.0.1 through 4.0.16 results in Collapsed Forwarding feature mistakenly identifying some private responses as being suitable for delivery to multiple clients.
CVE-2016-10002
7.5Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.
CVE-2016-7056
5.5A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
CVE-2016-6306
5.9The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
CVE-2016-6304
7.5Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
CVE-2016-6303
9.8Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
CVE-2016-6302
7.5The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
CVE-2016-4800
9.8The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes.
CVE-2016-4450
7.5os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.
CVE-2016-2842
9.8The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain memory allocation succeeds, which allows remote attackers to cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-0799.
CVE-2016-2183
7.5The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
CVE-2016-2182
9.8The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
CVE-2016-2181
7.5The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
CVE-2016-2180
7.5The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
CVE-2016-2179
7.5The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
CVE-2016-2178
5.5The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
CVE-2016-2177
9.8OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
CVE-2016-2176
8.2The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
CVE-2016-2109
7.5The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
CVE-2016-2108
9.8The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.
CVE-2016-2107
5.9The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
CVE-2016-2106
7.5Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
CVE-2016-2105
7.5Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
CVE-2016-1247
7.8The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.
CVE-2016-0800
5.9The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
CVE-2016-0799
9.8The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.
CVE-2016-0798
7.5Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.
CVE-2016-0797
7.5Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
CVE-2016-0747
5.3The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.
CVE-2016-0746
9.8Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.
CVE-2016-0742
7.5The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.
CVE-2016-0705
9.8Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
CVE-2016-0704
5.9An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
CVE-2016-0703
5.9The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
CVE-2016-0702
5.1The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
2015(22)
CVE-2015-8080
7.5Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
CVE-2015-4335
10Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.
CVE-2015-4000
3.7The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
CVE-2015-3197
5.9ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
CVE-2015-3196
4.3ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
CVE-2015-3195
5.3The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
CVE-2015-3194
7.5crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
CVE-2015-1792
5.0The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
CVE-2015-1791
6.8Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
CVE-2015-1790
5.0The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
CVE-2015-1789
7.5The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
CVE-2015-1788
4.3The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
CVE-2015-0293
5.0The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
CVE-2015-0292
7.5Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.
CVE-2015-0289
5.0The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
CVE-2015-0288
5.0The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
CVE-2015-0287
5.0The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
CVE-2015-0286
5.0The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
CVE-2015-0209
6.8Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
CVE-2015-0206
5.0Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
CVE-2015-0205
5.0The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
CVE-2015-0204
4.3The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
2014(26)
CVE-2014-8275
5.0OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
CVE-2014-8176
7.5The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.
CVE-2014-5139
4.3The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
CVE-2014-4078
5.1The IP Security feature in Microsoft Internet Information Services (IIS) 8.0 and 8.5 does not properly process wildcard allow and deny rules for domains within the "IP Address and Domain Restrictions" list, which makes it easier for remote attackers to bypass an intended rule set via an HTTP request, aka "IIS Security Feature Bypass Vulnerability."
CVE-2014-3616
4.3nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct "virtual host confusion" attacks.
CVE-2014-3572
5.0The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
CVE-2014-3571
5.0OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
CVE-2014-3570
5.0The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
CVE-2014-3568
4.3OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.
CVE-2014-3567
7.1Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
CVE-2014-3566
3.4The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
CVE-2014-3513
7.1Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.
CVE-2014-3512
7.5Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.
CVE-2014-3511
4.3The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
CVE-2014-3510
4.3The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.
CVE-2014-3509
6.8Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.
CVE-2014-3508
4.3The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.
CVE-2014-3507
5.0Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
CVE-2014-3506
5.0d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.
CVE-2014-3505
5.0Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
CVE-2014-3470
4.3The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
CVE-2014-0224
7.4OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
CVE-2014-0221
4.3The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
CVE-2014-0198
4.3The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
CVE-2014-0195
6.8The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.
CVE-2014-0076
1.9The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
2013(5)
CVE-2013-7458
3.3linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, which allows local users to obtain sensitive information by reading the file.
CVE-2013-6449
4.3The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
CVE-2013-0337
7.5The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
CVE-2013-0169
2.6The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
CVE-2013-0166
5.0OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
2012(6)
CVE-2012-2333
6.8Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.
CVE-2012-2110
7.5The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
CVE-2012-1180
5.0Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
CVE-2012-1165
5.0The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.
CVE-2012-0884
5.0The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.
CVE-2012-0027
5.0The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
2011(13)
CVE-2011-4968
4.8nginx http proxy module does not verify peer identity of https origin server which could facilitate man-in-the-middle attack (MITM)
CVE-2011-4963
5.0nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
CVE-2011-4619
5.0The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
CVE-2011-4577
4.3OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.
CVE-2011-4576
5.0The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
CVE-2011-4354
5.8crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.
CVE-2011-4315
6.8Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
CVE-2011-4109
9.3Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.
CVE-2011-4108
4.3The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
CVE-2011-3210
5.0The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.
CVE-2011-1945
2.6The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation.
CVE-2011-1473
5.0OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment
CVE-2011-0014
5.0ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka "OCSP stapling vulnerability."
2010(13)
CVE-2010-5298
4.0Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
CVE-2010-4252
7.5OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
CVE-2010-4180
4.3OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
CVE-2010-3972
10Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." NOTE: some of these details are obtained from third party information.
CVE-2010-3864
7.6Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
CVE-2010-2730
9.3Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka "Request Header Buffer Overflow Vulnerability."
CVE-2010-2266
5.0nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
CVE-2010-2263
5.0nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
CVE-2010-1899
4.3Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka "IIS Repeated Parameter Request Denial of Service Vulnerability."
CVE-2010-0928
4.0OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."
CVE-2010-0742
7.5The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.
CVE-2010-0740
5.0The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number. NOTE: some of these details are obtained from third party information.
CVE-2010-0433
4.3The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
2009(22)
CVE-2009-5046
6.1JSP Dump and Session Dump Servlet XSS in jetty before 6.1.22.
CVE-2009-5045
7.5Dump Servlet information leak in jetty before 6.1.22.
CVE-2009-4487
6.8nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
CVE-2009-4445
6.0Microsoft Internet Information Services (IIS), when used in conjunction with unspecified third-party upload applications, allows remote attackers to create empty files with arbitrary extensions via a filename containing an initial extension followed by a : (colon) and a safe extension, as demonstrated by an upload of a .asp:.jpg file that results in creation of an empty .asp file, related to support for the NTFS Alternate Data Streams (ADS) filename syntax. NOTE: it could be argued that this is a vulnerability in the third-party product, not IIS, because the third-party product should be applying its extension restrictions to the portion of the filename before the colon.
CVE-2009-4444
6.0Microsoft Internet Information Services (IIS) 5.x and 6.x uses only the portion of a filename before a ; (semicolon) character to determine the file extension, which allows remote attackers to bypass intended extension restrictions of third-party upload applications via a filename with a (1) .asp, (2) .cer, or (3) .asa first extension, followed by a semicolon and a safe extension, as demonstrated by the use of asp.dll to handle a .asp;.jpg file.
CVE-2009-4355
5.0Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
CVE-2009-3767
4.3libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
CVE-2009-3766
6.8mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
CVE-2009-3765
6.8mutt_ssl.c in mutt 1.5.19 and 1.5.20, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
CVE-2009-3555
5.8The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
CVE-2009-3245
10OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.
CVE-2009-2521
5.0Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability."
CVE-2009-2409
5.1The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
CVE-2009-1535
7.5The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.0 allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a %c0%af (Unicode / character) at an arbitrary position in the URI, as demonstrated by inserting %c0%af into a "/protected/" initial pathname component to bypass the password protection on the protected\ folder, aka "IIS 5.1 and 6.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1122.
CVE-2009-1390
6.8Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS certificate in the chain is accepted instead of verifying the entire chain, which allows remote attackers to spoof trusted servers via a man-in-the-middle attack.
CVE-2009-1387
5.0The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
CVE-2009-1386
5.0ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
CVE-2009-1378
5.0Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."
CVE-2009-1377
5.0The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
CVE-2009-0789
5.0OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
CVE-2009-0591
2.6The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is enabled, does not properly handle errors associated with malformed signed attributes, which allows remote attackers to repudiate a signature that originally appeared to be valid but was actually invalid.
CVE-2009-0590
5.0The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
2008(4)
CVE-2008-7270
4.3OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.
CVE-2008-5077
5.8OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
CVE-2008-1446
9.0Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
CVE-2008-0166
7.5OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.
2007(3)
CVE-2007-5135
6.8Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible.
CVE-2007-4995
9.3Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.
CVE-2007-3108
1.2The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.
2006(7)
CVE-2006-7250
5.0The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
CVE-2006-6578
7.5Microsoft Internet Information Services (IIS) 5.1 permits the IUSR_Machine account to execute non-EXE files such as .COM files, which allows attackers to execute arbitrary commands via arguments to any .COM file that executes those arguments, as demonstrated using win.com when it is in a web directory with certain permissions.
CVE-2006-4343
4.3The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.
CVE-2006-4339
4.3OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.
CVE-2006-3738
10Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.
CVE-2006-2940
7.8OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.
CVE-2006-2937
7.8OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.
2005(4)
CVE-2005-4360
7.8The URL parser in Microsoft Internet Information Services (IIS) 5.1 on Windows XP Professional SP2 allows remote attackers to execute arbitrary code via multiple requests to ".dll" followed by arguments such as "~0" through "~9", which causes ntdll.dll to produce a return value that is not correctly handled by IIS, as demonstrated using "/_vti_bin/.dll/*/~0". NOTE: the consequence was originally believed to be only a denial of service (application crash and reboot).
CVE-2005-2969
5.0The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
CVE-2005-2946
7.5The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.
CVE-2005-2089
4.3Microsoft IIS 5.0 and 6.0 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes IIS to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
2002(2)
CVE-2002-1718
5.0Microsoft Internet Information Server (IIS) 5.1 may allow remote attackers to view the contents of a Frontpage Server Extension (FPSE) file, as claimed using an HTTP request for colegal.htm that contains .. (dot dot) sequences.
CVE-2002-1717
5.0Microsoft Internet Information Server (IIS) 5.1 allows remote attackers to view path information via a GET request to (1) /_vti_pvt/access.cnf, (2) /_vti_pvt/botinfs.cnf, (3) /_vti_pvt/bots.cnf, or (4) /_vti_pvt/linkinfo.cnf.

OpenPorts

1115171920212223243743497079808182838485868889929394969810210411011111311912213513717517918019219519922126431134034740042744044344444544644945145246548850251351554154855455559360263163664666667570077178980580680981183083385387390294799399599899910121023102410801099115311771180118111931207123412351291131113371377138713881400141414331452145414561458147114941521155715771599160417231741180018301883191119251926193519501952196219641968196919751988200120022008201620202021202220622067206820802081208220862087210321082121212221302133215421812196222222262250225923232332234523512362236323752376240424802548255425612562257025982628265027612762285029853000300130023004300730113012301530173022304730493050305330543055306030633068307030723075307730803084308630873092309430983102310331123121312831303131313231413143314531463153316031703175318031883193319431953200325632603268326932703299330133063310333333373341338833893390340734123460350035033510354035413542355135563557356135663567357035803689374937903791379238383950400040024022404040644072408541174120414841504159417242004243428243214343436944004433443444364438444044434444444944574500450645204528454345674664478247864808484848994911494950005001500250045005500750095010502550605083508950905093510051305135514051505180520152095222522552265230523252395241524252495258526752695270527352745275528053535357543254355439544454545494555255555560556755905593559755985601560756135630566056785680569656985800580158585900590159085912591359155919593859845985598659915992599660006001600260056006600760096011603660606061608060816134616162646331636363796400643364436464648265116512651365436550655665806588659066036605662266506653666166646666666766686688669766997002700470057011701470207078708170837085708771727173721873027331734874157434744374747493750075477548763476577687770077777779778079808000800180028003800480088009801080228025802880438046804880498051805280588059806080628063806680698072807480758077808080818083808580868087808980908091809380978098809981008106810881128114811781188121812381248125812981308134813581368138813981408141814281488150815181538156815781608168817081728173817481758181818581888191819281938194819581988200823782508280828582918333833483858401840384048409841184128414841584228424843184328441844384448447845784618464846784708473850085018502850685148515852485328533854585548561856285678568857585788594859785998600860186058606862186228623864086418649870687078723872487318733876487668779878987908800880288038805880788118820882488258827882888298832883488388852885588568860886288668871887288788880888788888889889989018902891089118916893589698980899089918999900090019002900490099010901490199027903190329036903790399040904290489050905190539055906190649065906690689069907290759076908090819083908490909091909390959096910091109116911891219129913191389143914691479149915091519159916091619162916391669168918091829188919191929200920292049205921292139215921892199220922192229223923692429244924692479249925092569280928392959306931393159333938393989399941094189443944694549455946595019505951595279529953095509595960096069704971197439758976197659779980098699888989899019909992399269943994499559981999299939994999899991000010001100031000610007100081001010012100161001910023100291003310034100381004110043100451004610050100521006610075100811008410089100901010010101101341018110201102401024310256103021039710443105331090910911109351100211007110821111111112112101128811300113711143411443120001210512107121091211012111121131211412119121201212212124121391214812156121631216412166121671217912183121931219612200122041220512215122191222112222122271223012231122351223812241122421224812250122561225912261122631226612268122711227312276122771228412286122891229412295123071231312315123171231812321123261232912330123321233412337123441234512348123491235612359123601236112366123671236812373123751237612384123871239012392123971239812404124051240712411124121242312425124261242712428124321243612442124511245212454124611246412466124671247212475124771247812483124861249112494124981249912503125051250612512125151251712518125191252412529125411254612554125581256512566125671256812569125721257412582125871259013000130471357914082141041414714265143441440014401144021440314406144071487314880148941489515001150021500615018150381504015082151511544315672156731600216007160101601316014160171601816020160231603016035160401604416045160461605116053160571606616068160691607516078160801608516091160931609616097161021610416316164011640316443164641660116666166671683116992169931700017001170101710217777180001800718008180091801918024180311803418035180381804118042180471805518056180581805918063180641806718070180711807718080180811808318084180851808818094180971809818109181121824518443185531876518802190001901719071190841920019222192331977619930199982000020001200182005020080200872011020121202002020220256205472088020892210022102521027210822123621237212392124121244212452124721249212512125221255212572125921261212652126821270212722127921280212852128621290212922129421295213002130121304213072131021315213162132621329213792193522001220672207022206222222255623023231282342424181242452444225001250052510525565266562665727016270172703627571280152801728080298403000030002300033000630022300233010430111301133012230222303013042230444304683050130522306223070130718307223082230892309223101731022311223122231322313373138031422314433152231722319223202232202322223240032422325223262232722327643282232922330223312233222333223333833389334223362233722338223392234022341223442234522346223472234822349223500035122352223532235422355223562235722359223602236122362223632236422365223662236822369223698337022371223721537222373223742237522376223777737822379223802238122382223832238333385223862238822389223902239222394223962239722398224000140005400224022240322407224144341794418004192242022422224242243200433224342243522439224402244100441584422244300443034430644320443374434144350444444481845001450024555545667457774578845922464434753447722478084782247922479894799048018480224822248322485224889949152491534950149688500005000150006500115001350042500505007050073501005010550107501605020250443505005058050805509965099751004510055110651200512355144352311523405286953022534135348154022541385498455000550225505555080552005522255422554425544355522555535555455722558225752257622577225777857788579225800058122582225832258422584435853258722588225892259022592225932259443595226000160010600216002360030600996010260129604436161361616620786321063256632576326064295647386500065004
11 / tcp
-306402706 | 2025-03-19T07:35:42.546421
15 / tcp
-791262761 | 2025-03-23T08:47:03.462123
17 / tcp
-919879965 | 2025-03-18T03:04:27.872164
19 / tcp
-1940570412 | 2025-03-07T15:26:38.241695
20 / tcp
-1474361830 | 2025-03-13T08:16:18.061274
21 / tcp
614467852 | 2025-03-17T23:17:19.761179
22 / tcp
2144718472 | 2025-03-06T09:23:46.821713
23 / tcp
-244073092 | 2025-03-28T16:53:57.215698
24 / tcp
-1151897562 | 2025-03-13T21:25:32.082525
37 / tcp
-1918342314 | 2025-03-25T03:55:36.553896
43 / tcp
36198710 | 2025-03-04T19:53:02.410339
49 / tcp
671704676 | 2025-03-20T09:38:05.009100
70 / tcp
259745872 | 2025-03-25T10:30:17.242729
79 / tcp
259745872 | 2025-03-22T03:54:24.915634
80 / tcp
-2119781442 | 2025-03-21T11:04:38.270328
81 / tcp
1371338123 | 2025-03-28T12:39:59.783555
82 / tcp
867812518 | 2025-03-19T01:10:48.545975
83 / tcp
-1676841580 | 2025-03-27T05:20:59.257512
84 / tcp
-1895233062 | 2025-03-24T20:59:11.217930
85 / tcp
-2139138375 | 2025-03-10T02:15:10.394361
86 / tcp
1586620300 | 2025-03-29T02:32:18.466608
88 / tcp
1063996306 | 2025-03-25T16:32:18.702607
89 / tcp
1182414816 | 2025-03-09T10:36:30.893247
92 / tcp
-2120506126 | 2025-03-14T08:44:39.247342
93 / tcp
-2084165805 | 2025-03-20T02:07:15.604910
94 / tcp
114149581 | 2025-03-17T22:42:05.053972
96 / tcp
1825116543 | 2025-03-28T12:03:53.523910
98 / tcp
1084902765 | 2025-03-10T19:08:48.522310
102 / tcp
539417448 | 2025-03-27T13:01:31.260199
104 / tcp
-1729643016 | 2025-03-27T04:00:46.387302
110 / tcp
-399232852 | 2025-03-16T21:27:55.391967
111 / tcp
2117710047 | 2025-03-18T20:21:54.880370
113 / tcp
1448261485 | 2025-03-20T02:28:16.609606
119 / tcp
1813521827 | 2025-03-28T02:30:39.984322
122 / tcp
-302817069 | 2025-03-26T10:49:58.119581
135 / tcp
477215837 | 2025-03-23T04:31:13.556037
137 / udp
370444245 | 2025-03-25T23:02:50.731491
175 / tcp
-571909786 | 2025-03-17T16:20:19.573499
179 / tcp
-430621287 | 2025-03-24T02:42:28.022012
180 / tcp
1958856864 | 2025-03-27T01:49:30.272479
192 / tcp
1082092689 | 2025-03-24T23:57:04.498073
195 / tcp
667672571 | 2025-03-25T11:52:04.705798
199 / tcp
-240626637 | 2025-03-18T04:42:40.569529
221 / tcp
-1044059296 | 2025-03-17T00:34:29.872523
264 / tcp
-148145005 | 2025-03-16T14:51:56.455861
311 / tcp
1476063295 | 2025-02-27T12:09:30.760582
340 / tcp
-501496526 | 2025-03-23T19:40:40.390754
347 / tcp
-1594793897 | 2025-03-23T19:56:33.230341
400 / tcp
1253820060 | 2025-03-27T22:23:03.045492
427 / tcp
-921802369 | 2025-03-11T20:33:58.083955
440 / tcp
-1625931738 | 2025-03-13T10:24:36.151556
443 / tcp
-847675513 | 2025-03-16T15:14:40.307579
444 / tcp
1572590137 | 2025-03-26T02:20:54.254094
445 / tcp
133120522 | 2025-03-10T21:04:05.357115
446 / tcp
2035536313 | 2025-03-20T19:48:34.005310
449 / tcp
-1341354805 | 2025-03-17T06:19:16.764039
451 / tcp
-1935068304 | 2025-03-25T07:31:31.099326
452 / tcp
-2066286351 | 2025-03-11T07:27:25.921100
465 / tcp
1007362471 | 2025-03-06T14:56:21.433252
488 / tcp
-1737953175 | 2025-03-24T08:04:34.650092
502 / tcp
390532077 | 2025-03-20T20:47:30.720373
513 / tcp
-97781971 | 2025-03-24T02:00:22.366826
515 / tcp
1717448415 | 2025-03-27T10:34:01.873566
541 / tcp
1684490081 | 2025-03-24T10:51:18.818705
548 / tcp
-1579293701 | 2025-03-22T03:46:14.615016
554 / tcp
1601194328 | 2025-03-15T04:50:35.343767
555 / tcp
-1117430101 | 2025-03-23T21:48:10.723068
593 / tcp
-513320057 | 2025-03-17T01:34:13.203803
602 / tcp
-81534156 | 2025-03-08T16:28:06.458015
631 / tcp
1011529101 | 2025-03-11T06:05:51.843987
636 / tcp
-2046121314 | 2025-03-24T07:44:48.682605
646 / tcp
-1698431022 | 2025-03-16T05:30:44.770653
666 / tcp
-321055909 | 2025-03-14T12:07:22.624191
675 / tcp
-726692680 | 2025-03-26T04:20:05.333877
700 / tcp
825384453 | 2025-03-22T03:46:36.705721
771 / tcp
891914399 | 2025-03-23T13:03:33.140759
789 / tcp
-2133879931 | 2025-03-20T17:43:49.764636
805 / tcp
-728482991 | 2025-03-17T14:06:04.110250
806 / tcp
-879452393 | 2025-03-09T15:10:12.588852
809 / tcp
-827186901 | 2025-03-19T10:30:40.605738
811 / tcp
-1625878948 | 2025-03-24T09:18:11.345806
830 / tcp
1559796267 | 2025-03-08T20:19:47.842703
833 / tcp
818043903 | 2025-03-25T19:32:34.015674
853 / tcp
1785640626 | 2025-03-13T06:03:41.538085
873 / tcp
117922299 | 2025-03-27T01:51:46.312390
902 / tcp
321712308 | 2025-03-25T09:13:07.517431
947 / tcp
-723189611 | 2025-03-04T00:21:38.350717
993 / tcp
-190567176 | 2025-03-28T10:34:53.649589
995 / tcp
1966931170 | 2025-03-14T19:44:54.176029
998 / tcp
1327624333 | 2025-03-06T01:25:39.031830
999 / tcp
-1986737386 | 2025-03-24T06:44:41.175560
1012 / tcp
1808677652 | 2025-03-26T15:22:12.566754
1023 / tcp
-100129896 | 2025-03-23T00:47:57.211810
1024 / tcp
-1911402436 | 2025-03-26T10:46:25.352191
1080 / tcp
-2077790085 | 2025-03-08T14:16:02.749223
1099 / tcp
1184447816 | 2025-03-19T06:57:41.309903
1153 / tcp
1273970973 | 2025-03-10T21:11:26.724077
1177 / tcp
-717235822 | 2025-03-24T06:44:46.012183
1180 / tcp
683527628 | 2025-03-16T04:51:38.627984
1181 / tcp
292129337 | 2025-03-16T04:43:22.744031
1193 / tcp
-242168207 | 2025-03-08T13:06:39.963936
1207 / tcp
-577130810 | 2025-03-05T10:50:22.423870
1234 / tcp
-1211571513 | 2025-03-27T22:07:15.089190
1235 / tcp
-541208580 | 2025-03-20T14:49:52.312270
1291 / tcp
2068246707 | 2025-03-10T04:50:28.846755
1311 / tcp
-693364202 | 2025-03-11T11:48:42.283352
1337 / tcp
1647229176 | 2025-03-20T13:23:30.765211
1377 / tcp
187938516 | 2025-03-09T21:39:17.891919
1387 / tcp
-921949786 | 2025-03-06T08:05:24.593912
1388 / tcp
1870395108 | 2025-03-17T09:27:52.891274
1400 / tcp
-828192934 | 2025-03-12T15:26:32.937879
1414 / tcp
1182468433 | 2025-03-23T06:24:08.965426
1433 / tcp
1682414711 | 2025-03-17T20:30:55.313244
1452 / tcp
-1103518531 | 2025-03-10T22:51:04.528053
1454 / tcp
477345722 | 2025-03-14T23:20:08.848146
1456 / tcp
299432000 | 2025-03-09T15:09:43.054308
1458 / tcp
970025397 | 2025-03-21T20:08:24.331491
1471 / tcp
1354823936 | 2025-03-15T06:51:53.187539
1494 / tcp
739518548 | 2025-03-11T19:18:08.408314
1521 / tcp
-741156574 | 2025-03-26T07:10:43.190098
1557 / tcp
1135605134 | 2025-03-09T21:00:12.747206
1577 / tcp
1398075051 | 2025-03-13T06:39:00.008065
1599 / tcp
1050704104 | 2025-03-25T04:03:51.708085
1604 / tcp
-1826842741 | 2025-03-13T17:24:36.279893
1723 / tcp
941448006 | 2025-03-27T21:08:57.480105
1741 / tcp
1960153146 | 2025-03-28T03:47:56.913657
1800 / tcp
-1323302264 | 2025-03-27T07:02:45.326753
1830 / tcp
194205711 | 2025-03-11T16:27:24.344795
1883 / tcp
219932046 | 2025-03-17T02:55:20.346120
1911 / tcp
1105699109 | 2025-03-25T10:28:40.777153
1925 / tcp
1572299626 | 2025-02-28T17:03:05.339795
1926 / tcp
720652015 | 2025-03-28T04:48:24.837609
1935 / tcp
1389551851 | 2025-03-20T19:41:38.624551
1950 / tcp
445480841 | 2025-03-04T21:20:01.618636
1952 / tcp
-960078942 | 2025-03-06T12:45:01.898322
1962 / tcp
-644975174 | 2025-03-12T01:22:57.587861
1964 / tcp
-748345788 | 2025-03-18T05:16:24.862844
1968 / tcp
-895512333 | 2025-03-21T16:54:28.001971
1969 / tcp
1369158379 | 2025-03-24T12:54:36.349537
1975 / tcp
1393739577 | 2025-03-28T22:44:46.072463
1988 / tcp
946627376 | 2025-03-27T13:06:14.395903
2001 / tcp
-525900550 | 2025-03-15T14:07:53.403446
2002 / tcp
-2021563332 | 2025-03-16T11:59:22.747125
2008 / tcp
2107255918 | 2025-03-28T14:43:31.823842
2016 / tcp
677149538 | 2025-03-25T19:11:46.039913
2020 / tcp
-1046869936 | 2025-03-13T17:06:21.740591
2021 / tcp
-1414324695 | 2025-03-11T03:40:57.368790
2022 / tcp
-958294315 | 2025-03-05T07:10:11.212199
2062 / tcp
-1602480806 | 2025-03-07T09:20:11.934890
2067 / tcp
-1377688058 | 2025-03-11T19:10:24.615422
2068 / tcp
698169929 | 2025-03-21T09:02:12.692739
2080 / tcp
-947337610 | 2025-03-11T04:13:08.323080
2081 / tcp
-1519623158 | 2025-03-23T21:36:31.873135
2082 / tcp
10073503 | 2025-03-24T22:04:28.143795
2086 / tcp
-1309107813 | 2025-03-24T13:17:41.530600
2087 / tcp
-585421332 | 2025-03-28T00:56:35.408074
2103 / tcp
1212343183 | 2025-02-27T12:58:08.289216
2108 / tcp
1347393607 | 2025-03-18T08:55:49.545619
2121 / tcp
-670018157 | 2025-03-21T20:31:44.378298
2122 / tcp
-527866870 | 2025-03-15T09:10:33.611687
2130 / tcp
1792269593 | 2025-03-11T19:54:14.760669
2133 / tcp
7372036 | 2025-03-13T20:24:53.127426
2154 / tcp
-1702429019 | 2025-03-24T19:51:52.359604
2181 / tcp
-126184584 | 2025-03-17T18:02:14.665782
2196 / tcp
-1173366868 | 2025-03-06T14:09:15.759672
2222 / tcp
2059014346 | 2025-03-19T03:16:32.187941
2226 / tcp
-1317644931 | 2025-03-12T09:53:14.449816
2250 / tcp
-1037726910 | 2025-02-27T10:59:57.393606
2259 / tcp
-617003666 | 2025-02-28T01:53:56.246867
2323 / tcp
189935886 | 2025-03-23T10:17:13.706841
2332 / tcp
-25767125 | 2025-03-22T20:37:07.527039
2345 / tcp
-1729643016 | 2025-03-17T06:23:18.425231
2351 / tcp
-520871576 | 2025-03-25T15:13:29.295473
2362 / tcp
-2079638239 | 2025-03-22T10:36:18.779836
2363 / tcp
-2028562298 | 2025-03-21T11:29:32.254226
2375 / tcp
-944192899 | 2025-03-21T17:04:27.236438
2376 / tcp
1354966010 | 2025-03-23T13:16:48.417090
2404 / tcp
-1323302264 | 2025-03-22T17:12:03.627186
2480 / tcp
47644352 | 2025-03-15T10:02:44.386801
2548 / tcp
-881998819 | 2025-03-15T19:22:51.021618
2554 / tcp
1678270684 | 2025-03-04T08:45:48.126507
2561 / tcp
122169647 | 2025-03-12T23:16:41.806697
2562 / tcp
1513547818 | 2025-03-10T00:53:28.239607
2570 / tcp
1980961407 | 2025-03-12T18:26:15.317989
2598 / tcp
262214688 | 2025-03-11T02:23:16.844088
2628 / tcp
-1385501843 | 2025-03-24T17:44:12.518864
2650 / tcp
1092465271 | 2025-03-28T20:26:41.114485
2761 / tcp
-1729643016 | 2025-03-15T05:07:27.092758
2762 / tcp
-1729643016 | 2025-03-22T00:08:10.140910
2850 / tcp
1675161315 | 2025-03-04T18:50:19.006513
2985 / tcp
-1074420508 | 2025-03-28T09:24:30.641927
3000 / tcp
-599886551 | 2025-03-19T15:55:03.765294
3001 / tcp
858132292 | 2025-03-17T02:57:04.160272
3002 / tcp
732361791 | 2025-03-16T23:20:55.134110
3004 / tcp
-1096543953 | 2025-03-24T15:31:56.186283
3007 / tcp
826011962 | 2025-03-06T09:34:29.889609
3011 / tcp
1088553914 | 2025-03-17T00:47:56.974170
3012 / tcp
1667662661 | 2025-03-24T20:51:49.426627
3015 / tcp
-457393496 | 2025-03-22T10:36:08.263480
3017 / tcp
-802508529 | 2025-03-24T10:31:08.068993
3022 / tcp
1078116946 | 2025-03-03T23:13:49.114545
3047 / tcp
-679075890 | 2025-03-19T20:47:46.167334
3049 / tcp
892338183 | 2025-03-24T09:23:49.729928
3050 / tcp
1730208901 | 2025-03-27T08:03:31.807776
3053 / tcp
765496023 | 2025-03-19T05:03:35.072604
3054 / tcp
-1073459390 | 2025-03-11T03:22:24.647837
3055 / tcp
633304912 | 2025-03-10T02:18:22.703639
3060 / tcp
371200191 | 2025-03-26T18:39:39.677144
3063 / tcp
-1756201079 | 2025-03-06T21:27:10.601036
3068 / tcp
-595983828 | 2025-03-09T22:55:09.422385
3070 / tcp
296887192 | 2025-03-27T19:16:42.323862
3072 / tcp
-1808027797 | 2025-03-19T00:12:01.498786
3075 / tcp
-1045455608 | 2025-03-28T13:19:43.022681
3077 / tcp
113703889 | 2025-03-26T06:53:37.996226
3080 / tcp
-765346827 | 2025-03-16T20:35:16.690965
3084 / tcp
2106364765 | 2025-03-25T10:59:24.477925
3086 / tcp
2010753565 | 2025-03-09T04:46:04.308133
3087 / tcp
2146669936 | 2025-03-27T16:13:04.047073
3092 / tcp
-1470310152 | 2025-03-18T15:14:42.501697
3094 / tcp
-954241938 | 2025-03-28T13:33:07.474191
3098 / tcp
1094964080 | 2025-03-21T13:41:49.475254
3102 / tcp
66631720 | 2025-03-04T01:03:22.412289
3103 / tcp
-927967320 | 2025-03-06T16:52:06.046078
3112 / tcp
-20005395 | 2025-03-25T12:08:16.665714
3121 / tcp
-1076296407 | 2025-03-07T18:43:29.928575
3128 / tcp
-1357370197 | 2025-03-28T14:15:41.076741
3130 / tcp
-353279841 | 2025-03-28T13:20:47.918582
3131 / tcp
2046792457 | 2025-03-18T17:41:42.053809
3132 / tcp
-1724634652 | 2025-03-08T15:29:13.752918
3141 / tcp
-1046887824 | 2025-03-25T18:31:41.329640
3143 / tcp
1635141069 | 2025-03-26T16:14:40.147426
3145 / tcp
2026830099 | 2025-03-14T10:23:51.341702
3146 / tcp
-973321264 | 2025-03-13T20:30:33.387826
3153 / tcp
-663774366 | 2025-03-16T03:36:53.570629
3160 / tcp
-1621368972 | 2025-03-25T06:19:40.678259
3170 / tcp
120524739 | 2025-03-10T09:05:08.942344
3175 / tcp
-1536252140 | 2025-03-21T17:18:42.366188
3180 / tcp
1619886207 | 2025-03-23T04:33:35.935333
3188 / tcp
500790800 | 2025-03-18T11:10:49.734298
3193 / tcp
-15893314 | 2025-03-15T14:36:24.842637
3194 / tcp
-1483747592 | 2025-03-22T04:52:55.513268
3195 / tcp
-580706567 | 2025-03-18T11:55:31.835382
3200 / tcp
212197537 | 2025-03-19T06:49:04.159366
3256 / tcp
492355573 | 2025-03-27T06:00:50.926951
3260 / tcp
-829322809 | 2025-03-24T06:38:10.408479
3268 / tcp
-1528008955 | 2025-03-20T07:26:39.008470
3269 / tcp
1986529778 | 2025-03-14T08:12:04.759020
3270 / tcp
1494196271 | 2025-03-21T19:26:11.405902
3299 / tcp
-163589323 | 2025-03-23T18:52:55.251046
3301 / tcp
1240340119 | 2025-03-17T19:44:59.341225
3306 / tcp
-1586063280 | 2025-03-19T21:14:18.235158
3310 / tcp
1009173221 | 2025-03-28T08:05:41.451799
3333 / tcp
103587556 | 2025-03-17T01:59:22.237705
3337 / tcp
22300988 | 2025-03-14T11:10:59.808572
3341 / tcp
-1041505072 | 2025-03-21T02:37:33.371581
3388 / tcp
1185124533 | 2025-03-27T16:50:54.219843
3389 / tcp
940603052 | 2025-03-19T13:41:31.825258
3390 / tcp
-502850690 | 2025-03-27T08:01:50.661394
3407 / tcp
937730027 | 2025-03-18T21:57:15.267896
3412 / tcp
801843459 | 2025-03-23T06:51:31.931913
3460 / tcp
-691462922 | 2025-03-22T20:48:22.621023
3500 / tcp
-1814585075 | 2025-03-28T14:38:07.341100
3503 / tcp
688785843 | 2025-03-11T06:25:18.814147
3510 / tcp
1374735941 | 2025-03-04T11:38:01.663666
3540 / tcp
466155847 | 2025-03-21T10:29:22.676245
3541 / tcp
353822956 | 2025-03-17T12:02:45.978954
3542 / tcp
-650581069 | 2025-03-12T05:09:48.993656
3551 / tcp
-1050340710 | 2025-03-17T17:09:15.619668
3556 / tcp
-1476120504 | 2025-03-22T10:30:39.482236
3557 / tcp
-1358961268 | 2025-03-29T03:06:02.666093
3561 / tcp
1097499638 | 2025-03-14T07:05:28.716362
3566 / tcp
-262085004 | 2025-03-15T06:31:25.004480
3567 / tcp
1133737731 | 2025-03-23T11:30:42.777380
3570 / tcp
1436641578 | 2025-03-25T08:45:00.014568
3580 / tcp
-301239436 | 2025-03-21T09:16:15.917714
3689 / tcp
-831378676 | 2025-03-19T06:35:38.353813
3749 / tcp
830109853 | 2025-03-13T00:18:32.921816
3790 / tcp
-994112338 | 2025-03-22T03:39:51.800026
3791 / tcp
-1849822021 | 2025-03-22T22:29:56.246167
3792 / tcp
1519068439 | 2025-03-09T16:08:56.681891
3838 / tcp
-27061286 | 2025-03-24T06:57:55.233797
3950 / tcp
1629120902 | 2025-03-07T16:31:12.166482
4000 / tcp
-2140753145 | 2025-03-28T06:17:10.264974
4002 / tcp
730516202 | 2025-03-24T08:26:43.246766
4022 / tcp
-1751919344 | 2025-03-26T15:11:48.618648
4040 / tcp
-1400481692 | 2025-03-24T18:53:20.929841
4064 / tcp
0 | 2025-03-27T17:31:47.941157
4072 / tcp
-786757349 | 2025-02-28T23:10:39.644590
4085 / tcp
1231655119 | 2025-03-18T20:44:43.663145
4117 / tcp
1215574276 | 2025-03-06T04:16:17.975038
4120 / tcp
1137374924 | 2025-02-28T23:55:17.347559
4148 / tcp
-16533680 | 2025-03-20T20:11:30.698348
4150 / tcp
1102230255 | 2025-03-17T20:03:02.312170
4159 / tcp
721571937 | 2025-03-13T12:35:01.283580
4172 / tcp
713353579 | 2025-03-21T04:48:59.825765
4200 / tcp
1107534508 | 2025-03-08T17:44:29.250334
4243 / tcp
1603082265 | 2025-03-24T22:28:49.315746
4282 / tcp
189214636 | 2025-03-27T03:58:49.188356
4321 / tcp
424948470 | 2025-03-18T10:25:12.762588
4343 / tcp
1396869296 | 2025-03-27T19:10:58.958815
4369 / tcp
600091538 | 2025-03-16T21:41:44.879215
4400 / tcp
-1731806323 | 2025-03-18T04:45:14.899293
4433 / tcp
640711539 | 2025-03-22T09:58:14.801411
4434 / tcp
-1899296085 | 2025-03-17T05:09:46.456608
4436 / tcp
-1665119009 | 2025-03-25T08:35:15.354465
4438 / tcp
820560215 | 2025-03-11T14:44:18.844592
4440 / tcp
1559464762 | 2025-03-19T00:46:39.139000
4443 / tcp
1778319235 | 2025-03-06T21:33:32.854973
4444 / tcp
418325928 | 2025-03-24T07:46:14.043089
4449 / tcp
1134825367 | 2025-03-18T05:44:11.257257
4457 / tcp
1432455423 | 2025-03-16T13:49:53.978730
4500 / tcp
413265474 | 2025-03-17T19:09:46.344750
4506 / tcp
-946243257 | 2025-03-21T07:13:44.305152
4520 / tcp
304268686 | 2025-03-28T17:08:13.531211
4528 / tcp
-1498509429 | 2025-03-23T14:33:11.629678
4543 / tcp
110238238 | 2025-03-23T02:11:20.483277
4567 / tcp
1351455434 | 2025-03-16T20:05:17.383149
4664 / tcp
1553830439 | 2025-03-15T00:25:54.020519
4782 / tcp
68916321 | 2025-03-27T20:01:29.581389
4786 / tcp
919919958 | 2025-03-23T00:26:04.526411
4808 / tcp
79904068 | 2025-03-24T13:24:26.008869
4848 / tcp
-797827312 | 2025-03-23T19:49:38.191059
4899 / tcp
-837125967 | 2025-03-24T14:50:13.321607
4911 / tcp
1105699109 | 2025-03-21T12:17:54.971134
4949 / tcp
83201078 | 2025-03-25T19:57:12.695488
5000 / tcp
667417599 | 2025-03-20T17:17:02.984068
5001 / tcp
1801806242 | 2025-03-22T07:48:45.634989
5002 / tcp
-1774292220 | 2025-03-22T04:54:42.278017
5004 / tcp
35118586 | 2025-02-28T20:01:01.479748
5005 / tcp
123230664 | 2025-03-27T11:28:20.682370
5007 / tcp
-1676661285 | 2025-03-23T06:58:04.032184
5009 / tcp
1345772178 | 2025-03-23T08:08:52.348367
5010 / tcp
-1623616499 | 2025-03-26T22:32:53.552635
5025 / tcp
1772703101 | 2025-03-13T18:36:18.303350
5060 / udp
-186115660 | 2025-03-13T18:13:41.893128
5083 / tcp
-1553540637 | 2025-03-22T04:50:37.453568
5089 / tcp
997064035 | 2025-02-27T12:18:14.503137
5090 / tcp
1409388144 | 2025-03-16T06:06:35.543543
5093 / tcp
743375547 | 2025-03-21T10:10:20.742891
5100 / tcp
1305268086 | 2025-03-09T07:53:00.302011
5130 / tcp
-650497461 | 2025-03-09T10:03:43.427361
5135 / tcp
356231993 | 2025-03-25T00:14:34.759783
5140 / tcp
2106592479 | 2025-03-21T16:30:47.616661
5150 / tcp
695027435 | 2025-03-09T18:08:58.542124
5180 / tcp
-859970596 | 2025-03-23T03:59:12.712616
5201 / tcp
-1865725876 | 2025-03-26T17:35:33.992300
5209 / tcp
1863618409 | 2025-03-18T02:26:22.905749
5222 / tcp
-1261432376 | 2025-03-09T08:51:22.841218
5225 / tcp
-1400055962 | 2025-03-04T12:39:23.776074
5226 / tcp
1439749646 | 2025-03-13T17:30:43.079011
5230 / tcp
-644321402 | 2025-03-11T02:29:08.443397
5232 / tcp
-330353845 | 2025-03-28T05:39:59.124040
5239 / tcp
-330453176 | 2025-03-13T22:42:22.225545
5241 / tcp
14937962 | 2025-03-25T02:19:02.072146
5242 / tcp
1290386116 | 2025-03-22T14:43:08.274786
5249 / tcp
-495451194 | 2025-03-17T08:56:10.950413
5258 / tcp
1052527195 | 2025-03-23T16:28:44.479271
5267 / tcp
978893141 | 2025-03-21T13:36:45.686297
5269 / tcp
-1261432376 | 2025-03-21T17:28:05.947137
5270 / tcp
-941287276 | 2025-03-28T18:46:01.000560
5273 / tcp
-343635500 | 2025-03-20T19:03:18.175989
5274 / tcp
929239194 | 2025-03-23T14:36:12.881635
5275 / tcp
408255586 | 2025-02-28T14:18:34.618415
5280 / tcp
-729236698 | 2025-03-28T10:18:10.215736
5353 / udp
-746400151 | 2025-03-25T12:42:44.410595
5357 / tcp
1460365484 | 2025-03-12T14:43:27.237990
5432 / tcp
-726790289 | 2025-03-23T20:58:37.159015
5439 / tcp
-315777743 | 2025-03-20T19:03:23.558297
5444 / tcp
1398655871 | 2025-03-16T00:29:40.356457
5454 / tcp
-138058543 | 2025-03-05T12:53:02.386097
5494 / tcp
-1192851601 | 2025-03-21T23:47:46.827670
5552 / tcp
1662904714 | 2025-03-26T13:35:19.907927
5555 / tcp
-1288199298 | 2025-03-28T10:00:40.579703
5560 / tcp
90578699 | 2025-03-24T01:04:28.759452
5567 / tcp
-1535028354 | 2025-03-05T01:18:34.282219
5590 / tcp
297494087 | 2025-03-21T23:46:41.741269
5593 / tcp
-858262614 | 2025-03-21T09:17:27.582873
5597 / tcp
256361108 | 2025-03-27T09:20:25.873977
5598 / tcp
-776713914 | 2025-03-04T16:53:52.925223
5601 / tcp
-1055492207 | 2025-03-04T12:43:09.631576
5607 / tcp
-1846354804 | 2025-03-13T05:23:24.687808
5613 / tcp
-1866237475 | 2025-03-10T04:19:50.454161
5630 / tcp
1009855083 | 2025-03-20T23:17:14.000218
5660 / tcp
-422406414 | 2025-02-27T11:46:52.067402
5678 / tcp
-483756099 | 2025-03-20T12:22:01.815701
5680 / tcp
-116322357 | 2025-03-13T08:43:46.611745
5696 / tcp
258919211 | 2025-03-20T18:18:01.852735
5698 / tcp
-1893171531 | 2025-02-27T13:45:29.835795
5800 / tcp
38306331 | 2025-02-28T06:27:33.024319
5801 / tcp
-1997334516 | 2025-03-25T15:18:43.550551
5858 / tcp
108406471 | 2025-03-25T01:53:54.753165
5900 / tcp
1307740801 | 2025-03-18T22:43:04.373293
5901 / tcp
-1486635742 | 2025-03-21T05:31:29.996338
5908 / tcp
-384450871 | 2025-03-20T12:06:37.710762
5912 / tcp
1517919486 | 2025-03-21T11:13:09.963838
5913 / tcp
-2041171029 | 2025-03-17T16:53:19.866481
5915 / tcp
311428971 | 2025-03-11T06:40:06.181772
5919 / tcp
309612075 | 2025-03-21T22:00:23.923168
5938 / tcp
-1333942476 | 2025-03-25T02:13:15.971527
5984 / tcp
849537682 | 2025-03-21T10:07:21.909694
5985 / tcp
1822982544 | 2025-03-04T11:26:17.628504
5986 / tcp
-1193478661 | 2025-03-21T10:54:07.453455
5991 / tcp
1017274312 | 2025-03-05T00:32:08.845148
5992 / tcp
1036494097 | 2025-03-04T14:59:18.724401
5996 / tcp
1916040213 | 2025-03-26T01:00:00.006073
6000 / tcp
-1112113749 | 2025-03-17T13:56:47.554341
6001 / tcp
795831555 | 2025-03-21T01:30:44.190443
6002 / tcp
1361977108 | 2025-03-22T14:05:07.393522
6005 / tcp
-606688449 | 2025-03-16T13:20:39.494652
6006 / tcp
1447555009 | 2025-03-22T11:30:04.696391
6007 / tcp
-382715798 | 2025-03-11T15:18:48.381694
6009 / tcp
-1209454488 | 2025-03-05T09:05:07.111307
6011 / tcp
-1310053021 | 2025-03-27T07:52:44.687869
6036 / tcp
-148837766 | 2025-03-28T01:36:13.688597
6060 / tcp
-1688627594 | 2025-03-24T19:02:58.967837
6061 / tcp
819144818 | 2025-03-23T15:37:38.673400
6080 / tcp
-163017161 | 2025-03-20T02:59:25.930289
6081 / tcp
954978952 | 2025-03-10T12:08:23.325846
6134 / tcp
-1503582080 | 2025-03-28T05:32:48.400959
6161 / tcp
2138612505 | 2025-03-07T13:39:34.356255
6264 / tcp
-576937343 | 2025-03-05T11:15:28.327735
6331 / tcp
1276616925 | 2025-03-05T15:39:25.113485
6363 / tcp
-418293001 | 2025-03-21T21:28:22.941536
6379 / tcp
632008262 | 2025-03-21T13:21:48.051411
6400 / tcp
-194622863 | 2025-03-27T16:33:26.352132
6433 / tcp
-1517428800 | 2025-03-28T17:46:47.294586
6443 / tcp
1056788202 | 2025-03-22T00:38:33.645761
6464 / tcp
2029246632 | 2025-03-27T05:28:24.746771
6482 / tcp
1998110915 | 2025-03-10T03:32:07.305266
6511 / tcp
1430703300 | 2025-03-05T17:13:52.825214
6512 / tcp
1951439267 | 2025-03-19T03:17:31.825356
6513 / tcp
1272710212 | 2025-03-24T13:04:54.346958
6543 / tcp
-1827520505 | 2025-03-10T12:56:54.770919
6550 / tcp
-2136772848 | 2025-03-22T03:36:41.379150
6556 / tcp
-176623259 | 2025-03-20T21:16:54.280576
6580 / tcp
1398129449 | 2025-03-15T21:23:02.481184
6588 / tcp
1366809115 | 2025-03-18T03:14:07.546078
6590 / tcp
-1226713628 | 2025-03-27T21:14:13.961723
6603 / tcp
549452304 | 2025-03-05T22:13:53.535929
6605 / tcp
-636557428 | 2025-03-10T04:34:07.244808
6622 / tcp
222406815 | 2025-03-22T15:32:04.326600
6650 / tcp
-984478581 | 2025-03-10T21:59:18.038494
6653 / tcp
-1683387969 | 2025-03-26T10:55:07.607635
6661 / tcp
-1113691650 | 2025-03-14T09:38:55.673918
6664 / tcp
-1497460235 | 2025-02-27T23:20:25.333770
6666 / tcp
471426902 | 2025-03-12T17:19:25.765407
6667 / tcp
-1493276255 | 2025-03-10T15:20:43.759257
6668 / tcp
-1498789254 | 2025-03-11T20:25:14.338192
6688 / tcp
1798769193 | 2025-03-11T09:36:16.362572
6697 / tcp
0 | 2025-03-15T16:58:14.516947
6699 / tcp
-1598035861 | 2025-03-29T02:20:41.286901
7002 / tcp
1269303587 | 2025-03-24T12:32:16.212861
7004 / tcp
1357218471 | 2025-03-04T11:53:06.290262
7005 / tcp
-639086806 | 2025-03-06T09:15:03.838527
7011 / tcp
1224240523 | 2025-03-25T01:23:48.335211
7014 / tcp
-1717548135 | 2025-03-16T01:30:47.245477
7020 / tcp
-604386899 | 2025-03-17T06:07:02.954039
7078 / tcp
1350314440 | 2025-03-10T10:05:04.462076
7081 / tcp
-1894634778 | 2025-03-09T08:40:09.592375
7083 / tcp
-1672372451 | 2025-03-07T12:01:27.888345
7085 / tcp
2024734926 | 2025-03-03T17:36:49.197504
7087 / tcp
9560700 | 2025-03-11T13:07:43.124495
7172 / tcp
847321322 | 2025-03-22T12:21:30.762694
7173 / tcp
-782296182 | 2025-03-27T14:11:24.301758
7218 / tcp
82176505 | 2025-03-23T13:49:43.585533
7302 / tcp
363474926 | 2025-03-15T02:36:04.865523
7331 / tcp
1891361295 | 2025-03-19T15:41:17.652324
7348 / tcp
434719665 | 2025-03-22T21:32:47.883290
7415 / tcp
-2067028711 | 2025-03-23T10:57:00.072324
7434 / tcp
500829537 | 2025-03-28T22:45:45.663962
7443 / tcp
616285082 | 2025-03-24T09:26:59.081636
7474 / tcp
-1519003981 | 2025-03-29T05:52:38.071109
7493 / tcp
-1652132363 | 2025-03-21T00:37:13.173863
7500 / tcp
-428150977 | 2025-03-23T04:07:18.997409
7547 / tcp
-1429484934 | 2025-03-24T07:31:32.898753
7548 / tcp
2067976826 | 2025-03-26T04:44:34.388744
7657 / tcp
-2042756958 | 2025-03-22T12:53:44.790265
7687 / tcp
-112476200 | 2025-03-16T02:14:47.480148
7700 / tcp
871627921 | 2025-03-12T03:03:24.707669
7777 / tcp
-1814171482 | 2025-03-27T13:53:04.319079
7779 / tcp
-1874513855 | 2025-03-28T18:22:45.282873
7780 / tcp
794155065 | 2025-03-05T09:10:09.581474
7980 / tcp
460329661 | 2025-03-06T18:25:13.490233
8000 / tcp
172023516 | 2025-03-16T06:02:45.924595
8001 / tcp
-624567549 | 2025-03-23T15:27:10.777762
8002 / tcp
2046581233 | 2025-03-10T11:33:17.005130
8003 / tcp
-653814015 | 2025-02-28T01:43:51.620590
8004 / tcp
1915944361 | 2025-03-12T02:00:04.338080
8008 / tcp
1500070380 | 2025-03-28T20:41:01.672070
8009 / tcp
433937113 | 2025-03-06T03:57:51.557829
8010 / tcp
1681401159 | 2025-03-18T04:45:55.727283
8022 / tcp
-1507628762 | 2025-03-20T15:43:17.992069
8025 / tcp
-437752524 | 2025-03-28T15:10:30.682940
8028 / tcp
-268631402 | 2025-03-25T12:01:02.238344
8043 / tcp
-91550723 | 2025-02-28T00:03:53.440771
8046 / tcp
448963099 | 2025-03-19T22:09:25.925498
8048 / tcp
1532055670 | 2025-03-17T10:19:40.435118
8049 / tcp
-1356905304 | 2025-03-24T15:08:02.775528
8051 / tcp
-306397016 | 2025-03-19T15:19:29.492600
8052 / tcp
1360482947 | 2025-03-13T20:24:09.401117
8058 / tcp
-1488046572 | 2025-03-20T07:14:23.351508
8059 / tcp
-470587147 | 2025-03-12T09:14:08.533556
8060 / tcp
1342822189 | 2025-03-22T17:10:15.249108
8062 / tcp
-1475458026 | 2025-03-20T09:38:39.686822
8063 / tcp
-2144606035 | 2025-03-20T04:27:58.241291
8066 / tcp
434832719 | 2025-03-18T23:48:11.395859
8069 / tcp
229634705 | 2025-03-20T04:45:34.440082
8072 / tcp
-947947986 | 2025-03-27T13:29:33.305323
8074 / tcp
1920662049 | 2025-03-25T13:00:55.601314
8075 / tcp
419541756 | 2025-03-20T00:51:47.064042
8077 / tcp
225528803 | 2025-03-14T18:41:00.159945
8080 / tcp
156526053 | 2025-03-15T10:05:22.082122
8081 / tcp
-1162001425 | 2025-03-27T03:51:09.449298
8083 / tcp
2024336909 | 2025-03-24T00:06:42.220520
8085 / tcp
358619101 | 2025-03-25T00:00:31.210151
8086 / tcp
-88579017 | 2025-03-24T09:06:22.269914
8087 / tcp
-1960720880 | 2025-03-24T07:13:16.363210
8089 / tcp
866583999 | 2025-03-11T03:12:22.180178
8090 / tcp
792249196 | 2025-03-08T11:40:20.586514
8091 / tcp
1975776852 | 2025-03-18T18:55:44.676991
8093 / tcp
1030145256 | 2025-03-16T18:26:29.590353
8097 / tcp
1632426474 | 2025-03-10T02:24:03.892036
8098 / tcp
-1077481482 | 2025-03-28T11:28:33.155697
8099 / tcp
649755902 | 2025-03-14T22:56:02.872560
8100 / tcp
-1953826525 | 2025-03-24T20:25:44.921460
8106 / tcp
1652843680 | 2025-03-16T00:30:29.815984
8108 / tcp
-1045421486 | 2025-03-28T08:54:46.845444
8112 / tcp
1069317828 | 2025-03-20T23:25:05.550063
8114 / tcp
-348461787 | 2025-03-24T08:53:40.042315
8117 / tcp
1519012489 | 2025-03-27T19:02:22.194248
8118 / tcp
-1268499642 | 2025-03-16T17:24:30.615022
8121 / tcp
-1938037474 | 2025-03-24T20:31:04.894817
8123 / tcp
1411037058 | 2025-03-25T14:51:56.329825
8124 / tcp
-162343985 | 2025-03-19T22:44:00.530628
8125 / tcp
-1990242560 | 2025-03-19T10:27:32.606606
8129 / tcp
1700624219 | 2025-03-20T17:28:41.945945
8130 / tcp
694306072 | 2025-03-25T15:54:18.898580
8134 / tcp
-775144090 | 2025-03-16T00:19:37.374968
8135 / tcp
1242700546 | 2025-03-21T14:48:54.500638
8136 / tcp
-1612229801 | 2025-03-19T17:23:39.992132
8138 / tcp
-1093392144 | 2025-03-15T00:45:52.553839
8139 / tcp
-1857822724 | 2025-03-23T15:54:11.209917
8140 / tcp
1461701936 | 2025-03-29T05:30:04.446943
8141 / tcp
-1171613267 | 2025-03-29T04:09:47.635889
8142 / tcp
-894688814 | 2025-03-25T19:13:07.514161
8148 / tcp
-1249121265 | 2025-03-19T19:27:21.555385
8150 / tcp
-1306370551 | 2025-03-14T06:40:35.252814
8151 / tcp
-1288078241 | 2025-03-08T17:40:56.657141
8153 / tcp
-1190781543 | 2025-03-04T10:10:53.051389
8156 / tcp
-681581537 | 2025-03-29T04:49:27.218035
8157 / tcp
-1034015987 | 2025-03-22T00:57:59.482343
8160 / tcp
1567711791 | 2025-03-09T09:49:40.283506
8168 / tcp
-718069495 | 2025-03-14T06:55:22.949289
8170 / tcp
2111125071 | 2025-03-16T18:40:58.720499
8172 / tcp
-293690546 | 2025-03-29T02:50:43.766523
8173 / tcp
-984932410 | 2025-03-22T03:08:36.044481
8174 / tcp
1081441699 | 2025-03-10T23:08:16.133197
8175 / tcp
-146634487 | 2025-03-05T04:03:04.045069
8181 / tcp
-1054024592 | 2025-03-19T03:41:40.014866
8185 / tcp
-442026537 | 2025-03-11T16:17:45.895515
8188 / tcp
774028219 | 2025-03-23T14:31:33.141022
8191 / tcp
-1814278421 | 2025-03-13T07:08:26.146975
8192 / tcp
6896501 | 2025-03-24T19:34:24.929793
8193 / tcp
-1639810992 | 2025-03-27T23:56:18.000030
8194 / tcp
1334372029 | 2025-03-26T15:55:06.323862
8195 / tcp
1304863636 | 2025-03-11T18:55:10.825766
8198 / tcp
267115815 | 2025-03-13T00:38:07.183847
8200 / tcp
-1504798904 | 2025-03-22T22:01:48.296080
8237 / tcp
-1362681898 | 2025-02-27T15:56:29.993025
8250 / tcp
-1182348609 | 2025-03-06T21:06:50.686824
8280 / tcp
-322723318 | 2025-03-14T03:37:08.201980
8285 / tcp
-1888543946 | 2025-03-16T01:26:22.235965
8291 / tcp
1783510313 | 2025-03-10T00:32:45.176243
8333 / tcp
1453951338 | 2025-03-19T21:27:02.495346
8334 / tcp
613044813 | 2025-03-11T09:20:43.446510
8385 / tcp
793105673 | 2025-03-15T05:39:26.279865
8401 / tcp
422769595 | 2025-03-23T05:56:07.912080
8403 / tcp
-16711602 | 2025-03-23T01:14:53.074649
8404 / tcp
1749926600 | 2025-03-05T00:05:49.504860
8409 / tcp
-884361024 | 2025-03-05T04:25:40.465542
8411 / tcp
-613285735 | 2025-03-18T14:26:11.311101
8412 / tcp
-1844085353 | 2025-03-25T03:56:37.390536
8414 / tcp
-1421175203 | 2025-03-09T08:05:33.254459
8415 / tcp
1328470152 | 2025-03-13T02:14:14.821242
8422 / tcp
347200824 | 2025-03-24T01:11:59.419967
8424 / tcp
-1415993018 | 2025-02-28T15:23:35.387322
8431 / tcp
-62448911 | 2025-03-13T03:24:05.152739
8432 / tcp
-1386452485 | 2025-03-24T17:11:54.664868
8441 / tcp
-408932321 | 2025-03-17T07:24:03.658114
8443 / tcp
-1858417401 | 2025-03-26T04:04:11.346693
8444 / tcp
1510043586 | 2025-03-25T07:39:08.071278
8447 / tcp
642971415 | 2025-02-28T12:35:36.667636
8457 / tcp
-856534874 | 2025-03-17T21:13:49.558021
8461 / tcp
802954734 | 2025-03-18T19:32:51.279626
8464 / tcp
2081652894 | 2025-03-18T01:44:15.377669
8467 / tcp
1010155274 | 2025-03-17T08:13:07.948452
8470 / tcp
-586460714 | 2025-03-05T03:08:56.393415
8473 / tcp
-1190243979 | 2025-03-24T12:08:41.969051
8500 / tcp
53040462 | 2025-03-15T21:33:58.201332
8501 / tcp
1138223619 | 2025-03-12T15:05:32.542953
8502 / tcp
2132296684 | 2025-03-08T11:39:04.654145
8506 / tcp
-1917747824 | 2025-03-16T12:55:00.336697
8514 / tcp
-721238947 | 2025-03-13T21:06:52.495377
8515 / tcp
1240336876 | 2025-03-15T20:10:17.800038
8524 / tcp
350010544 | 2025-03-04T00:53:52.771430
8532 / tcp
1170937257 | 2025-03-25T00:47:14.523324
8533 / tcp
1535097458 | 2025-03-09T07:03:34.766759
8545 / tcp
917988175 | 2025-03-27T14:04:09.525607
8554 / tcp
-1388457461 | 2025-03-26T15:05:11.779582
8561 / tcp
1125631147 | 2025-02-28T08:03:06.245744
8562 / tcp
-1712076154 | 2025-03-27T13:51:37.149283
8567 / tcp
-1003943928 | 2025-03-10T16:28:42.020889
8568 / tcp
1200216135 | 2025-03-29T01:20:13.676935
8575 / tcp
917988175 | 2025-03-25T01:33:41.939051
8578 / tcp
-1380260351 | 2025-03-12T07:51:35.375884
8594 / tcp
949504353 | 2025-03-10T05:00:48.156511
8597 / tcp
-2074038067 | 2025-03-21T02:00:34.962860
8599 / tcp
787566345 | 2025-03-18T09:12:50.817914
8600 / tcp
1764615378 | 2025-03-06T04:50:36.476799
8601 / tcp
922190990 | 2025-03-23T05:40:09.105960
8605 / tcp
441023282 | 2025-03-22T00:13:57.425378
8606 / tcp
-2033334618 | 2025-03-14T20:19:15.019393
8621 / tcp
1755321449 | 2025-03-27T19:49:01.272402
8622 / tcp
-54354338 | 2025-03-13T20:11:22.380072
8623 / tcp
1486439115 | 2025-03-16T21:32:54.840850
8640 / tcp
-326367733 | 2025-03-27T04:43:09.558209
8641 / tcp
574418274 | 2025-03-10T23:51:59.271262
8649 / tcp
359812755 | 2025-03-26T14:27:33.660481
8706 / tcp
121761415 | 2025-03-12T18:57:23.025207
8707 / tcp
-794438332 | 2025-03-20T09:24:34.959103
8723 / tcp
2119078198 | 2025-03-11T03:28:27.847656
8724 / tcp
-876618723 | 2025-03-24T14:20:42.860786
8731 / tcp
1564776800 | 2025-02-28T03:16:36.918668
8733 / tcp
-380698983 | 2025-03-29T05:54:36.101477
8764 / tcp
2134228793 | 2025-03-11T13:44:43.071196
8766 / tcp
-1939292113 | 2025-03-25T07:21:12.774931
8779 / tcp
-817875301 | 2025-03-22T05:55:03.049599
8789 / tcp
-413610528 | 2025-03-22T14:42:00.516760
8790 / tcp
-791029048 | 2025-03-19T23:01:27.754541
8800 / tcp
-878358059 | 2025-03-25T20:59:13.914221
8802 / tcp
-50345509 | 2025-03-22T11:04:13.598472
8803 / tcp
-626806853 | 2025-03-13T18:11:23.898131
8805 / tcp
1941458396 | 2025-03-17T01:35:02.124671
8807 / tcp
1500964494 | 2025-03-21T16:04:14.383652
8811 / tcp
308137808 | 2025-03-14T21:53:40.211472
8820 / tcp
-215308573 | 2025-03-17T19:40:30.927734
8824 / tcp
-1184402840 | 2025-02-27T11:48:57.292509
8825 / tcp
-2074533722 | 2025-03-25T19:40:41.698013
8827 / tcp
-1459712213 | 2025-03-20T01:30:18.162657
8828 / tcp
1948903472 | 2025-03-21T15:04:32.286896
8829 / tcp
1661395136 | 2025-03-25T18:57:31.709217
8832 / tcp
-684268627 | 2025-03-24T12:11:25.733893
8834 / tcp
-685542953 | 2025-03-25T05:41:20.075346
8838 / tcp
-1568247332 | 2025-03-03T23:50:43.045044
8852 / tcp
1999318251 | 2025-03-26T18:08:24.036984
8855 / tcp
-1864956131 | 2025-03-23T20:26:04.790279
8856 / tcp
-1973997125 | 2025-03-06T12:03:50.246424
8860 / tcp
1214276845 | 2025-03-25T13:42:13.820592
8862 / tcp
2095024442 | 2025-03-22T17:44:17.590924
8866 / tcp
-1338119605 | 2025-03-11T07:20:49.109272
8871 / tcp
-1489145945 | 2025-03-25T16:22:04.948529
8872 / tcp
1959878292 | 2025-03-26T00:00:51.084871
8878 / tcp
-917821729 | 2025-03-18T00:21:09.769672
8880 / tcp
-1667846896 | 2025-03-10T13:41:32.061129
8887 / tcp
757315274 | 2025-03-16T05:09:34.531501
8888 / tcp
1927746273 | 2025-03-11T08:45:15.594031
8889 / tcp
-304884439 | 2025-03-29T00:42:27.191212
8899 / tcp
825013874 | 2025-03-15T15:28:45.669433
8901 / tcp
1849110091 | 2025-03-08T19:59:30.821002
8902 / tcp
-294039634 | 2025-02-28T02:41:53.434116
8910 / tcp
-655508427 | 2025-03-24T03:07:01.029972
8911 / tcp
1017294979 | 2025-03-08T13:40:49.177514
8916 / tcp
1296478200 | 2025-03-17T06:56:04.107292
8935 / tcp
1003972182 | 2025-03-09T13:15:20.354192
8969 / tcp
-77639684 | 2025-03-28T12:18:25.103740
8980 / tcp
-1268567987 | 2025-03-15T23:37:50.677976
8990 / tcp
1412741949 | 2025-03-09T06:34:30.724380
8991 / tcp
-346076294 | 2025-03-11T07:55:32.225068
8999 / tcp
-1418608191 | 2025-02-27T18:41:31.945413
9000 / tcp
-1956183101 | 2025-03-24T17:47:28.115894
9001 / tcp
-606520387 | 2025-02-28T08:09:28.134361
9002 / tcp
1317668251 | 2025-03-18T23:20:40.969650
9004 / tcp
-1406788170 | 2025-03-04T17:10:05.425408
9009 / tcp
-1901728513 | 2025-03-06T18:05:04.971341
9010 / tcp
676527580 | 2025-03-21T06:12:35.945772
9014 / tcp
-1136372617 | 2025-03-19T20:38:33.235199
9019 / tcp
-981139618 | 2025-02-28T06:54:09.184567
9027 / tcp
1136849793 | 2025-03-15T09:06:51.077860
9031 / tcp
1124973091 | 2025-03-18T12:51:31.227434
9032 / tcp
839603029 | 2025-03-28T19:30:45.012748
9036 / tcp
-690045442 | 2025-03-18T21:20:51.915046
9037 / tcp
1044289684 | 2025-02-28T05:07:00.163848
9039 / tcp
1027842343 | 2025-03-15T11:26:57.794409
9040 / tcp
-218424977 | 2025-03-16T17:47:46.110180
9042 / tcp
259745872 | 2025-03-24T03:39:38.460111
9048 / tcp
-896747119 | 2025-03-08T14:38:32.967125
9050 / tcp
-1807006604 | 2025-03-17T12:32:22.528512
9051 / tcp
-1428716113 | 2025-03-28T14:39:57.472961
9053 / tcp
-1518085420 | 2025-03-24T02:22:28.260295
9055 / tcp
-1892993434 | 2025-03-09T06:47:45.490711
9061 / tcp
-262103298 | 2025-03-13T19:30:55.412254
9064 / tcp
1622668445 | 2025-03-22T15:43:08.443816
9065 / tcp
-2067320955 | 2025-03-17T09:47:13.200508
9066 / tcp
-877956376 | 2025-03-04T05:26:54.559777
9068 / tcp
43538511 | 2025-03-27T21:50:29.389823
9069 / tcp
-1942381117 | 2025-03-09T08:12:01.100168
9072 / tcp
1275878726 | 2025-03-15T01:16:16.206265
9075 / tcp
-1801222437 | 2025-03-12T18:28:17.138243
9076 / tcp
-1965958314 | 2025-03-26T14:47:31.874957
9080 / tcp
1228112179 | 2025-03-23T06:32:28.174324
9081 / tcp
-1349074881 | 2025-02-27T07:39:21.704664
9083 / tcp
1032712450 | 2025-03-23T07:04:32.909383
9084 / tcp
1020480111 | 2025-03-16T15:39:30.560418
9090 / tcp
-1984868122 | 2025-03-22T11:02:51.422041
9091 / tcp
-1309754065 | 2025-03-21T13:05:12.366152
9093 / tcp
-844975450 | 2025-03-18T06:39:05.347857
9095 / tcp
-894657912 | 2025-03-25T03:48:02.296546
9096 / tcp
-2083196760 | 2025-03-05T04:00:21.325388
9100 / tcp
713892599 | 2025-03-22T06:31:01.359212
9110 / tcp
-2054532268 | 2025-03-17T07:48:57.397383
9116 / tcp
-1958175582 | 2025-03-19T03:36:59.460441
9118 / tcp
-1894401928 | 2025-03-12T01:24:39.074105
9121 / tcp
390220761 | 2025-03-24T15:55:51.418495
9129 / tcp
-1669516620 | 2025-03-27T10:43:53.554007
9131 / tcp
784514791 | 2025-03-25T18:53:54.345107
9138 / tcp
-47832520 | 2025-03-22T10:18:13.453077
9143 / tcp
-2114228402 | 2025-03-25T17:31:21.740084
9146 / tcp
-1352630285 | 2025-03-10T22:33:35.084731
9147 / tcp
1473134610 | 2025-03-25T14:55:43.778443
9149 / tcp
351759680 | 2025-03-16T06:24:51.379225
9150 / tcp
1451590420 | 2025-03-13T23:50:42.003840
9151 / tcp
-1428716113 | 2025-03-09T12:35:26.912490
9159 / tcp
-1386299445 | 2025-03-09T05:16:09.402635
9160 / tcp
-1869851759 | 2025-03-18T14:01:17.462968
9161 / tcp
-515749004 | 2025-03-14T18:26:08.659862
9162 / tcp
401903948 | 2025-03-27T15:29:40.211791
9163 / tcp
356773916 | 2025-03-23T23:48:08.932750
9166 / tcp
1513356408 | 2025-03-14T01:06:16.355390
9168 / tcp
898824802 | 2025-03-14T00:44:02.755241
9180 / tcp
1793602478 | 2025-03-25T04:58:18.146100
9182 / tcp
255813952 | 2025-03-11T03:47:46.486083
9188 / tcp
357318546 | 2025-03-23T07:44:59.197012
9191 / tcp
1267397564 | 2025-03-23T06:58:20.396829
9192 / tcp
249953135 | 2025-03-23T22:52:02.493715
9200 / tcp
1533649798 | 2025-03-04T00:28:46.721088
9202 / tcp
2097382246 | 2025-03-28T04:50:58.432918
9204 / tcp
-1313285932 | 2025-03-27T03:33:16.300764
9205 / tcp
1556275245 | 2025-03-24T22:47:27.079734
9212 / tcp
-103506280 | 2025-03-18T17:55:20.543075
9213 / tcp
53984824 | 2025-03-19T05:16:54.284227
9215 / tcp
-787519143 | 2025-03-10T01:04:39.481466
9218 / tcp
179887496 | 2025-03-27T10:48:27.579681
9219 / tcp
578287316 | 2025-03-25T17:02:36.218558
9220 / tcp
1278808495 | 2025-03-04T10:07:20.626957
9221 / tcp
755491703 | 2025-03-15T06:53:58.190378
9222 / tcp
1100703167 | 2025-03-12T21:05:53.725444
9223 / tcp
-944112986 | 2025-03-11T16:40:54.781591
9236 / tcp
1860992422 | 2025-03-14T19:11:07.125537
9242 / tcp
1249745515 | 2025-03-16T18:32:42.470689
9244 / tcp
-951376996 | 2025-03-12T14:17:41.534383
9246 / tcp
1037806511 | 2025-03-08T12:26:51.675116
9247 / tcp
939430035 | 2025-03-22T16:50:38.274986
9249 / tcp
1696336305 | 2025-02-28T01:31:30.671888
9250 / tcp
2073600220 | 2025-03-25T15:59:22.822996
9256 / tcp
-814737859 | 2025-03-20T15:35:46.044711
9280 / tcp
-330685466 | 2025-03-18T03:53:23.865183
9283 / tcp
624778410 | 2025-03-27T12:22:01.722705
9295 / tcp
-2021162387 | 2025-03-24T04:38:53.395391
9306 / tcp
-1902909064 | 2025-03-26T16:25:19.261070
9313 / tcp
591545930 | 2025-03-13T18:00:00.101578
9315 / tcp
-39411568 | 2025-03-22T10:02:18.221259
9333 / tcp
-984559533 | 2025-03-25T05:18:11.825230
9383 / tcp
-601469515 | 2025-03-24T01:02:50.762890
9398 / tcp
1873220743 | 2025-03-14T11:32:06.002587
9399 / tcp
1778575802 | 2025-03-21T09:00:05.687768
9410 / tcp
-1012753697 | 2025-03-12T00:09:02.412728
9418 / tcp
-804204557 | 2025-03-20T23:57:40.373205
9443 / tcp
-389615831 | 2025-02-28T06:44:13.636313
9446 / tcp
-505176388 | 2025-03-08T17:35:13.794532
9454 / tcp
1660550318 | 2025-02-27T09:16:44.010293
9455 / tcp
-1308450522 | 2025-03-28T15:36:55.403669
9465 / tcp
1061681629 | 2025-03-10T10:41:39.641259
9501 / tcp
-1129823799 | 2025-03-17T10:54:10.736812
9505 / tcp
192543191 | 2025-03-09T11:46:46.907332
9515 / tcp
1598514826 | 2025-03-27T20:37:38.114226
9527 / tcp
-210722974 | 2025-03-09T13:49:09.569640
9529 / tcp
1679354853 | 2025-03-14T09:00:50.574720
9530 / tcp
-1407972242 | 2025-03-17T15:50:05.751423
9550 / tcp
-776128252 | 2025-03-24T18:22:10.870236
9595 / tcp
1980892292 | 2025-03-24T09:25:56.417032
9600 / tcp
-351127952 | 2025-03-28T18:42:57.449505
9606 / tcp
-2084305594 | 2025-03-22T10:54:32.422639
9704 / tcp
917804151 | 2025-03-09T07:42:53.066925
9711 / tcp
-753027469 | 2025-03-27T14:36:58.905436
9743 / tcp
608711705 | 2025-02-28T15:30:29.921288
9758 / tcp
-603438207 | 2025-03-11T23:35:10.635784
9761 / tcp
-372276552 | 2025-03-19T12:48:36.927155
9765 / tcp
-2111463655 | 2025-03-07T07:41:49.778409
9779 / tcp
-240634122 | 2025-03-26T17:02:55.582233
9800 / tcp
1633786392 | 2025-03-15T22:52:49.642587
9869 / tcp
1918223791 | 2025-03-09T10:56:06.183677
9888 / tcp
1033726781 | 2025-03-17T20:30:04.938352
9898 / tcp
-475678642 | 2025-03-18T00:30:26.859335
9901 / tcp
-1116128940 | 2025-03-16T01:21:35.547934
9909 / tcp
1726689380 | 2025-03-15T17:24:14.501093
9923 / tcp
1465452197 | 2025-03-14T13:01:27.515676
9926 / tcp
662959376 | 2025-03-22T03:56:12.713707
9943 / tcp
-1678755472 | 2025-03-12T09:58:20.037200
9944 / tcp
1609335984 | 2025-03-28T00:56:51.799624
9955 / tcp
-1350418171 | 2025-03-14T14:56:21.133478
9981 / tcp
-115759902 | 2025-03-24T13:22:50.920295
9992 / tcp
-281519754 | 2025-03-29T03:32:02.487295
9993 / tcp
1574237954 | 2025-03-29T01:12:19.340346
9994 / tcp
393047205 | 2025-03-11T03:06:00.359581
9998 / tcp
393153067 | 2025-03-06T09:46:28.621969
9999 / tcp
-189320789 | 2025-03-26T15:06:10.914947
10000 / tcp
-1513407371 | 2025-03-27T16:03:24.590162
10001 / tcp
746042468 | 2025-03-28T07:52:27.386127
10003 / tcp
-61188993 | 2025-03-28T09:30:45.443247
10006 / tcp
-1240140587 | 2025-03-25T08:40:12.818436
10007 / tcp
-208941638 | 2025-03-05T21:20:10.938097
10008 / tcp
127809157 | 2025-03-16T15:50:36.668959
10010 / tcp
-1751698992 | 2025-03-19T17:11:14.398212
10012 / tcp
-969309801 | 2025-03-24T08:51:15.098410
10016 / tcp
-1493903221 | 2025-03-25T18:37:46.110069
10019 / tcp
886305129 | 2025-03-28T21:25:20.536151
10023 / tcp
2107907942 | 2025-03-11T08:39:47.438245
10029 / tcp
-1860034929 | 2025-03-06T13:15:14.073825
10033 / tcp
2067090234 | 2025-03-28T09:58:10.883273
10034 / tcp
997197254 | 2025-03-26T12:32:24.746758
10038 / tcp
485356731 | 2025-03-17T03:59:53.898718
10041 / tcp
-1401793530 | 2025-03-09T04:40:50.445019
10043 / tcp
2047624129 | 2025-03-21T22:52:11.774992
10045 / tcp
-200358189 | 2025-03-09T17:11:10.549639
10046 / tcp
-1298823679 | 2025-03-28T15:54:18.259910
10050 / tcp
-1171933797 | 2025-03-23T00:54:56.427628
10052 / tcp
-1481480539 | 2025-02-27T10:38:40.954667
10066 / tcp
1728704563 | 2025-03-15T19:36:10.709781
10075 / tcp
1195075122 | 2025-03-25T09:21:14.406370
10081 / tcp
964401350 | 2025-03-28T00:20:32.013385
10084 / tcp
719544295 | 2025-03-08T13:10:14.930857
10089 / tcp
679522300 | 2025-03-15T13:38:13.647757
10090 / tcp
197061051 | 2025-03-03T18:47:36.888175
10100 / tcp
777123835 | 2025-03-16T07:27:48.013025
10101 / tcp
-1654189003 | 2025-03-09T04:21:13.581058
10134 / tcp
-2067028711 | 2025-03-27T05:04:29.251459
10181 / tcp
-1102848841 | 2025-03-26T00:38:45.447728
10201 / tcp
-1245900797 | 2025-03-18T15:35:12.276621
10240 / tcp
-1337138646 | 2025-03-03T20:32:00.694848
10243 / tcp
-1887452088 | 2025-03-19T17:24:04.753389
10256 / tcp
553135289 | 2025-03-16T13:02:05.630453
10302 / tcp
960483653 | 2025-03-27T12:57:40.094124
10397 / tcp
982725874 | 2025-03-04T19:58:06.231409
10443 / tcp
1255728379 | 2025-03-09T09:42:26.383510
10533 / tcp
-1374377877 | 2025-03-19T10:58:31.720243
10909 / tcp
998881160 | 2025-03-14T12:19:44.595810
10911 / tcp
0 | 2025-03-15T18:40:54.281723
10935 / tcp
543540916 | 2025-03-04T01:05:17.456317
11002 / tcp
1022430663 | 2025-03-21T20:31:26.478022
11007 / tcp
1349519679 | 2025-03-28T14:39:54.657270
11082 / tcp
-1108830217 | 2025-03-07T01:28:13.862039
11111 / tcp
-1080523411 | 2025-03-26T15:44:32.842133
11112 / tcp
-1729643016 | 2025-03-28T03:07:17.499623
11210 / tcp
570967354 | 2025-03-21T04:13:48.542147
11288 / tcp
662104089 | 2025-03-28T10:07:11.581760
11300 / tcp
-1318193446 | 2025-03-18T19:04:12.361486
11371 / tcp
-1678148311 | 2025-03-24T19:22:02.406811
11434 / tcp
-1437865722 | 2025-03-22T20:21:50.909204
11443 / tcp
-235255409 | 2025-03-11T10:31:15.463648
12000 / tcp
-266362140 | 2025-03-17T19:18:10.303622
12105 / tcp
-238620067 | 2025-03-23T08:04:45.723888
12107 / tcp
-52984358 | 2025-03-16T18:28:29.181065
12109 / tcp
1283200218 | 2025-02-28T12:22:13.157430
12110 / tcp
-1779032206 | 2025-03-13T13:04:18.494388
12111 / tcp
-1659897703 | 2025-03-17T09:30:26.549983
12113 / tcp
-2040775258 | 2025-03-15T01:11:50.025686
12114 / tcp
-498374572 | 2025-03-20T19:48:43.972513
12119 / tcp
604627054 | 2025-03-12T01:30:51.868125
12120 / tcp
1728082752 | 2025-03-19T22:08:09.882771
12122 / tcp
-1055389831 | 2025-02-28T23:42:16.076644
12124 / tcp
2057547381 | 2025-03-18T15:39:16.251723
12139 / tcp
-1546263052 | 2025-03-05T20:31:36.543378
12148 / tcp
1223712884 | 2025-03-20T12:42:46.340421
12156 / tcp
-1698506956 | 2025-03-24T14:20:02.532127
12163 / tcp
1906018996 | 2025-03-21T05:05:33.480127
12164 / tcp
-338684090 | 2025-03-17T05:14:38.283335
12166 / tcp
-1117432285 | 2025-03-27T15:10:16.356991
12167 / tcp
-1961302216 | 2025-02-27T13:18:45.057464
12179 / tcp
-1396073346 | 2025-03-28T07:09:03.974996
12183 / tcp
-1514452173 | 2025-03-22T10:28:32.874165
12193 / tcp
-480370111 | 2025-03-12T08:45:59.408651
12196 / tcp
1715601225 | 2025-03-19T03:16:52.682636
12200 / tcp
-1454213485 | 2025-03-21T04:12:08.311797
12204 / tcp
30147984 | 2025-03-16T23:32:23.963204
12205 / tcp
-394006864 | 2025-03-18T20:16:28.420784
12215 / tcp
712562591 | 2025-03-23T14:12:06.488378
12219 / tcp
1826354565 | 2025-03-19T13:38:59.312420
12221 / tcp
-811493788 | 2025-03-18T02:56:13.083653
12222 / tcp
469113024 | 2025-03-27T07:56:36.009969
12227 / tcp
1711406975 | 2025-03-15T00:55:13.645969
12230 / tcp
566437698 | 2025-03-28T19:20:52.754315
12231 / tcp
1527559716 | 2025-03-25T07:05:49.392372
12235 / tcp
-597377279 | 2025-03-08T13:09:28.515591
12238 / tcp
-1191590265 | 2025-03-23T13:59:12.680154
12241 / tcp
-1941515816 | 2025-03-25T02:24:15.379633
12242 / tcp
894844790 | 2025-03-23T18:21:32.104033
12248 / tcp
1867362382 | 2025-03-06T07:09:59.868127
12250 / tcp
-794109262 | 2025-03-22T01:31:49.225687
12256 / tcp
2023336209 | 2025-03-25T23:14:09.520720
12259 / tcp
1220008269 | 2025-03-17T14:19:36.400322
12261 / tcp
1256132517 | 2025-03-12T13:54:01.967423
12263 / tcp
1149191499 | 2025-03-11T09:56:40.283137
12266 / tcp
1316133974 | 2025-03-21T16:43:46.511763
12268 / tcp
2109871865 | 2025-03-05T07:54:56.926508
12271 / tcp
558919630 | 2025-03-24T23:01:05.846320
12273 / tcp
-83626457 | 2025-03-28T17:02:37.742976
12276 / tcp
-35026634 | 2025-03-26T04:49:40.304057
12277 / tcp
1345730777 | 2025-03-11T22:26:22.541657
12284 / tcp
-1000537631 | 2025-03-22T12:48:13.553574
12286 / tcp
-1947273231 | 2025-03-20T14:07:35.586495
12289 / tcp
1531475406 | 2025-03-23T05:31:35.397626
12294 / tcp
-1452748859 | 2025-03-16T16:39:15.748306
12295 / tcp
-406143172 | 2025-03-18T05:22:00.547904
12307 / tcp
-1689502726 | 2025-03-07T05:41:16.725465
12313 / tcp
1401560288 | 2025-03-20T06:04:49.394400
12315 / tcp
1949291889 | 2025-03-17T08:28:15.020099
12317 / tcp
615337087 | 2025-03-08T16:13:41.076457
12318 / tcp
-1456018631 | 2025-03-28T07:21:34.189034
12321 / tcp
1494085383 | 2025-03-18T04:36:53.573873
12326 / tcp
-537771950 | 2025-03-13T06:25:30.673963
12329 / tcp
-1662390937 | 2025-03-23T02:04:13.049400
12330 / tcp
-1391761399 | 2025-03-28T11:30:48.096820
12332 / tcp
-384322818 | 2025-03-10T03:55:02.429771
12334 / tcp
455287332 | 2025-03-08T19:27:23.000796
12337 / tcp
1185237823 | 2025-03-01T00:09:01.455955
12344 / tcp
1840075881 | 2025-03-13T10:21:05.620960
12345 / tcp
-1694302338 | 2025-03-14T10:50:10.188258
12348 / tcp
-42310996 | 2025-03-09T22:00:16.688952
12349 / tcp
-1998785940 | 2025-03-23T21:23:16.750598
12356 / tcp
-1254699427 | 2025-03-07T17:13:45.731906
12359 / tcp
1836449247 | 2025-02-28T15:55:42.891323
12360 / tcp
-1785163756 | 2025-03-13T13:07:55.437634
12361 / tcp
-1520940419 | 2025-03-14T18:19:24.820025
12366 / tcp
-1786248907 | 2025-03-20T22:54:41.215609
12367 / tcp
1516825392 | 2025-03-25T02:10:38.077363
12368 / tcp
1205992898 | 2025-03-24T14:15:34.269121
12373 / tcp
-1648957546 | 2025-03-23T08:46:09.864381
12375 / tcp
-1158373685 | 2025-03-19T03:12:31.664386
12376 / tcp
704867434 | 2025-03-21T21:29:09.088921
12384 / tcp
1718038726 | 2025-03-18T12:39:55.186976
12387 / tcp
1426854067 | 2025-03-06T16:26:36.982506
12390 / tcp
-1715568875 | 2025-03-12T12:29:52.589390
12392 / tcp
-117299920 | 2025-03-07T05:31:58.802577
12397 / tcp
-1903837786 | 2025-03-08T21:34:50.403553
12398 / tcp
1855945417 | 2025-03-28T08:13:02.812335
12404 / tcp
850209247 | 2025-03-05T16:32:17.382936
12405 / tcp
-937403864 | 2025-03-05T21:40:35.949383
12407 / tcp
47182379 | 2025-03-14T05:27:50.591590
12411 / tcp
-857359832 | 2025-03-13T02:16:56.729296
12412 / tcp
912810138 | 2025-03-14T22:15:15.970368
12423 / tcp
-1968169025 | 2025-03-16T00:48:42.762198
12425 / tcp
1217757469 | 2025-03-24T08:37:52.333878
12426 / tcp
1723350027 | 2025-03-11T08:59:42.950796
12427 / tcp
-668800544 | 2025-03-08T11:45:58.613322
12428 / tcp
-1448525990 | 2025-03-10T09:35:51.189307
12432 / tcp
-644934870 | 2025-03-14T21:55:27.129114
12436 / tcp
1700877997 | 2025-03-22T03:07:59.007650
12442 / tcp
-1560504945 | 2025-03-14T23:05:10.598009
12451 / tcp
-476312445 | 2025-03-15T07:03:52.500932
12452 / tcp
-13275744 | 2025-03-20T16:59:07.230922
12454 / tcp
-1711165163 | 2025-03-18T04:30:23.416958
12461 / tcp
1295781864 | 2025-03-23T12:18:31.792180
12464 / tcp
-845877999 | 2025-02-27T08:38:31.570974
12466 / tcp
50359454 | 2025-03-14T17:16:31.783423
12467 / tcp
-2067759919 | 2025-03-12T05:49:24.692831
12472 / tcp
1654236327 | 2025-03-20T22:20:48.273642
12475 / tcp
1651339238 | 2025-03-13T18:08:21.228235
12477 / tcp
69208821 | 2025-03-09T09:45:34.969507
12478 / tcp
1552278711 | 2025-03-18T04:37:03.518988
12483 / tcp
345685078 | 2025-03-10T02:36:26.903558
12486 / tcp
-1091355512 | 2025-03-19T22:36:44.295856
12491 / tcp
-876315292 | 2025-03-04T06:22:51.666000
12494 / tcp
-48022347 | 2025-03-03T17:51:41.200680
12498 / tcp
-101042285 | 2025-03-13T18:32:39.059929
12499 / tcp
1532786220 | 2025-03-25T02:00:27.711288
12503 / tcp
-105482839 | 2025-03-11T02:24:04.481254
12505 / tcp
1395816951 | 2025-03-26T17:12:23.945695
12506 / tcp
723201570 | 2025-03-21T19:11:12.306120
12512 / tcp
581347993 | 2025-03-27T11:18:32.503293
12515 / tcp
-1051021256 | 2025-03-27T23:01:21.738526
12517 / tcp
-1702296965 | 2025-03-07T04:44:13.202164
12518 / tcp
-1558986538 | 2025-03-26T03:59:12.388856
12519 / tcp
1423464990 | 2025-03-17T05:45:06.425518
12524 / tcp
1684884047 | 2025-03-05T04:52:39.988020
12529 / tcp
1851863544 | 2025-03-09T07:08:06.189337
12541 / tcp
97863421 | 2025-03-21T15:30:21.590855
12546 / tcp
1524848456 | 2025-03-07T02:47:25.228410
12554 / tcp
760778689 | 2025-03-05T06:25:44.035412
12558 / tcp
1088521097 | 2025-03-18T02:35:10.419785
12565 / tcp
-107180925 | 2025-03-26T21:51:34.424349
12566 / tcp
-1929719634 | 2025-03-15T04:55:06.066686
12567 / tcp
-2133322077 | 2025-03-16T23:55:17.339050
12568 / tcp
659017042 | 2025-03-10T22:15:23.167776
12569 / tcp
1365304647 | 2025-03-08T11:38:06.210697
12572 / tcp
-1542211623 | 2025-03-21T01:00:47.693507
12574 / tcp
1300479321 | 2025-03-27T05:35:08.179617
12582 / tcp
28948370 | 2025-03-17T00:12:39.754085
12587 / tcp
-1949117091 | 2025-03-21T19:22:06.812087
12590 / tcp
-1775571276 | 2025-03-17T11:10:16.412973
13000 / tcp
-1945793893 | 2025-03-11T03:37:31.685902
13047 / tcp
2112828127 | 2025-03-27T07:57:39.713989
13579 / tcp
-412487692 | 2025-03-20T22:04:30.030849
14082 / tcp
-120836940 | 2025-03-14T10:51:04.378848
14104 / tcp
473639214 | 2025-03-21T21:21:07.078164
14147 / tcp
-396968165 | 2025-03-23T04:27:56.557854
14265 / tcp
1386046073 | 2025-03-26T22:32:37.120628
14344 / tcp
-1323302264 | 2025-03-24T03:08:16.626582
14400 / tcp
739987611 | 2025-03-27T07:07:58.787307
14401 / tcp
-1813493180 | 2025-03-05T00:28:19.127285
14402 / tcp
-425783515 | 2025-03-25T19:19:36.043494
14403 / tcp
-718862000 | 2025-03-09T11:07:17.265954
14406 / tcp
-58939394 | 2025-03-13T14:48:52.768276
14407 / tcp
1254520623 | 2025-03-13T02:53:42.204380
14873 / tcp
1969865261 | 2025-03-26T20:29:10.235353
14880 / tcp
-597579223 | 2025-03-14T12:23:25.062515
14894 / tcp
-980064193 | 2025-03-17T20:49:42.505506
14895 / tcp
1158826081 | 2025-03-22T04:05:43.152435
15001 / tcp
682437757 | 2025-03-13T13:58:59.073524
15002 / tcp
-906321985 | 2025-03-23T06:11:29.624737
15006 / tcp
-2099857020 | 2025-03-13T12:39:20.478626
15018 / tcp
1508149570 | 2025-03-23T20:59:47.819329
15038 / tcp
-426990313 | 2025-03-10T00:49:09.837023
15040 / tcp
-251085248 | 2025-03-23T01:04:39.182535
15082 / tcp
1257363718 | 2025-03-10T13:31:06.953757
15151 / tcp
827244254 | 2025-03-12T09:04:32.982654
15443 / tcp
-1599287756 | 2025-03-28T13:09:10.825652
15672 / tcp
-1865552857 | 2025-02-28T07:13:07.915928
15673 / tcp
-792795432 | 2025-03-17T08:53:36.803594
16002 / tcp
1505165093 | 2025-03-24T10:46:03.075312
16007 / tcp
1102328475 | 2025-03-12T17:14:33.428898
16010 / tcp
1338520985 | 2025-03-21T16:58:09.350210
16013 / tcp
-212272979 | 2025-03-26T00:32:31.636340
16014 / tcp
1379067070 | 2025-03-13T02:37:58.143989
16017 / tcp
399265288 | 2025-03-23T17:01:55.790670
16018 / tcp
-1189482271 | 2025-03-27T15:02:04.611850
16020 / tcp
-393353198 | 2025-03-05T13:11:32.543052
16023 / tcp
1028686969 | 2025-03-15T02:50:23.705570
16030 / tcp
1071163382 | 2025-03-15T10:05:05.485670
16035 / tcp
-884791436 | 2025-03-06T20:17:11.976874
16040 / tcp
-314688758 | 2025-03-07T15:24:28.760129
16044 / tcp
-15740436 | 2025-03-23T05:11:57.026325
16045 / tcp
-1679463843 | 2025-03-18T08:04:41.082042
16046 / tcp
1948784219 | 2025-03-13T09:01:44.575678
16051 / tcp
-2010335589 | 2025-03-24T02:07:07.696896
16053 / tcp
1894065503 | 2025-03-17T09:35:28.776870
16057 / tcp
-603032904 | 2025-03-17T00:36:04.860041
16066 / tcp
2100591338 | 2025-03-11T08:22:14.541901
16068 / tcp
-1657987922 | 2025-03-09T06:02:40.842716
16069 / tcp
-1089090292 | 2025-03-24T20:37:38.853555
16075 / tcp
-328636182 | 2025-03-22T17:38:17.660912
16078 / tcp
-1846883387 | 2025-03-26T08:42:16.390159
16080 / tcp
-961060826 | 2025-03-18T05:10:34.245079
16085 / tcp
492513162 | 2025-03-28T00:54:03.424374
16091 / tcp
2003213304 | 2025-03-19T07:26:38.518415
16093 / tcp
1971044947 | 2025-03-13T20:32:35.229631
16096 / tcp
-2095298935 | 2025-03-20T17:35:23.576844
16097 / tcp
1253941921 | 2025-03-20T08:35:12.330879
16102 / tcp
-772413455 | 2025-03-25T13:34:27.763414
16104 / tcp
2101627725 | 2025-03-16T09:01:02.353542
16316 / tcp
-912434802 | 2025-03-19T12:08:58.027539
16401 / tcp
1521288058 | 2025-03-18T10:58:47.379330
16403 / tcp
-1341497112 | 2025-03-26T06:36:04.793404
16443 / tcp
-1342564841 | 2025-03-15T09:06:17.532750
16464 / tcp
41224735 | 2025-03-20T23:56:41.759730
16601 / tcp
1042466426 | 2025-03-12T06:56:17.132573
16666 / tcp
59367729 | 2025-03-15T19:03:20.006471
16667 / tcp
1463003762 | 2025-03-17T02:30:18.874080
16831 / tcp
1388170816 | 2025-03-21T10:56:58.409661
16992 / tcp
825154520 | 2025-03-22T17:02:36.785641
16993 / tcp
1213104576 | 2025-03-28T16:47:45.128239
17000 / tcp
-258050011 | 2025-03-26T00:35:31.487233
17001 / tcp
1016863653 | 2025-03-05T15:58:14.545201
17010 / tcp
-711821671 | 2025-03-06T18:57:38.013037
17102 / tcp
-1482429295 | 2025-03-19T04:59:12.227883
17777 / tcp
223382606 | 2025-03-06T19:19:11.007084
18000 / tcp
285044229 | 2025-03-04T11:48:13.598602
18007 / tcp
-1230437347 | 2025-03-26T05:41:42.202507
18008 / tcp
979734530 | 2025-03-19T15:39:13.194365
18009 / tcp
351350260 | 2025-03-12T13:36:43.375644
18019 / tcp
-90544860 | 2025-03-18T18:59:02.912510
18024 / tcp
623921208 | 2025-03-10T13:43:48.820195
18031 / tcp
713449522 | 2025-03-04T13:17:04.207195
18034 / tcp
150525343 | 2025-03-28T07:00:25.890354
18035 / tcp
1863308577 | 2025-03-05T03:59:52.406834
18038 / tcp
-2099197198 | 2025-03-25T10:54:51.355941
18041 / tcp
380054492 | 2025-03-26T08:55:14.911073
18042 / tcp
-1496552293 | 2025-02-28T10:46:39.598115
18047 / tcp
-794869439 | 2025-03-28T22:39:45.774254
18055 / tcp
2002526735 | 2025-03-26T04:06:51.821906
18056 / tcp
-1059923084 | 2025-03-17T04:23:53.837128
18058 / tcp
469695029 | 2025-03-22T19:36:51.565529
18059 / tcp
1128828546 | 2025-03-11T03:35:39.286439
18063 / tcp
-596369099 | 2025-03-05T02:01:50.239860
18064 / tcp
-1346572219 | 2025-03-23T22:48:01.157422
18067 / tcp
2037030749 | 2025-03-07T17:11:40.965576
18070 / tcp
739810253 | 2025-03-18T18:24:52.087897
18071 / tcp
1006353181 | 2025-03-19T16:11:21.576318
18077 / tcp
1990895693 | 2025-03-14T10:02:06.849638
18080 / tcp
-1369540214 | 2025-03-29T02:03:27.403860
18081 / tcp
327624059 | 2025-03-26T21:24:17.820798
18083 / tcp
-1955631987 | 2025-03-24T02:42:43.634869
18084 / tcp
1549936510 | 2025-03-19T03:28:33.667938
18085 / tcp
-530609731 | 2025-03-21T04:07:40.359808
18088 / tcp
-27511581 | 2025-03-28T00:54:23.356912
18094 / tcp
322152883 | 2025-03-06T09:51:45.834279
18097 / tcp
1389524438 | 2025-03-19T11:19:20.564550
18098 / tcp
1728472491 | 2025-03-13T04:04:39.550260
18109 / tcp
1642295343 | 2025-03-15T06:15:52.995951
18112 / tcp
550048931 | 2025-03-20T13:51:02.742085
18245 / tcp
191752421 | 2025-03-25T23:17:58.108197
18443 / tcp
-89816568 | 2025-03-28T20:29:58.845297
18553 / tcp
-1279057409 | 2025-03-26T21:16:08.288871
18765 / tcp
-2109751056 | 2025-03-04T03:17:31.891358
18802 / tcp
1360770741 | 2025-03-20T21:23:11.133174
19000 / tcp
-1803690704 | 2025-03-24T03:50:44.759311
19017 / tcp
1162740073 | 2025-03-24T22:28:49.247981
19071 / tcp
-1314925532 | 2025-03-05T16:24:32.101910
19084 / tcp
-704303578 | 2025-03-24T08:29:32.553631
19200 / tcp
895184429 | 2025-03-27T19:14:54.871934
19222 / tcp
1306269363 | 2025-02-27T21:40:22.014940
19233 / tcp
-1324148642 | 2025-03-10T15:36:04.157869
19776 / tcp
1160341092 | 2025-03-15T21:51:07.689259
19930 / tcp
-1385960474 | 2025-03-26T18:09:25.958471
19998 / tcp
-1106051644 | 2025-03-27T01:40:26.147634
20000 / tcp
-726391219 | 2025-03-16T11:53:18.675153
20001 / tcp
-72059750 | 2025-03-12T15:47:50.970247
20018 / tcp
-1895944903 | 2025-03-11T23:40:31.843258
20050 / tcp
-789366799 | 2025-03-06T00:52:52.300590
20080 / tcp
-51941686 | 2025-03-06T20:28:39.825302
20087 / tcp
195386779 | 2025-03-26T11:11:32.450753
20110 / tcp
-1267546134 | 2025-03-19T14:08:46.382867
20121 / tcp
2046654579 | 2025-03-04T02:08:05.982571
20200 / tcp
-697909572 | 2025-03-28T05:53:53.850200
20202 / tcp
223450317 | 2025-03-16T12:47:35.714119
20256 / tcp
264342331 | 2025-03-26T15:07:08.259188
20547 / tcp
-279430309 | 2025-03-24T00:22:31.680280
20880 / tcp
263469772 | 2025-03-28T15:21:00.869658
20892 / tcp
1813885093 | 2025-03-18T00:19:19.228472
21002 / tcp
418974022 | 2025-03-28T16:23:03.547321
21025 / tcp
-1820130382 | 2025-03-25T06:56:26.232025
21027 / tcp
1750142519 | 2025-03-26T23:05:52.297436
21082 / tcp
-6173047 | 2025-03-23T18:31:05.076888
21236 / tcp
1572538457 | 2025-03-12T20:03:49.658330
21237 / tcp
2117508007 | 2025-03-27T21:55:37.837736
21239 / tcp
-663914595 | 2025-03-18T01:44:20.991362
21241 / tcp
928081488 | 2025-03-17T20:57:14.821955
21244 / tcp
-1938671108 | 2025-03-25T22:42:01.217765
21245 / tcp
591665498 | 2025-03-01T01:22:08.225276
21247 / tcp
-1841270509 | 2025-03-24T07:25:16.381993
21249 / tcp
967638643 | 2025-03-17T03:24:34.477825
21251 / tcp
-2069853650 | 2025-03-21T07:51:34.919729
21252 / tcp
1642751940 | 2025-03-13T05:36:55.671204
21255 / tcp
1016950709 | 2025-03-18T00:29:08.294713
21257 / tcp
1856808040 | 2025-03-12T04:44:41.145534
21259 / tcp
1198922852 | 2025-03-23T17:08:14.456477
21261 / tcp
-1424964589 | 2025-03-04T11:33:13.873864
21265 / tcp
671621984 | 2025-03-14T20:42:07.796004
21268 / tcp
-174970661 | 2025-03-11T02:10:55.882789
21270 / tcp
-494631069 | 2025-03-05T02:02:05.321482
21272 / tcp
-1624098606 | 2025-03-23T08:51:01.542396
21279 / tcp
-935130430 | 2025-03-26T18:52:38.800072
21280 / tcp
-674410611 | 2025-03-03T21:44:01.066296
21285 / tcp
1134569011 | 2025-03-25T05:17:11.710635
21286 / tcp
-1288290779 | 2025-03-10T15:32:05.741034
21290 / tcp
1148627278 | 2025-03-17T16:17:48.160761
21292 / tcp
-477469133 | 2025-03-11T14:02:18.907630
21294 / tcp
-558580292 | 2025-03-06T03:21:51.372427
21295 / tcp
1865477740 | 2025-03-18T12:20:33.846109
21300 / tcp
-1302612468 | 2025-03-18T06:48:32.384838
21301 / tcp
-1045838682 | 2025-03-11T07:13:00.243864
21304 / tcp
2010508271 | 2025-03-12T01:57:29.885949
21307 / tcp
-358052563 | 2025-03-15T17:42:37.908650
21310 / tcp
1035944892 | 2025-03-22T16:32:11.378353
21315 / tcp
-1055209106 | 2025-03-05T12:03:42.928659
21316 / tcp
-584322326 | 2025-03-24T02:51:30.890380
21326 / tcp
249096701 | 2025-03-10T11:09:24.660261
21329 / tcp
-1734326903 | 2025-03-11T12:48:23.923306
21379 / tcp
-77919263 | 2025-03-24T21:21:27.274190
21935 / tcp
2062409733 | 2025-03-25T00:27:37.170975
22001 / tcp
-429863642 | 2025-03-27T21:03:17.812714
22067 / tcp
-1842467209 | 2025-03-27T17:55:43.380230
22070 / tcp
1260379490 | 2025-03-27T15:41:51.503339
22206 / tcp
1224751349 | 2025-03-07T18:06:35.915917
22222 / tcp
-711978147 | 2025-03-26T09:25:19.663409
22556 / tcp
-936572619 | 2025-03-16T07:56:16.578011
23023 / tcp
-2050757409 | 2025-03-23T23:11:39.800231
23128 / tcp
1885364579 | 2025-03-28T12:20:29.166141
23424 / tcp
-2013500842 | 2025-03-19T19:19:52.538102
24181 / tcp
-1652595600 | 2025-03-17T04:57:53.525260
24245 / tcp
406013680 | 2025-03-26T04:08:59.122574
24442 / tcp
-1454281030 | 2025-03-10T07:46:09.182832
25001 / tcp
-395367810 | 2025-03-20T13:59:32.472287
25005 / tcp
1645448018 | 2025-03-28T12:46:31.494455
25105 / tcp
-307790954 | 2025-03-25T23:27:26.913040
25565 / tcp
-1811599521 | 2025-03-25T22:47:14.592960
26656 / tcp
239483336 | 2025-03-13T06:12:14.142108
26657 / tcp
-420589825 | 2025-03-28T02:31:38.532684
27016 / tcp
1074975354 | 2025-03-25T14:02:35.346783
27017 / tcp
1955525369 | 2025-03-25T10:43:15.513207
27036 / tcp
-1598133851 | 2025-03-25T08:40:07.859104
27571 / tcp
-1682743491 | 2025-03-24T16:43:25.253181
28015 / tcp
-1376554993 | 2025-03-24T01:08:08.190118
28017 / tcp
555383573 | 2025-03-26T00:33:07.882858
28080 / tcp
-177823338 | 2025-03-28T04:21:43.414595
29840 / tcp
273891208 | 2025-03-05T00:29:34.660818
30000 / tcp
1328394147 | 2025-03-10T03:02:47.454486
30002 / tcp
828009385 | 2025-03-18T00:20:26.636798
30003 / tcp
914621632 | 2025-03-23T12:00:21.474175
30006 / tcp
663417095 | 2025-02-27T17:48:25.601820
30022 / tcp
-1197507059 | 2025-03-18T21:26:25.003919
30023 / tcp
-731759661 | 2025-03-15T21:20:01.733960
30104 / tcp
1689669576 | 2025-03-28T06:35:02.276255
30111 / tcp
1110719756 | 2025-03-09T10:54:00.909053
30113 / tcp
-363974156 | 2025-02-27T19:17:54.974545
30122 / tcp
-1489272128 | 2025-03-11T04:00:29.453599
30222 / tcp
-2025656347 | 2025-03-09T06:41:45.032502
30301 / tcp
-1786924424 | 2025-03-15T19:36:59.554841
30422 / tcp
1591407728 | 2025-03-13T11:46:44.437256
30444 / tcp
-197159086 | 2025-03-10T21:31:09.280963
30468 / tcp
2053290502 | 2025-03-15T00:38:09.703687
30501 / tcp
1548600567 | 2025-03-25T04:22:46.053739
30522 / tcp
-137029252 | 2025-03-12T14:21:28.998442
30622 / tcp
2134135583 | 2025-03-26T03:07:42.798993
30701 / tcp
-2009986912 | 2025-03-22T09:49:48.546116
30718 / tcp
-1790887350 | 2025-03-22T12:12:18.817141
30722 / tcp
1440442738 | 2025-03-13T13:21:16.066149
30822 / tcp
-1311069753 | 2025-03-25T21:02:29.061192
30892 / tcp
-1260930909 | 2025-03-26T15:19:14.465406
30922 / tcp
-379175474 | 2025-03-20T22:29:51.276830
31017 / tcp
647330804 | 2025-03-24T23:30:39.255601
31022 / tcp
-376142508 | 2025-03-24T12:41:51.529876
31122 / tcp
309125743 | 2025-03-25T17:28:57.639156
31222 / tcp
-2094378046 | 2025-03-13T04:18:41.438003
31322 / tcp
-547071992 | 2025-03-09T17:08:26.087921
31337 / tcp
-55055566 | 2025-03-12T19:11:59.395437
31380 / tcp
-743941209 | 2025-03-18T16:14:27.174051
31422 / tcp
794804597 | 2025-03-25T03:26:55.059642
31443 / tcp
550180409 | 2025-03-28T16:45:53.815198
31522 / tcp
-981624822 | 2025-03-23T11:33:46.389806
31722 / tcp
1840980919 | 2025-03-21T15:59:25.143957
31922 / tcp
1445904914 | 2025-03-24T05:39:14.725636
32022 / tcp
981454656 | 2025-03-23T19:12:35.146608
32202 / tcp
-1563410778 | 2025-03-17T22:46:15.085088
32222 / tcp
-575040666 | 2025-03-23T17:21:12.921527
32400 / tcp
113509650 | 2025-03-23T15:24:10.447468
32422 / tcp
2081411118 | 2025-03-23T13:20:04.310108
32522 / tcp
1243408870 | 2025-03-08T16:02:36.485813
32622 / tcp
-1131066 | 2025-03-11T19:22:13.680909
32722 / tcp
-387705177 | 2025-03-23T05:17:05.369187
32764 / tcp
-1271362511 | 2025-03-23T20:38:13.297674
32822 / tcp
-1988417061 | 2025-03-23T03:58:27.577265
32922 / tcp
1252502490 | 2025-03-23T01:51:57.066679
33022 / tcp
1325964552 | 2025-03-22T23:59:22.452536
33122 / tcp
1371018359 | 2025-03-22T22:35:24.271352
33222 / tcp
2116287407 | 2025-03-19T23:38:32.341480
33322 / tcp
-812169628 | 2025-03-22T07:20:22.602753
33338 / tcp
892903524 | 2025-03-24T07:24:39.739872
33389 / tcp
2031468346 | 2025-03-13T07:46:24.430394
33422 / tcp
-737309075 | 2025-03-09T09:01:42.066741
33622 / tcp
-554859025 | 2025-03-21T05:29:46.814884
33722 / tcp
940441339 | 2025-03-18T04:07:43.200160
33822 / tcp
-1174883290 | 2025-03-18T11:22:11.034788
33922 / tcp
1210035594 | 2025-03-18T02:20:12.374340
34022 / tcp
646241008 | 2025-03-20T17:44:31.441356
34122 / tcp
-1221218311 | 2025-03-20T15:24:11.833305
34422 / tcp
249233150 | 2025-03-15T02:02:25.305868
34522 / tcp
-82849346 | 2025-03-19T11:19:57.010868
34622 / tcp
346724976 | 2025-03-19T09:37:02.941067
34722 / tcp
-170490108 | 2025-03-19T07:55:27.767976
34822 / tcp
1463724522 | 2025-03-19T06:12:34.891877
34922 / tcp
-850701703 | 2025-03-18T19:42:48.292326
35000 / tcp
-395367810 | 2025-03-21T19:22:52.982877
35122 / tcp
-1298596604 | 2025-03-19T01:04:43.691110
35222 / tcp
-100348104 | 2025-03-18T10:00:04.603538
35322 / tcp
1033626105 | 2025-03-17T08:59:58.790560
35422 / tcp
1413463054 | 2025-03-18T23:10:38.222952
35522 / tcp
-926399915 | 2025-03-17T00:53:59.644632
35622 / tcp
-1291056897 | 2025-03-04T13:02:51.475834
35722 / tcp
-308698299 | 2025-03-17T10:15:10.485787
35922 / tcp
-1312571116 | 2025-03-16T22:16:45.693293
36022 / tcp
-1495849743 | 2025-03-17T21:04:31.091495
36122 / tcp
1390542196 | 2025-03-13T09:51:29.587383
36222 / tcp
-1947912585 | 2025-03-17T19:23:29.295230
36322 / tcp
1095300076 | 2025-03-17T12:41:18.830871
36422 / tcp
2114727002 | 2025-03-15T08:22:20.333577
36522 / tcp
1410205832 | 2025-03-18T16:40:37.186290
36622 / tcp
671958170 | 2025-03-16T07:35:30.033347
36822 / tcp
-756357026 | 2025-03-18T14:31:28.279404
36922 / tcp
542452783 | 2025-03-18T12:49:56.807774
36983 / tcp
-282668253 | 2025-03-29T01:35:36.661771
37022 / tcp
1100458540 | 2025-03-16T19:23:48.967413
37122 / tcp
1104575291 | 2025-03-16T23:03:31.313012
37215 / tcp
1186115945 | 2025-03-21T10:26:15.502946
37222 / tcp
435826225 | 2025-03-14T19:29:20.381862
37322 / tcp
-1956354933 | 2025-03-16T11:14:51.605244
37422 / tcp
-1435572454 | 2025-02-28T18:46:33.258709
37522 / tcp
1189426863 | 2025-03-16T09:44:12.604027
37622 / tcp
2079760555 | 2025-03-16T01:56:56.349137
37777 / tcp
-395367810 | 2025-03-28T01:05:44.534678
37822 / tcp
-1277636945 | 2025-03-14T01:32:33.452983
37922 / tcp
-915826927 | 2025-03-18T00:38:50.310211
38022 / tcp
-2135601846 | 2025-03-17T23:30:03.289127
38122 / tcp
360171286 | 2025-03-15T17:19:53.311866
38222 / tcp
1013116702 | 2025-03-10T20:44:39.818526
38322 / tcp
-473110427 | 2025-03-15T13:36:26.402796
38333 / tcp
-1904748472 | 2025-03-28T19:05:29.287759
38522 / tcp
566310301 | 2025-03-14T01:01:34.084111
38622 / tcp
1278721823 | 2025-03-14T09:07:07.196277
38822 / tcp
-1506440556 | 2025-03-03T20:38:54.415620
38922 / tcp
1354689433 | 2025-03-13T15:20:02.643457
39022 / tcp
-2146279933 | 2025-03-13T20:19:58.398394
39222 / tcp
360799495 | 2025-03-13T16:48:37.199733
39422 / tcp
-95689087 | 2025-03-11T13:53:12.210395
39622 / tcp
-357387874 | 2025-03-11T07:28:16.662759
39722 / tcp
-1328535088 | 2025-03-05T04:31:41.340562
39822 / tcp
-1359622303 | 2025-03-12T05:44:36.832949
40001 / tcp
-225535366 | 2025-03-26T19:10:11.169927
40005 / tcp
882210976 | 2025-03-23T02:05:04.526749
40022 / tcp
740163330 | 2025-03-09T12:12:34.557872
40222 / tcp
1285311688 | 2025-03-04T10:35:10.617886
40322 / tcp
1813355919 | 2025-03-08T21:10:09.438156
40722 / tcp
-361343005 | 2025-03-08T14:20:16.904460
41443 / tcp
-1935341388 | 2025-03-14T03:15:51.201741
41794 / tcp
-616455966 | 2025-03-23T20:47:28.690617
41800 / tcp
407248599 | 2025-03-19T19:58:56.455044
41922 / tcp
-1587034133 | 2025-03-07T16:00:22.412788
42022 / tcp
-1655230195 | 2025-03-04T17:06:20.197144
42222 / tcp
1857453315 | 2025-03-04T22:56:37.727344
42422 / tcp
-754130040 | 2025-03-04T19:27:01.084374
43200 / tcp
-750962105 | 2025-03-07T06:57:00.096660
43322 / tcp
1670683428 | 2025-02-27T22:56:28.112930
43422 / tcp
2078550493 | 2025-02-27T20:58:50.235961
43522 / tcp
1180814906 | 2025-02-27T18:20:16.613159
43922 / tcp
914564976 | 2025-02-27T09:40:05.372971
44022 / tcp
1451165599 | 2025-02-27T08:12:32.379057
44100 / tcp
-1466114955 | 2025-02-28T12:45:16.108553
44158 / tcp
-2122104500 | 2025-03-23T14:00:33.119686
44222 / tcp
1905871432 | 2025-03-10T23:03:38.958452
44300 / tcp
1698615759 | 2025-03-24T08:06:24.551872
44303 / tcp
657551194 | 2025-03-29T07:24:58.215761
44306 / tcp
-1991100016 | 2025-03-19T11:54:47.305929
44320 / tcp
-1839671676 | 2025-02-27T10:28:28.892579
44337 / tcp
-1881941246 | 2025-03-13T15:09:14.845454
44341 / tcp
2032450289 | 2025-03-22T20:39:49.800114
44350 / tcp
1654087147 | 2025-03-26T03:42:15.108993
44444 / tcp
-1044080902 | 2025-03-13T15:41:21.769345
44818 / tcp
-1562769844 | 2025-03-24T20:45:05.252088
45001 / tcp
1330288644 | 2025-03-10T02:56:41.781012
45002 / tcp
186089170 | 2025-03-16T01:27:33.070167
45555 / tcp
-1150545469 | 2025-03-21T19:51:20.221075
45667 / tcp
677067665 | 2025-03-04T06:23:07.577518
45777 / tcp
-1128134015 | 2025-03-24T13:12:36.067067
45788 / tcp
-357796025 | 2025-03-05T17:43:01.473409
45922 / tcp
-1373737097 | 2025-03-10T14:18:52.296506
46443 / tcp
20672277 | 2025-03-20T15:27:24.545342
47534 / tcp
1406727102 | 2025-03-13T16:17:51.346893
47722 / tcp
-1679552399 | 2025-03-10T10:42:26.048819
47808 / tcp
-1582069960 | 2025-03-24T03:55:24.238986
47822 / tcp
-1378010120 | 2025-03-10T09:28:31.559308
47922 / tcp
-1886162972 | 2025-03-10T07:15:37.031623
47989 / tcp
-764426675 | 2025-03-27T06:05:23.476612
47990 / tcp
1536721963 | 2025-03-27T10:18:57.335000
48018 / tcp
1958810659 | 2025-03-19T17:46:07.114445
48022 / tcp
1428730392 | 2025-03-07T10:52:29.019253
48222 / tcp
1689547752 | 2025-03-10T03:47:01.280970
48322 / tcp
-164128058 | 2025-03-10T02:40:07.461267
48522 / tcp
591678361 | 2025-03-09T23:41:09.802997
48899 / tcp
-225193792 | 2025-03-22T05:32:35.777962
49152 / tcp
-47693169 | 2025-03-16T07:56:47.973544
49153 / tcp
-1546279962 | 2025-03-22T14:06:24.794921
49501 / tcp
1295967029 | 2025-03-06T07:57:16.745600
49688 / tcp
2144183575 | 2025-03-17T12:16:30.195912
50000 / tcp
-1247012709 | 2025-03-22T20:00:34.923299
50001 / tcp
-964773219 | 2025-03-22T11:54:57.664006
50006 / tcp
-862911991 | 2025-03-29T03:01:15.465339
50011 / tcp
415683204 | 2025-03-11T07:39:38.576146
50013 / tcp
876001247 | 2025-03-29T04:26:40.670211
50042 / tcp
-459530828 | 2025-03-14T15:30:31.980808
50050 / tcp
-314065407 | 2025-03-29T04:00:48.535212
50070 / tcp
1896103043 | 2025-03-28T11:48:27.965948
50073 / tcp
-868506110 | 2025-03-05T09:21:30.182479
50100 / tcp
-82614782 | 2025-03-29T02:08:34.549148
50105 / tcp
-2124902827 | 2025-03-05T11:43:11.116642
50107 / tcp
-725241345 | 2025-03-16T20:36:20.140812
50160 / tcp
-1939328246 | 2025-03-04T14:55:08.534097
50202 / tcp
2084805150 | 2025-03-13T10:39:24.185304
50443 / tcp
-1013539802 | 2025-03-14T05:21:55.409088
50500 / tcp
1065174658 | 2025-03-16T20:19:24.591804
50580 / tcp
1752027843 | 2025-03-09T06:35:39.182676
50805 / tcp
-843261398 | 2025-03-26T13:06:56.344487
50996 / tcp
-1597866276 | 2025-03-24T21:36:52.253695
50997 / tcp
-1978142755 | 2025-03-16T23:40:00.881236
51004 / tcp
1728906902 | 2025-03-11T03:48:49.278123
51005 / tcp
-869505496 | 2025-03-12T16:48:34.089204
51106 / tcp
-96421916 | 2025-03-19T18:22:07.208511
51200 / tcp
-1350484084 | 2025-03-23T04:49:21.305507
51235 / tcp
1488952788 | 2025-03-23T08:37:33.486804
51443 / tcp
430259747 | 2025-03-28T15:05:21.937336
52311 / tcp
-297854177 | 2025-03-14T18:19:43.551524
52340 / tcp
1488511055 | 2025-03-06T10:13:12.209029
52869 / tcp
-1040532167 | 2025-03-21T17:16:50.509854
53022 / tcp
186303836 | 2025-03-07T08:00:45.829397
53413 / tcp
-768648392 | 2025-03-29T07:31:26.199659
53481 / tcp
-216085636 | 2025-03-17T18:28:00.633926
54022 / tcp
-1407572330 | 2025-03-13T14:21:27.176722
54138 / tcp
-82669925 | 2025-03-28T18:52:58.935345
54984 / tcp
-1468664412 | 2025-03-21T07:09:27.316772
55000 / tcp
1880141625 | 2025-03-25T18:09:23.181539
55022 / tcp
1911162692 | 2025-03-07T04:25:15.702163
55055 / tcp
1962202585 | 2025-03-16T16:30:39.177534
55080 / tcp
-1372075196 | 2025-03-22T05:47:10.193778
55200 / tcp
1279341675 | 2025-03-09T10:30:01.709667
55222 / tcp
2085742917 | 2025-03-07T02:18:21.758161
55422 / tcp
895997368 | 2025-03-06T17:43:14.747161
55442 / tcp
1088758585 | 2025-03-20T20:32:03.302959
55443 / tcp
-1885043071 | 2025-03-19T16:04:15.119661
55522 / tcp
-1927032790 | 2025-03-06T22:53:27.406553
55553 / tcp
-708171451 | 2025-03-19T22:41:17.450661
55554 / tcp
-589618041 | 2025-03-27T16:34:16.927966
55722 / tcp
1263081683 | 2025-03-06T19:26:07.232470
55822 / tcp
835103866 | 2025-03-06T21:09:55.920340
57522 / tcp
-99821021 | 2025-03-06T12:40:08.858385
57622 / tcp
-1398687562 | 2025-03-06T11:59:11.800672
57722 / tcp
-496733907 | 2025-03-06T07:57:48.087203
57778 / tcp
1300744604 | 2025-03-15T16:47:41.044984
57788 / tcp
494041335 | 2025-03-23T17:37:43.244955
57922 / tcp
-157738343 | 2025-03-06T04:27:17.504313
58000 / tcp
749605500 | 2025-03-10T04:17:17.463365
58122 / tcp
-603980058 | 2025-03-06T02:42:35.546885
58222 / tcp
-705635575 | 2025-03-06T00:58:10.461866
58322 / tcp
-1655106793 | 2025-03-05T23:12:19.895142
58422 / tcp
1843364923 | 2025-03-05T21:27:44.459877
58443 / tcp
1321938070 | 2025-03-14T22:22:22.825459
58532 / tcp
-1699391926 | 2025-03-28T13:48:57.743458
58722 / tcp
-1609553280 | 2025-03-05T18:02:43.988070
58822 / tcp
114605155 | 2025-03-05T16:47:21.668276
58922 / tcp
-1179487553 | 2025-03-05T15:26:21.907309
59022 / tcp
-1715180900 | 2025-03-05T12:53:02.774536
59222 / tcp
-1841331866 | 2025-03-05T09:35:17.957730
59322 / tcp
1845332674 | 2025-03-05T07:40:01.491045
59443 / tcp
2072656747 | 2025-02-28T15:20:26.366983
59522 / tcp
-1387468844 | 2025-03-03T18:50:44.928736
60001 / tcp
1431135701 | 2025-03-29T05:42:53.468827
60010 / tcp
8486380 | 2025-03-26T16:57:32.712403
60021 / tcp
556360217 | 2025-03-17T17:01:37.922282
60023 / tcp
317500551 | 2025-03-29T07:31:32.414513
60030 / tcp
449579451 | 2025-03-28T18:41:40.284678
60099 / tcp
1018947338 | 2025-03-25T11:49:07.785178
60102 / tcp
1716096428 | 2025-02-27T07:45:16.473806
60129 / tcp
1043385187 | 2025-03-20T04:48:17.297862
60443 / tcp
-1637049950 | 2025-03-19T10:19:06.185291
61613 / tcp
-819464190 | 2025-03-18T19:59:59.043453
61616 / tcp
609179638 | 2025-03-23T10:24:40.882311
62078 / tcp
-1823252948 | 2025-03-22T00:07:44.704393
63210 / tcp
-2087820691 | 2025-03-24T18:43:07.171496
63256 / tcp
1963792519 | 2025-03-23T12:46:34.572168
63257 / tcp
1028188268 | 2025-03-27T09:46:09.553257
63260 / tcp
433549818 | 2025-03-28T10:52:53.926269
64295 / tcp
-1544325625 | 2025-03-29T06:17:08.972424
64738 / tcp
1054974652 | 2025-03-15T04:25:45.729773
65000 / tcp
1452187321 | 2025-03-08T19:24:48.648746
65004 / tcp
-1442055913 | 2025-03-22T07:14:33.983317



Contact Us

Shodan ® - All rights reserved