· 5 years ago · Mar 19, 2020, 06:24 PM
1##################################################################################################################################
2==================================================================================================================================
3Hostname www.gesaguas.cl ISP ZAM LTDA.
4Continent South America Flag
5CL
6Country Chile Country Code CL
7Region Maule Region Local time 19 Mar 2020 13:48 -03
8City Curicó Postal Code Unknown
9IP Address 170.239.85.227 Latitude -34.983
10 Longitude -71.239
11==================================================================================================================================
12##################################################################################################################################
13> www.gesaguas.cl
14Server: 10.101.0.243
15Address: 10.101.0.243#53
16
17Non-authoritative answer:
18www.gesaguas.cl canonical name = gesaguas.cl.
19Name: gesaguas.cl
20Address: 170.239.85.227
21>
22##################################################################################################################################
23Domain name: gesaguas.cl
24Registrant name: GESAGUAS Chile SpA
25Registrant organisation:
26Registrar name: NIC Chile
27Registrar URL: https://www.nic.cl
28Creation date: 2015-09-29 19:53:49 CLST
29Expiration date: 2020-09-29 19:53:49 CLST
30Name server: ns1.dns-premium.net
31Name server: ns2.dns-premium.net
32##################################################################################################################################[+] Target : www.gesaguas.cl
33
34[+] IP Address : 170.239.85.227
35
36[+] Headers :
37
38[+] X-Powered-By : Express
39[+] Accept-Ranges : bytes
40[+] Cache-Control : public, max-age=0
41[+] Last-Modified : Wed, 26 Feb 2020 15:00:47 GMT
42[+] ETag : W/"1fbf-1708203bb4a"
43[+] Content-Type : text/html; charset=UTF-8
44[+] Content-Length : 8127
45[+] Date : Thu, 19 Mar 2020 16:54:49 GMT
46[+] Connection : keep-alive
47
48[+] SSL Certificate Information :
49
50[+] commonName : gesaguas.cl
51[+] countryName : US
52[+] organizationName : Let's Encrypt
53[+] commonName : Let's Encrypt Authority X3
54[+] Version : 3
55[+] Serial Number : 0319BDFA194DC79F381AD0A21150985A044A
56[+] Not Before : Mar 3 16:24:43 2020 GMT
57[+] Not After : Jun 1 16:24:43 2020 GMT
58[+] OCSP : ('http://ocsp.int-x3.letsencrypt.org',)
59[+] subject Alt Name : (('DNS', 'gesaguas.cl'), ('DNS', 'www.gesaguas.cl'))
60[+] CA Issuers : ('http://cert.int-x3.letsencrypt.org/',)
61
62[+] Whois Lookup :
63
64[+] NIR : None
65[+] ASN Registry : lacnic
66[+] ASN : 52368
67[+] ASN CIDR : 170.239.85.0/24
68[+] ASN Country Code : CL
69[+] ASN Date : 2016-11-03
70[+] ASN Description : ZAM LTDA., CL
71[+] cidr : 170.239.84.0/22
72[+] name : None
73[+] handle : CCF3
74[+] range : 170.239.84/22
75[+] description : ZAM LTDA.
76[+] country : CL
77[+] state : None
78[+] city : None
79[+] address : None
80[+] postal_code : None
81[+] emails : ['chan@HAULMER.COM', 'noc@HAULMER.COM']
82[+] created : 20161103
83[+] updated : 20181206
84
85[+] Crawling Target...
86
87[+] Looking for robots.txt........[ Found ]
88[+] Extracting robots Links.......[ 1 ]
89[+] Looking for sitemap.xml.......[ Found ]
90[+] Extracting sitemap Links......[ 62 ]
91[+] Extracting CSS Links..........[ 7 ]
92[+] Extracting Javascript Links...[ 33 ]
93[+] Extracting Internal Links.....[ 0 ]
94[+] Extracting External Links.....[ 1 ]
95[+] Extracting Images.............[ 1 ]
96
97[+] Total Links Extracted : 105
98
99[+] Dumping Links in /opt/FinalRecon/dumps/www.gesaguas.cl.dump
100[+] Completed!
101###################################################################################################################################
102[i] Scanning Site: https://www.gesaguas.cl
103
104
105
106B A S I C I N F O
107====================
108
109
110[+] Site Title:
111[+] IP address: 170.239.85.227
112[+] Web Server: Could Not Detect
113[+] CMS: Could Not Detect
114[+] Cloudflare: Not Detected
115[+] Robots File: Found
116
117-------------[ contents ]----------------
118User-agent: *
119Allow: /
120Sitemap: https://www.gesaguas.cl/sitemap.xml
121
122-----------[end of contents]-------------
123
124
125
126W H O I S L O O K U P
127========================
128
129 %%
130%% This is the NIC Chile Whois server (whois.nic.cl).
131%%
132%% Rights restricted by copyright.
133%% See https://www.nic.cl/normativa/politica-publicacion-de-datos-cl.pdf
134%%
135
136Domain name: gesaguas.cl
137Registrant name: GESAGUAS Chile SpA
138Registrant organisation:
139Registrar name: NIC Chile
140Registrar URL: https://www.nic.cl
141Creation date: 2015-09-29 19:53:49 CLST
142Expiration date: 2020-09-29 19:53:49 CLST
143Name server: ns1.dns-premium.net
144Name server: ns2.dns-premium.net
145
146%%
147%% For communication with domain contacts please use website.
148%% See https://www.nic.cl/registry/Whois.do?d=gesaguas.cl
149%%
150
151
152
153
154G E O I P L O O K U P
155=========================
156
157[i] IP Address: 170.239.85.227
158[i] Country: Chile
159[i] State: Maule Region
160[i] City: Curico
161[i] Latitude: -34.9828
162[i] Longitude: -71.2394
163
164
165
166
167H T T P H E A D E R S
168=======================
169
170
171[i] HTTP/1.1 200 OK
172[i] X-Powered-By: Express
173[i] Accept-Ranges: bytes
174[i] Cache-Control: public, max-age=0
175[i] Last-Modified: Wed, 26 Feb 2020 15:00:47 GMT
176[i] ETag: W/"1fbf-1708203bb4a"
177[i] Content-Type: text/html; charset=UTF-8
178[i] Content-Length: 8127
179[i] Date: Thu, 19 Mar 2020 16:55:17 GMT
180[i] Connection: close
181
182
183
184
185D N S L O O K U P
186===================
187
188gesaguas.cl. 0 IN A 170.239.85.227
189gesaguas.cl. 0 IN NS ns1.dns-premium.net.
190gesaguas.cl. 0 IN NS ns2.dns-premium.net.
191gesaguas.cl. 1799 IN SOA ns1.dns-premium.net. hostmaster.gesaguas.cl. 2020030303 28800 7200 604800 1800
192gesaguas.cl. 1799 IN MX 5 ALT1.ASPMX.L.GOOGLE.COM.
193gesaguas.cl. 1799 IN MX 5 ALT2.ASPMX.L.GOOGLE.COM.
194gesaguas.cl. 1799 IN MX 10 ALT3.ASPMX.L.GOOGLE.COM.
195gesaguas.cl. 1799 IN MX 10 ALT4.ASPMX.L.GOOGLE.COM.
196gesaguas.cl. 1799 IN MX 1 ASPMX.L.GOOGLE.COM.
197gesaguas.cl. 0 IN TXT "D1416415"
198gesaguas.cl. 1799 IN TXT "google-site-verification=1neJKsVYf4hCOOv9L-quMXph7OadxY5DYHZ7S8yl2ak"
199gesaguas.cl. 1799 IN TXT "google-site-verification=zKiQL9R07PeM08dNqBCL7vWtCwxLit2GuA65GHfkT3w"
200
201
202
203
204S U B N E T C A L C U L A T I O N
205====================================
206
207Address = 170.239.85.227
208Network = 170.239.85.227 / 32
209Netmask = 255.255.255.255
210Broadcast = not needed on Point-to-Point links
211Wildcard Mask = 0.0.0.0
212Hosts Bits = 0
213Max. Hosts = 1 (2^0 - 0)
214Host Range = { 170.239.85.227 - 170.239.85.227 }
215
216
217
218N M A P P O R T S C A N
219============================
220
221Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-19 16:55 UTC
222Nmap scan report for gesaguas.cl (170.239.85.227)
223Host is up (0.15s latency).
224
225PORT STATE SERVICE
22621/tcp closed ftp
22722/tcp closed ssh
22880/tcp open http
229443/tcp open https
230
231Nmap done: 1 IP address (1 host up) scanned in 0.52 seconds
232#################################################################################################################################
233[+] Starting At 2020-03-19 12:56:26.967057
234[+] Collecting Information On: https://www.gesaguas.cl/
235[#] Status: 200
236--------------------------------------------------
237[#] X-Powered-By: Express
238[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
239- X-Powered-By: Express
240- Accept-Ranges: bytes
241- Cache-Control: public, max-age=0
242- Last-Modified: Wed, 26 Feb 2020 15:00:47 GMT
243- ETag: W/"1fbf-1708203bb4a"
244- Content-Type: text/html; charset=UTF-8
245- Content-Length: 8127
246- Date: Thu, 19 Mar 2020 16:56:23 GMT
247- Connection: keep-alive
248--------------------------------------------------
249[#] Finding Location..!
250[#] status: success
251[#] country: Chile
252[#] countryCode: CL
253[#] region: ML
254[#] regionName: Maule Region
255[#] city: Curicó
256[#] zip:
257[#] lat: -34.9828
258[#] lon: -71.2394
259[#] timezone: America/Santiago
260[#] isp: ZAM LTDA.
261[#] org: ZAM LTDA
262[#] as: AS52368 ZAM LTDA.
263[#] query: 170.239.85.227
264--------------------------------------------------
265[x] Didn't Detect WAF Presence on: https://www.gesaguas.cl/
266--------------------------------------------------
267[#] Starting Reverse DNS
268[-] Failed ! Fail
269--------------------------------------------------
270[!] Scanning Open Port
271[#] 80/tcp open http
272[#] 443/tcp open https
273[#] 3306/tcp open mysql
274--------------------------------------------------
275[+] Getting SSL Info
276{'OCSP': ('http://ocsp.int-x3.letsencrypt.org',),
277 'caIssuers': ('http://cert.int-x3.letsencrypt.org/',),
278 'issuer': ((('countryName', 'US'),),
279 (('organizationName', "Let's Encrypt"),),
280 (('commonName', "Let's Encrypt Authority X3"),)),
281 'notAfter': 'Jun 1 16:24:43 2020 GMT',
282 'notBefore': 'Mar 3 16:24:43 2020 GMT',
283 'serialNumber': '0319BDFA194DC79F381AD0A21150985A044A',
284 'subject': ((('commonName', 'gesaguas.cl'),),),
285 'subjectAltName': (('DNS', 'gesaguas.cl'), ('DNS', 'www.gesaguas.cl')),
286 'version': 3}
287-----BEGIN CERTIFICATE-----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317-----END CERTIFICATE-----
318
319--------------------------------------------------
320[+] Collecting Information Disclosure!
321[#] Detecting sitemap.xml file
322[!] sitemap.xml File Found: https://www.gesaguas.cl//sitemap.xml
323[#] Detecting robots.txt file
324[!] robots.txt File Found: https://www.gesaguas.cl//robots.txt
325[#] Detecting GNU Mailman
326[-] GNU Mailman App Not Detected!?
327--------------------------------------------------
328[+] Crawling Url Parameter On: https://www.gesaguas.cl/
329--------------------------------------------------
330[#] Searching Html Form !
331[-] No Html Form Found!?
332--------------------------------------------------
333[-] No DOM Paramter Found!?
334--------------------------------------------------
335[-] No internal Dynamic Parameter Found!?
336--------------------------------------------------
337[-] No external Dynamic Paramter Found!?
338--------------------------------------------------
339[!] 11 Internal links Discovered
340[+] https://www.gesaguas.cl///
341[+] https://www.gesaguas.cl//{{var_canonical}}
342[+] https://www.gesaguas.cl//img/favicon.png
343[+] https://www.gesaguas.cl//./css/animate.min.css
344[+] https://www.gesaguas.cl//./css/bootstrap.min.css
345[+] https://www.gesaguas.cl//./css/bootstrap.css
346[+] https://www.gesaguas.cl//./css/flexslider.min.css
347[+] https://www.gesaguas.cl//./css/icomoon.min.css
348[+] https://www.gesaguas.cl//./css/style.min.css
349[+] https://www.gesaguas.cl//./css/simditor.css
350[+] https://www.gesaguas.cl//./css/bootstrap-datepicker.min.css
351--------------------------------------------------
352[!] 1 External links Discovered
353[#] https://statcounter.com/
354--------------------------------------------------
355[#] Mapping Subdomain..
356[!] Found 1 Subdomain
357- gesaguas.cl
358--------------------------------------------------
359[!] Done At 2020-03-19 12:56:59.934567
360#################################################################################################################################
361[INFO] ------TARGET info------
362[*] TARGET: https://www.gesaguas.cl/
363[*] TARGET IP: 170.239.85.227
364[INFO] NO load balancer detected for www.gesaguas.cl...
365[*] DNS servers: gesaguas.cl.
366[*] TARGET server:
367[*] CC: CL
368[*] Country: Chile
369[*] RegionCode: ML
370[*] RegionName: Maule Region
371[*] City: Curicó
372[*] ASN: AS52368
373[*] BGP_PREFIX: 170.239.84.0/22
374[*] ISP: ZAM LTDA., CL
375[INFO] SSL/HTTPS certificate detected
376[*] Issuer: issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
377[*] Subject: subject=CN = gesaguas.cl
378[ALERT] Let's Encrypt is commonly used for Phishing
379[INFO] DNS enumeration:
380[INFO] Possible abuse mails are:
381[*] abuse@gesaguas.cl
382[*] abuse@www.gesaguas.cl
383[*] noc@haulmer.com
384[INFO] NO PAC (Proxy Auto Configuration) file FOUND
385[ALERT] robots.txt file FOUND in http://www.gesaguas.cl/robots.txt
386[INFO] Checking for HTTP status codes recursively from http://www.gesaguas.cl/robots.txt
387[INFO] Status code Folders
388[*] 200 http://www.gesaguas.cl/
389[INFO] Starting FUZZing in http://www.gesaguas.cl/FUzZzZzZzZz...
390[INFO] Status code Folders
391[*] 200 http://www.gesaguas.cl/index
392[*] 200 http://www.gesaguas.cl/images
393[*] 200 http://www.gesaguas.cl/download
394[*] 200 http://www.gesaguas.cl/2006
395[*] 200 http://www.gesaguas.cl/news
396[*] 200 http://www.gesaguas.cl/crack
397[*] 200 http://www.gesaguas.cl/serial
398[*] 200 http://www.gesaguas.cl/warez
399[*] 200 http://www.gesaguas.cl/full
400[*] 200 http://www.gesaguas.cl/12
401[ALERT] Look in the source code. It may contain passwords
402
403Recherche 170.239.85.227
404Connexion HTTP à 170.239.85.227
405Envoi de la requête HTTP.
406Requête HTTP envoyée. Attente de réponse.
407HTTP/1.1 301 Moved Permanently
408Transfert de données terminé
409HTTP/1.1 301 Moved Permanently
410Utilisation de https://170.239.85.227/
411Recherche 170.239.85.227
412Connexion HTTPS à 170.239.85.227
413
414lynx : accès impossible au fichier de départ http://170.239.85.227/
415[INFO] Links found from https://www.gesaguas.cl/ http://170.239.85.227/:
416[*] https://statcounter.com/
417cut: intervalle de champ incorrecte
418Saisissez « cut --help » pour plus d'informations.
419[INFO] Shodan detected the following opened ports on 170.239.85.227:
420[*] 3
421[*] 3306
422[*] 443
423[*] 80
424[INFO] ------VirusTotal SECTION------
425[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
426[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
427[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
428[INFO] ------Alexa Rank SECTION------
429[INFO] Percent of Visitors Rank in Country:
430[INFO] Percent of Search Traffic:
431[INFO] Percent of Unique Visits:
432[INFO] Total Sites Linking In:
433[*] Total Sites
434[INFO] Useful links related to www.gesaguas.cl - 170.239.85.227:
435[*] https://www.virustotal.com/pt/ip-address/170.239.85.227/information/
436[*] https://www.hybrid-analysis.com/search?host=170.239.85.227
437[*] https://www.shodan.io/host/170.239.85.227
438[*] https://www.senderbase.org/lookup/?search_string=170.239.85.227
439[*] https://www.alienvault.com/open-threat-exchange/ip/170.239.85.227
440[*] http://pastebin.com/search?q=170.239.85.227
441[*] http://urlquery.net/search.php?q=170.239.85.227
442[*] http://www.alexa.com/siteinfo/www.gesaguas.cl
443[*] http://www.google.com/safebrowsing/diagnostic?site=www.gesaguas.cl
444[*] https://censys.io/ipv4/170.239.85.227
445[*] https://www.abuseipdb.com/check/170.239.85.227
446[*] https://urlscan.io/search/#170.239.85.227
447[*] https://github.com/search?q=170.239.85.227&type=Code
448[INFO] Useful links related to AS52368 - 170.239.84.0/22:
449[*] http://www.google.com/safebrowsing/diagnostic?site=AS:52368
450[*] https://www.senderbase.org/lookup/?search_string=170.239.84.0/22
451[*] http://bgp.he.net/AS52368
452[*] https://stat.ripe.net/AS52368
453[INFO] Date: 19/03/20 | Time: 12:58:46
454[INFO] Total time: 2 minute(s) and 18 second(s)
455################################################################################################################################
456Trying "gesaguas.cl"
457;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38148
458;; flags: qr rd ra; QUERY: 1, ANSWER: 12, AUTHORITY: 0, ADDITIONAL: 2
459
460;; QUESTION SECTION:
461;gesaguas.cl. IN ANY
462
463;; ANSWER SECTION:
464gesaguas.cl. 1 IN TXT "google-site-verification=1neJKsVYf4hCOOv9L-quMXph7OadxY5DYHZ7S8yl2ak"
465gesaguas.cl. 1 IN TXT "google-site-verification=zKiQL9R07PeM08dNqBCL7vWtCwxLit2GuA65GHfkT3w"
466gesaguas.cl. 1 IN TXT "D1416415"
467gesaguas.cl. 1800 IN SOA ns1.dns-premium.net. hostmaster.gesaguas.cl. 2020030303 28800 7200 604800 1800
468gesaguas.cl. 1 IN A 170.239.85.227
469gesaguas.cl. 1800 IN MX 10 ALT4.ASPMX.L.GOOGLE.COM.
470gesaguas.cl. 1800 IN MX 5 ALT1.ASPMX.L.GOOGLE.COM.
471gesaguas.cl. 1800 IN MX 1 ASPMX.L.GOOGLE.COM.
472gesaguas.cl. 1800 IN MX 10 ALT3.ASPMX.L.GOOGLE.COM.
473gesaguas.cl. 1800 IN MX 5 ALT2.ASPMX.L.GOOGLE.COM.
474gesaguas.cl. 1 IN NS ns1.dns-premium.net.
475gesaguas.cl. 1 IN NS ns2.dns-premium.net.
476
477;; ADDITIONAL SECTION:
478ns1.dns-premium.net. 42875 IN A 190.114.254.70
479ns2.dns-premium.net. 42875 IN A 186.64.112.62
480
481Received 476 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 518 ms
482################################################################################################################################
483; <<>> DiG 9.11.16-2-Debian <<>> +trace gesaguas.cl any
484;; global options: +cmd
485. 86400 IN NS m.root-servers.net.
486. 86400 IN NS b.root-servers.net.
487. 86400 IN NS c.root-servers.net.
488. 86400 IN NS d.root-servers.net.
489. 86400 IN NS e.root-servers.net.
490. 86400 IN NS f.root-servers.net.
491. 86400 IN NS g.root-servers.net.
492. 86400 IN NS h.root-servers.net.
493. 86400 IN NS a.root-servers.net.
494. 86400 IN NS i.root-servers.net.
495. 86400 IN NS j.root-servers.net.
496. 86400 IN NS k.root-servers.net.
497. 86400 IN NS l.root-servers.net.
498. 86400 IN RRSIG NS 8 0 518400 20200401050000 20200319040000 33853 . B3YXtn4NP7F4Mmz433w+D9K44DZZBZGg42mA3MiPA2BmABNBMMifiBIf 2HFQMlZgheM0MmYGP8ttqX4hrRVNBbEi8cJrKQCGKei3yNyDN97Hyb7v jaZHU1/JMo/tqohMHmneUjKSSotkyix9lmOC7r8CxdG10k3X0QY9/Z5J l38szvHxmroMv2i09ouE9ATWx7+heQtUObBpmlmTMbCb8dNERp+I4kVC NbyvXqiu/8JMuhtDHGWNw/yd97lyh2wCgJooDP2uLyPKBbBC3fLEzYet C/agaiSZYjVM+YJXH7FZVYjh3098wqJ3VHBgQ8Gz5/Dk/Gi13/lA3qxh ylhQ+w==
499;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 203 ms
500
501cl. 172800 IN NS cl1-tld.d-zone.ca.
502cl. 172800 IN NS c.nic.cl.
503cl. 172800 IN NS cl1.dnsnode.net.
504cl. 172800 IN NS cl2-tld.d-zone.ca.
505cl. 172800 IN NS cl-ns.anycast.pch.net.
506cl. 172800 IN NS a.nic.cl.
507cl. 172800 IN NS b.nic.cl.
508cl. 86400 IN DS 21199 8 2 7D756DFFAB6D3CD9C786FF5C659954C22944FAEF9433EEE26F1D84EB 5370B394
509cl. 86400 IN RRSIG DS 8 1 86400 20200401050000 20200319040000 33853 . J/bYw/wt6wrtEI6UY2Ai8GEvNGSuXnl3TBfOa1RXcAdNr4ddBEcNj3Zo p5sAaA4WQrnHkqYNIGR1w1e6VF6L86u939/e5An9Z8DROlqIEpUuTO/r mbjOrWCbwDBEddMy/S3m191LwvWdeqZ/D4SGj/GWLanN1MiUbOrUcV9z DDYFGAEcV01Cxt7uuvhzHMI6dtXjPAYmWW6qr3kYqUz419UWGmaLw1sw Fiv8x5i9UHb5FJ5DzdFeVkHs6ozRbtThrhMG0Rbk1lAUdYJz5beaFT/s vhXejaCD8uAapf0meevvdTMcqgJug86DbvsjSX5ffdvuV/g/5Z4lrePc 86Mb/Q==
510;; Received 849 bytes from 199.9.14.201#53(b.root-servers.net) in 163 ms
511
512gesaguas.cl. 3600 IN NS ns1.dns-premium.net.
513gesaguas.cl. 3600 IN NS ns2.dns-premium.net.
5144qbmv5hq44q4fc4c1lgef9shcmumlrg7.cl. 900 IN NSEC3 1 1 2 47C94D988D5BA14CC65BDA845F3CFDBE 4RPNA8P5NK73BDFKM8BVVOR3CAAL7V7E NS SOA TXT RRSIG DNSKEY NSEC3PARAM
5154qbmv5hq44q4fc4c1lgef9shcmumlrg7.cl. 900 IN RRSIG NSEC3 8 2 900 20200430094059 20200319160026 24384 cl. LhTEifbtcSN7Wem/O4j6RpelEKznBG8ADzd2tGmA6U4uQPuWquriNFcc 2rBBDOb+shZL8GMOb20ngpn89b6QiDsebHwlqdWapfut257bAWnojQdG TbOHx0TopFhbBWnx1wlMrLHqZacDxc/TtphjS35SuIY2lwPbOOvDGSXh z6Y=
516s1ljee7picd0mh2jpasn7jbk1g3rq99j.cl. 900 IN NSEC3 1 1 2 47C94D988D5BA14CC65BDA845F3CFDBE S79ROF7AK6E2IH9UHKEGVGSGUSJ7FO4I NS DS RRSIG
517s1ljee7picd0mh2jpasn7jbk1g3rq99j.cl. 900 IN RRSIG NSEC3 8 2 900 20200502190439 20200319160026 24384 cl. nlq3l2SByDW9uiJHOzxN9UIEAcGaIfooy4mqPRjZ3NXv0bPHWL+OLdzm 80l9J1RKtTZmrz09QtJ4aUFBFmne9E61zQsopsYGdJMPDpEaiwgzYFfM NWExzxertFUwBrEPeApw70GBk3+JWZT8xc5Z4eGp/eK7xVon7Yucwv+0 Ip8=
518;; Received 606 bytes from 200.7.4.7#53(b.nic.cl) in 156 ms
519
520gesaguas.cl. 1 IN A 170.239.85.227
521gesaguas.cl. 1 IN NS ns1.dns-premium.net.
522gesaguas.cl. 1 IN NS ns2.dns-premium.net.
523gesaguas.cl. 1800 IN SOA ns1.dns-premium.net. hostmaster.gesaguas.cl. 2020030303 28800 7200 604800 1800
524gesaguas.cl. 1800 IN MX 5 ALT1.ASPMX.L.GOOGLE.COM.
525gesaguas.cl. 1800 IN MX 5 ALT2.ASPMX.L.GOOGLE.COM.
526gesaguas.cl. 1800 IN MX 10 ALT3.ASPMX.L.GOOGLE.COM.
527gesaguas.cl. 1800 IN MX 10 ALT4.ASPMX.L.GOOGLE.COM.
528gesaguas.cl. 1800 IN MX 1 ASPMX.L.GOOGLE.COM.
529gesaguas.cl. 1 IN TXT "D1416415"
530gesaguas.cl. 1800 IN TXT "google-site-verification=1neJKsVYf4hCOOv9L-quMXph7OadxY5DYHZ7S8yl2ak"
531gesaguas.cl. 1800 IN TXT "google-site-verification=zKiQL9R07PeM08dNqBCL7vWtCwxLit2GuA65GHfkT3w"
532;; Received 519 bytes from 190.114.254.70#53(ns1.dns-premium.net) in 390 ms
533
534################################################################################################################################
535[*] Performing General Enumeration of Domain: gesaguas.cl
536[-] DNSSEC is not configured for gesaguas.cl
537[*] SOA ns1.dns-premium.net 190.114.254.70
538[*] NS ns2.dns-premium.net 186.64.112.62
539[*] Bind Version for 186.64.112.62 b'PowerDNS Authoritative Server 4.1.5 (built Nov 6 2018 18:33:05 by root@cca71ff9c6d2)'
540[*] NS ns1.dns-premium.net 190.114.254.70
541[*] Bind Version for 190.114.254.70 b'PowerDNS Authoritative Server 4.1.5 (built Nov 6 2018 18:33:05 by root@cca71ff9c6d2)'
542[*] MX ALT4.ASPMX.L.GOOGLE.COM 74.125.28.27
543[*] MX ALT3.ASPMX.L.GOOGLE.COM 108.177.97.26
544[*] MX ASPMX.L.GOOGLE.COM 172.253.120.26
545[*] MX ALT1.ASPMX.L.GOOGLE.COM 209.85.233.26
546[*] MX ALT2.ASPMX.L.GOOGLE.COM 142.250.4.26
547[*] MX ALT4.ASPMX.L.GOOGLE.COM 2607:f8b0:400e:c04::1a
548[*] MX ALT3.ASPMX.L.GOOGLE.COM 2404:6800:4008:c00::1a
549[*] MX ASPMX.L.GOOGLE.COM 2a00:1450:400c:c0a::1a
550[*] MX ALT1.ASPMX.L.GOOGLE.COM 2a00:1450:4010:c03::1a
551[*] MX ALT2.ASPMX.L.GOOGLE.COM 2404:6800:4003:c06::1b
552[*] A gesaguas.cl 170.239.85.227
553[*] Enumerating SRV Records
554[-] No SRV Records Found for gesaguas.cl
555[+] 0 Records Found
556##################################################################################################################################
557 AVAILABLE PLUGINS
558 -----------------
559
560 SessionRenegotiationPlugin
561 SessionResumptionPlugin
562 CompressionPlugin
563 OpenSslCipherSuitesPlugin
564 CertificateInfoPlugin
565 FallbackScsvPlugin
566 HttpHeadersPlugin
567 EarlyDataPlugin
568 OpenSslCcsInjectionPlugin
569 RobotPlugin
570 HeartbleedPlugin
571
572
573
574 CHECKING HOST(S) AVAILABILITY
575 -----------------------------
576
577 170.239.85.227:443 => 170.239.85.227
578
579
580
581
582 SCAN RESULTS FOR 170.239.85.227:443 - 170.239.85.227
583 ----------------------------------------------------
584
585 * TLSV1_3 Cipher Suites:
586 Server rejected all cipher suites.
587
588 * TLS 1.2 Session Resumption Support:
589 With Session IDs: NOT SUPPORTED (0 successful, 5 failed, 0 errors, 5 total attempts).
590 With TLS Tickets: OK - Supported
591
592 * Session Renegotiation:
593 Client-initiated Renegotiation: VULNERABLE - Server honors client-initiated renegotiations
594 Secure Renegotiation: OK - Supported
595
596 * Deflate Compression:
597 OK - Compression disabled
598
599 * TLSV1_2 Cipher Suites:
600 Forward Secrecy OK - Supported
601 RC4 OK - Not Supported
602
603 Preferred:
604 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
605 Accepted:
606 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
607 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
608 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
609 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
610 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
611 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
612 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 256 bits HTTP 200 OK
613 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
614 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 200 OK
615 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
616 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
617 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
618 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
619 RSA_WITH_AES_256_CCM_8 256 bits HTTP 200 OK
620 RSA_WITH_AES_256_CCM 256 bits HTTP 200 OK
621 RSA_WITH_AES_128_CCM_8 128 bits HTTP 200 OK
622 RSA_WITH_AES_128_CCM 128 bits HTTP 200 OK
623 ECDHE-ARIA256-GCM-SHA384 256 bits HTTP 200 OK
624 ECDHE-ARIA128-GCM-SHA256 128 bits HTTP 200 OK
625 ARIA256-GCM-SHA384 256 bits HTTP 200 OK
626 ARIA128-GCM-SHA256 128 bits HTTP 200 OK
627
628 * TLSV1_1 Cipher Suites:
629 Forward Secrecy OK - Supported
630 RC4 OK - Not Supported
631
632 Preferred:
633 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
634 Accepted:
635 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
636 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
637 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
638 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
639
640 * Certificate Information:
641 Content
642 SHA1 Fingerprint: 9225764b7a4501cf8a014e9279632054b2c26ac2
643 Common Name: gesaguas.cl
644 Issuer: Let's Encrypt Authority X3
645 Serial Number: 270096439646944772939339068824127205409866
646 Not Before: 2020-03-03 16:24:43
647 Not After: 2020-06-01 16:24:43
648 Signature Algorithm: sha256
649 Public Key Algorithm: RSA
650 Key Size: 2048
651 Exponent: 65537 (0x10001)
652 DNS Subject Alternative Names: ['gesaguas.cl', 'www.gesaguas.cl']
653
654 Trust
655 Hostname Validation: FAILED - Certificate does NOT match 170.239.85.227
656 Android CA Store (9.0.0_r9): OK - Certificate is trusted
657 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
658 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
659 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
660 Windows CA Store (2019-05-27): OK - Certificate is trusted
661 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
662 Received Chain: gesaguas.cl --> Let's Encrypt Authority X3
663 Verified Chain: gesaguas.cl --> Let's Encrypt Authority X3 --> DST Root CA X3
664 Received Chain Contains Anchor: OK - Anchor certificate not sent
665 Received Chain Order: OK - Order is valid
666 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
667
668 Extensions
669 OCSP Must-Staple: NOT SUPPORTED - Extension not found
670 Certificate Transparency: WARNING - Only 2 SCTs included but Google recommends 3 or more
671
672 OCSP Stapling
673 NOT SUPPORTED - Server did not send back an OCSP response
674
675 * Downgrade Attacks:
676 TLS_FALLBACK_SCSV: OK - Supported
677
678 * OpenSSL Heartbleed:
679 OK - Not vulnerable to Heartbleed
680
681 * ROBOT Attack:
682 OK - Not vulnerable
683
684 * OpenSSL CCS Injection:
685 OK - Not vulnerable to OpenSSL CCS injection
686
687 * SSLV2 Cipher Suites:
688 Server rejected all cipher suites.
689
690 * SSLV3 Cipher Suites:
691 Server rejected all cipher suites.
692
693 * TLSV1 Cipher Suites:
694 Forward Secrecy OK - Supported
695 RC4 OK - Not Supported
696
697 Preferred:
698 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
699 Accepted:
700 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
701 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
702 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
703 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
704
705
706 SCAN COMPLETED IN 38.60 S
707 -------------------------
708################################################################################################################################
709traceroute to www.gesaguas.cl (170.239.85.227), 30 hops max, 60 byte packets
710 1 _gateway (10.203.19.1) 126.441 ms 131.319 ms 131.317 ms
711 2 * * *
712 3 te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49) 131.856 ms 131.847 ms 131.815 ms
713 4 be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249) 131.625 ms 131.622 ms 131.605 ms
714 5 be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190) 138.489 ms 138.497 ms 137.542 ms
715 6 be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105) 159.153 ms 153.402 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1) 158.182 ms
716 7 be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209) 166.753 ms 163.291 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205) 166.963 ms
717 8 be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41) 253.629 ms be12194.ccr41.lon13.atlas.cogentco.com (154.54.56.93) 256.608 ms 256.616 ms
718 9 be12497.ccr41.par01.atlas.cogentco.com (154.54.56.130) 259.835 ms be12489.ccr42.par01.atlas.cogentco.com (154.54.57.70) 255.262 ms 256.851 ms
71910 be2318.ccr32.bio02.atlas.cogentco.com (154.54.61.117) 254.887 ms be3627.ccr41.jfk02.atlas.cogentco.com (66.28.4.197) 254.895 ms be2315.ccr31.bio02.atlas.cogentco.com (154.54.61.113) 249.017 ms
72011 be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106) 248.845 ms 244.543 ms 247.087 ms
72112 be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158) 258.852 ms 253.818 ms be3084.ccr42.dca01.atlas.cogentco.com (154.54.30.65) 248.329 ms
72213 be3482.ccr21.mia01.atlas.cogentco.com (154.54.24.146) 274.274 ms be3483.ccr22.mia01.atlas.cogentco.com (154.54.28.50) 272.783 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222) 259.694 ms
72314 be3483.ccr22.mia01.atlas.cogentco.com (154.54.28.50) 272.692 ms 272.361 ms be3401.ccr21.mia03.atlas.cogentco.com (154.54.47.30) 274.645 ms
72415 be3401.ccr21.mia03.atlas.cogentco.com (154.54.47.30) 275.140 ms hu0-4-0-4.ccr21.mia03.atlas.cogentco.com (38.88.164.113) 275.531 ms 280.237 ms
72516 hu0-4-0-4.ccr21.mia03.atlas.cogentco.com (38.88.164.113) 277.479 ms * 277.797 ms
72617 * 190.211.161.122 (190.211.161.122) 388.723 ms 387.309 ms
72718 * 190.211.161.122 (190.211.161.122) 397.806 ms 397.796 ms
72819 gesaguas.cl (170.239.85.227) 389.938 ms 389.452 ms 388.654 ms
729#################################################################################################################################
730Domains still to check: 1
731 Checking if the hostname gesaguas.cl. given is in fact a domain...
732
733Analyzing domain: gesaguas.cl.
734 Checking NameServers using system default resolver...
735 IP: 186.64.112.62 (Chile)
736 HostName: ns2.dns-premium.net Type: NS
737 IP: 190.114.254.70 (Chile)
738 HostName: ns1.dns-premium.net Type: NS
739
740 Checking MailServers using system default resolver...
741 IP: 74.125.28.27 (United States)
742 HostName: ALT4.ASPMX.L.GOOGLE.COM Type: MX
743 HostName: pc-in-f27.1e100.net Type: PTR
744 IP: 108.177.97.27 (United States)
745 HostName: ALT3.ASPMX.L.GOOGLE.COM Type: MX
746 HostName: tm-in-f27.1e100.net Type: PTR
747 IP: 66.102.1.26 (United States)
748 HostName: ASPMX.L.GOOGLE.COM Type: MX
749 HostName: wb-in-f26.1e100.net Type: PTR
750 IP: 209.85.233.26 (United States)
751 HostName: ALT1.ASPMX.L.GOOGLE.COM Type: MX
752 HostName: lr-in-f26.1e100.net Type: PTR
753 IP: 142.250.4.26 (United States)
754 HostName: ALT2.ASPMX.L.GOOGLE.COM Type: MX
755
756 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
757 No zone transfer found on nameserver 190.114.254.70
758 No zone transfer found on nameserver 186.64.112.62
759
760 Checking SPF record...
761
762 Checking 192 most common hostnames using system default resolver...
763 IP: 170.239.85.227 (Chile)
764 HostName: www.gesaguas.cl. Type: A
765
766 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
767 Checking netblock 170.239.85.0
768 Checking netblock 66.102.1.0
769 Checking netblock 190.114.254.0
770 Checking netblock 142.250.4.0
771 Checking netblock 74.125.28.0
772 Checking netblock 108.177.97.0
773 Checking netblock 186.64.112.0
774 Checking netblock 209.85.233.0
775
776 Searching for gesaguas.cl. emails in Google
777 contacto@gesaguas.cl
778
779 Checking 8 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
780 Host 170.239.85.227 is up (syn-ack ttl 45)
781 Host 66.102.1.26 is up (syn-ack ttl 101)
782 Host 190.114.254.70 is up (reset ttl 45)
783 Host 142.250.4.26 is up (syn-ack ttl 94)
784 Host 74.125.28.27 is up (echo-reply ttl 32)
785 Host 108.177.97.27 is up (syn-ack ttl 95)
786 Host 186.64.112.62 is up (echo-reply ttl 45)
787 Host 209.85.233.26 is up (syn-ack ttl 104)
788
789 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
790 Scanning ip 170.239.85.227 (www.gesaguas.cl.):
791 80/tcp open http syn-ack ttl 45
792 | fingerprint-strings:
793 | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, X11Probe:
794 | HTTP/1.1 400 Bad Request
795 | Connection: close
796 | FourOhFourRequest:
797 | HTTP/1.1 301 Moved Permanently
798 | Location: https://undefined/nice%20ports%2C/Tri%6Eity.txt%2ebak
799 | Date: Thu, 19 Mar 2020 17:09:09 GMT
800 | Connection: close
801 | GetRequest:
802 | HTTP/1.1 301 Moved Permanently
803 | Location: https://undefined/
804 | Date: Thu, 19 Mar 2020 17:09:05 GMT
805 | Connection: close
806 | HTTPOptions:
807 | HTTP/1.1 301 Moved Permanently
808 | Location: https://undefined/
809 | Date: Thu, 19 Mar 2020 17:09:07 GMT
810 |_ Connection: close
811 | http-methods:
812 |_ Supported Methods: GET HEAD POST OPTIONS
813 |_http-title: Did not follow redirect to https://170.239.85.227/
814 443/tcp open ssl/http syn-ack ttl 45 Node.js Express framework
815 | ssl-cert: Subject: commonName=gesaguas.cl
816 | Subject Alternative Name: DNS:gesaguas.cl, DNS:www.gesaguas.cl
817 | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
818 | Public Key type: rsa
819 | Public Key bits: 2048
820 | Signature Algorithm: sha256WithRSAEncryption
821 | Not valid before: 2020-03-03T16:24:43
822 | Not valid after: 2020-06-01T16:24:43
823 | MD5: bb44 79ac beb1 c0e0 c92d 687c 5a51 1151
824 |_SHA-1: 9225 764b 7a45 01cf 8a01 4e92 7963 2054 b2c2 6ac2
825 |_ssl-date: TLS randomness does not represent time
826 | tls-alpn:
827 |_ http/1.1
828 3306/tcp open mysql syn-ack ttl 45 MySQL 5.5.62-0ubuntu0.14.04.1
829 | mysql-info:
830 | Protocol: 10
831 | Version: 5.5.62-0ubuntu0.14.04.1
832 | Thread ID: 87994
833 | Capabilities flags: 63487
834 | Some Capabilities: SupportsCompression, Support41Auth, LongPassword, ODBCClient, Speaks41ProtocolNew, SupportsLoadDataLocal, ConnectWithDatabase, LongColumnFlag, SupportsTransactions, IgnoreSigpipes, InteractiveClient, IgnoreSpaceBeforeParenthesis, FoundRows, DontAllowDatabaseTableColumn, Speaks41ProtocolOld, SupportsAuthPlugins, SupportsMultipleStatments, SupportsMultipleResults
835 | Status: Autocommit
836 | Salt: J|P]bT_`Cmz@n*#n%g\w
837 |_ Auth Plugin Name: mysql_native_password
838 Scanning ip 66.102.1.26 (wb-in-f26.1e100.net (PTR)):
839 25/tcp open smtp syn-ack ttl 101 Google gsmtp
840 | smtp-commands: mx.google.com at your service, [45.132.192.69], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
841 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 r2si2760906wrj.424 - gsmtp
842 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
843 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
844 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
845 | Public Key type: rsa
846 | Public Key bits: 2048
847 | Signature Algorithm: sha256WithRSAEncryption
848 | Not valid before: 2020-03-03T09:44:15
849 | Not valid after: 2020-05-26T09:44:15
850 | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
851 |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
852 |_ssl-date: 2020-03-19T17:10:22+00:00; -6s from scanner time.
853 OS Info: Service Info: Host: mx.google.com
854 |_clock-skew: -6s
855 Scanning ip 190.114.254.70 (ns1.dns-premium.net):
856 53/tcp open domain syn-ack ttl 45 PowerDNS Authoritative Server 4.1.5
857 | dns-nsid:
858 | NSID: serverdns1.dns-premium.net (736572766572646e73312e646e732d7072656d69756d2e6e6574)
859 | id.server: serverdns1.dns-premium.net
860 |_ bind.version: PowerDNS Authoritative Server 4.1.5 (built Nov 6 2018 18:33:05 by root@cca71ff9c6d2)
861 80/tcp open http syn-ack ttl 45 Apache httpd 2.2.15 ((CentOS))
862 | http-methods:
863 | Supported Methods: GET HEAD POST OPTIONS TRACE
864 |_ Potentially risky methods: TRACE
865 |_http-server-header: Apache/2.2.15 (CentOS)
866 |_http-title: Apache HTTP Server Test Page powered by CentOS
867 3306/tcp open mysql syn-ack ttl 45 MySQL 5.1.73-log
868 | mysql-info:
869 | Protocol: 10
870 | Version: 5.1.73-log
871 | Thread ID: 32755
872 | Capabilities flags: 63487
873 | Some Capabilities: Support41Auth, Speaks41ProtocolOld, SupportsTransactions, ConnectWithDatabase, ODBCClient, IgnoreSigpipes, DontAllowDatabaseTableColumn, IgnoreSpaceBeforeParenthesis, FoundRows, Speaks41ProtocolNew, SupportsCompression, SupportsLoadDataLocal, LongColumnFlag, LongPassword, InteractiveClient
874 | Status: Autocommit
875 |_ Salt: 'o}G(3g0WF9,l^q@(Hq"
876 8081/tcp open tcpwrapped syn-ack ttl 45
877 Scanning ip 142.250.4.26 (ALT2.ASPMX.L.GOOGLE.COM):
878 25/tcp open smtp syn-ack ttl 94 Google gsmtp
879 | smtp-commands: mx.google.com at your service, [45.132.192.69], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
880 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 y4si2421834plr.369 - gsmtp
881 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
882 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
883 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
884 | Public Key type: rsa
885 | Public Key bits: 2048
886 | Signature Algorithm: sha256WithRSAEncryption
887 | Not valid before: 2020-02-25T20:43:24
888 | Not valid after: 2020-05-19T20:43:24
889 | MD5: 2738 1c01 ccd8 4e62 f9b3 08d1 1fea ba05
890 |_SHA-1: 320e ca4f 2b8b 89e9 4ed0 1f65 f18d d1c6 8b14 d0b3
891 |_ssl-date: 2020-03-19T17:11:30+00:00; -6s from scanner time.
892 OS Info: Service Info: Host: mx.google.com
893 |_clock-skew: -6s
894 Scanning ip 74.125.28.27 (pc-in-f27.1e100.net (PTR)):
895 25/tcp open smtp syn-ack ttl 96 Google gsmtp
896 | smtp-commands: mx.google.com at your service, [45.132.192.69], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
897 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 f5si2293476plo.39 - gsmtp
898 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
899 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
900 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
901 | Public Key type: rsa
902 | Public Key bits: 2048
903 | Signature Algorithm: sha256WithRSAEncryption
904 | Not valid before: 2020-03-03T09:44:15
905 | Not valid after: 2020-05-26T09:44:15
906 | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
907 |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
908 |_ssl-date: 2020-03-19T17:11:54+00:00; -6s from scanner time.
909 OS Info: Service Info: Host: mx.google.com
910 |_clock-skew: -6s
911 Scanning ip 108.177.97.27 (tm-in-f27.1e100.net (PTR)):
912 25/tcp open smtp syn-ack ttl 94 Google gsmtp
913 | smtp-commands: mx.google.com at your service, [45.132.192.69], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
914 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 g70si2187511pje.118 - gsmtp
915 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
916 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
917 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
918 | Public Key type: rsa
919 | Public Key bits: 2048
920 | Signature Algorithm: sha256WithRSAEncryption
921 | Not valid before: 2020-03-03T09:44:15
922 | Not valid after: 2020-05-26T09:44:15
923 | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
924 |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
925 |_ssl-date: 2020-03-19T17:12:24+00:00; -6s from scanner time.
926 OS Info: Service Info: Host: mx.google.com
927 |_clock-skew: -6s
928 Scanning ip 186.64.112.62 (ns2.dns-premium.net):
929 53/tcp open domain syn-ack ttl 45 PowerDNS Authoritative Server 4.1.5
930 | dns-nsid:
931 | NSID: serverdns2.dns-premium.net (736572766572646e73322e646e732d7072656d69756d2e6e6574)
932 | id.server: serverdns2.dns-premium.net
933 |_ bind.version: PowerDNS Authoritative Server 4.1.5 (built Nov 6 2018 18:33:05 by root@cca71ff9c6d2)
934 Scanning ip 209.85.233.26 (lr-in-f26.1e100.net (PTR)):
935 25/tcp open smtp syn-ack ttl 103 Google gsmtp
936 | smtp-commands: mx.google.com at your service, [45.132.192.69], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
937 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 w29si2152273lfq.18 - gsmtp
938 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
939 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
940 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
941 | Public Key type: rsa
942 | Public Key bits: 2048
943 | Signature Algorithm: sha256WithRSAEncryption
944 | Not valid before: 2020-03-03T09:44:15
945 | Not valid after: 2020-05-26T09:44:15
946 | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
947 |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
948 |_ssl-date: 2020-03-19T17:13:15+00:00; -6s from scanner time.
949 OS Info: Service Info: Host: mx.google.com
950 |_clock-skew: -6s
951 WebCrawling domain's web servers... up to 50 max links.
952
953 + URL to crawl: http://www.gesaguas.cl.
954 + Date: 2020-03-19
955
956 + Crawling URL: http://www.gesaguas.cl.:
957 + Links:
958 + Crawling http://www.gesaguas.cl.
959 + Searching for directories...
960 + Searching open folders...
961
962
963 + URL to crawl: https://www.gesaguas.cl.
964 + Date: 2020-03-19
965
966 + Crawling URL: https://www.gesaguas.cl.:
967 + Links:
968 + Crawling https://www.gesaguas.cl.
969 + Searching for directories...
970 + Searching open folders...
971
972
973 + URL to crawl: http://ns1.dns-premium.net
974 + Date: 2020-03-19
975
976 + Crawling URL: http://ns1.dns-premium.net:
977 + Links:
978 + Crawling http://ns1.dns-premium.net (403 Forbidden)
979 + Searching for directories...
980 + Searching open folders...
981
982--Finished--
983Summary information for domain gesaguas.cl.
984-----------------------------------------
985 Domain Specific Information:
986 Email: contacto@gesaguas.cl
987
988 Domain Ips Information:
989 IP: 170.239.85.227
990 HostName: www.gesaguas.cl. Type: A
991 Country: Chile
992 Is Active: True (syn-ack ttl 45)
993 Port: 80/tcp open http syn-ack ttl 45
994 Script Info: | fingerprint-strings:
995 Script Info: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, X11Probe:
996 Script Info: | HTTP/1.1 400 Bad Request
997 Script Info: | Connection: close
998 Script Info: | FourOhFourRequest:
999 Script Info: | HTTP/1.1 301 Moved Permanently
1000 Script Info: | Location: https://undefined/nice%20ports%2C/Tri%6Eity.txt%2ebak
1001 Script Info: | Date: Thu, 19 Mar 2020 17:09:09 GMT
1002 Script Info: | Connection: close
1003 Script Info: | GetRequest:
1004 Script Info: | HTTP/1.1 301 Moved Permanently
1005 Script Info: | Location: https://undefined/
1006 Script Info: | Date: Thu, 19 Mar 2020 17:09:05 GMT
1007 Script Info: | Connection: close
1008 Script Info: | HTTPOptions:
1009 Script Info: | HTTP/1.1 301 Moved Permanently
1010 Script Info: | Location: https://undefined/
1011 Script Info: | Date: Thu, 19 Mar 2020 17:09:07 GMT
1012 Script Info: |_ Connection: close
1013 Script Info: | http-methods:
1014 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1015 Script Info: |_http-title: Did not follow redirect to https://170.239.85.227/
1016 Port: 443/tcp open ssl/http syn-ack ttl 45 Node.js Express framework
1017 Script Info: | ssl-cert: Subject: commonName=gesaguas.cl
1018 Script Info: | Subject Alternative Name: DNS:gesaguas.cl, DNS:www.gesaguas.cl
1019 Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
1020 Script Info: | Public Key type: rsa
1021 Script Info: | Public Key bits: 2048
1022 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1023 Script Info: | Not valid before: 2020-03-03T16:24:43
1024 Script Info: | Not valid after: 2020-06-01T16:24:43
1025 Script Info: | MD5: bb44 79ac beb1 c0e0 c92d 687c 5a51 1151
1026 Script Info: |_SHA-1: 9225 764b 7a45 01cf 8a01 4e92 7963 2054 b2c2 6ac2
1027 Script Info: |_ssl-date: TLS randomness does not represent time
1028 Script Info: | tls-alpn:
1029 Script Info: |_ http/1.1
1030 Port: 3306/tcp open mysql syn-ack ttl 45 MySQL 5.5.62-0ubuntu0.14.04.1
1031 Script Info: | mysql-info:
1032 Script Info: | Protocol: 10
1033 Script Info: | Version: 5.5.62-0ubuntu0.14.04.1
1034 Script Info: | Thread ID: 87994
1035 Script Info: | Capabilities flags: 63487
1036 Script Info: | Some Capabilities: SupportsCompression, Support41Auth, LongPassword, ODBCClient, Speaks41ProtocolNew, SupportsLoadDataLocal, ConnectWithDatabase, LongColumnFlag, SupportsTransactions, IgnoreSigpipes, InteractiveClient, IgnoreSpaceBeforeParenthesis, FoundRows, DontAllowDatabaseTableColumn, Speaks41ProtocolOld, SupportsAuthPlugins, SupportsMultipleStatments, SupportsMultipleResults
1037 Script Info: | Status: Autocommit
1038 Script Info: | Salt: J|P]bT_`Cmz@n*#n%g\w
1039 Script Info: |_ Auth Plugin Name: mysql_native_password
1040 IP: 66.102.1.26
1041 HostName: ASPMX.L.GOOGLE.COM Type: MX
1042 HostName: wb-in-f26.1e100.net Type: PTR
1043 Country: United States
1044 Is Active: True (syn-ack ttl 101)
1045 Port: 25/tcp open smtp syn-ack ttl 101 Google gsmtp
1046 Script Info: | smtp-commands: mx.google.com at your service, [45.132.192.69], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1047 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 r2si2760906wrj.424 - gsmtp
1048 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1049 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1050 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1051 Script Info: | Public Key type: rsa
1052 Script Info: | Public Key bits: 2048
1053 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1054 Script Info: | Not valid before: 2020-03-03T09:44:15
1055 Script Info: | Not valid after: 2020-05-26T09:44:15
1056 Script Info: | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1057 Script Info: |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1058 Script Info: |_ssl-date: 2020-03-19T17:10:22+00:00; -6s from scanner time.
1059 Os Info: Host: mx.google.com
1060 Script Info: |_clock-skew: -6s
1061 IP: 190.114.254.70
1062 HostName: ns1.dns-premium.net Type: NS
1063 Country: Chile
1064 Is Active: True (reset ttl 45)
1065 Port: 53/tcp open domain syn-ack ttl 45 PowerDNS Authoritative Server 4.1.5
1066 Script Info: | dns-nsid:
1067 Script Info: | NSID: serverdns1.dns-premium.net (736572766572646e73312e646e732d7072656d69756d2e6e6574)
1068 Script Info: | id.server: serverdns1.dns-premium.net
1069 Script Info: |_ bind.version: PowerDNS Authoritative Server 4.1.5 (built Nov 6 2018 18:33:05 by root@cca71ff9c6d2)
1070 Port: 80/tcp open http syn-ack ttl 45 Apache httpd 2.2.15 ((CentOS))
1071 Script Info: | http-methods:
1072 Script Info: | Supported Methods: GET HEAD POST OPTIONS TRACE
1073 Script Info: |_ Potentially risky methods: TRACE
1074 Script Info: |_http-server-header: Apache/2.2.15 (CentOS)
1075 Script Info: |_http-title: Apache HTTP Server Test Page powered by CentOS
1076 Port: 3306/tcp open mysql syn-ack ttl 45 MySQL 5.1.73-log
1077 Script Info: | mysql-info:
1078 Script Info: | Protocol: 10
1079 Script Info: | Version: 5.1.73-log
1080 Script Info: | Thread ID: 32755
1081 Script Info: | Capabilities flags: 63487
1082 Script Info: | Some Capabilities: Support41Auth, Speaks41ProtocolOld, SupportsTransactions, ConnectWithDatabase, ODBCClient, IgnoreSigpipes, DontAllowDatabaseTableColumn, IgnoreSpaceBeforeParenthesis, FoundRows, Speaks41ProtocolNew, SupportsCompression, SupportsLoadDataLocal, LongColumnFlag, LongPassword, InteractiveClient
1083 Script Info: | Status: Autocommit
1084 Script Info: |_ Salt: 'o}G(3g0WF9,l^q@(Hq"
1085 Port: 8081/tcp open tcpwrapped syn-ack ttl 45
1086 IP: 142.250.4.26
1087 HostName: ALT2.ASPMX.L.GOOGLE.COM Type: MX
1088 Country: United States
1089 Is Active: True (syn-ack ttl 94)
1090 Port: 25/tcp open smtp syn-ack ttl 94 Google gsmtp
1091 Script Info: | smtp-commands: mx.google.com at your service, [45.132.192.69], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1092 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 y4si2421834plr.369 - gsmtp
1093 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1094 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1095 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1096 Script Info: | Public Key type: rsa
1097 Script Info: | Public Key bits: 2048
1098 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1099 Script Info: | Not valid before: 2020-02-25T20:43:24
1100 Script Info: | Not valid after: 2020-05-19T20:43:24
1101 Script Info: | MD5: 2738 1c01 ccd8 4e62 f9b3 08d1 1fea ba05
1102 Script Info: |_SHA-1: 320e ca4f 2b8b 89e9 4ed0 1f65 f18d d1c6 8b14 d0b3
1103 Script Info: |_ssl-date: 2020-03-19T17:11:30+00:00; -6s from scanner time.
1104 Os Info: Host: mx.google.com
1105 Script Info: |_clock-skew: -6s
1106 IP: 74.125.28.27
1107 HostName: ALT4.ASPMX.L.GOOGLE.COM Type: MX
1108 HostName: pc-in-f27.1e100.net Type: PTR
1109 Country: United States
1110 Is Active: True (echo-reply ttl 32)
1111 Port: 25/tcp open smtp syn-ack ttl 96 Google gsmtp
1112 Script Info: | smtp-commands: mx.google.com at your service, [45.132.192.69], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1113 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 f5si2293476plo.39 - gsmtp
1114 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1115 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1116 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1117 Script Info: | Public Key type: rsa
1118 Script Info: | Public Key bits: 2048
1119 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1120 Script Info: | Not valid before: 2020-03-03T09:44:15
1121 Script Info: | Not valid after: 2020-05-26T09:44:15
1122 Script Info: | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1123 Script Info: |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1124 Script Info: |_ssl-date: 2020-03-19T17:11:54+00:00; -6s from scanner time.
1125 Os Info: Host: mx.google.com
1126 Script Info: |_clock-skew: -6s
1127 IP: 108.177.97.27
1128 HostName: ALT3.ASPMX.L.GOOGLE.COM Type: MX
1129 HostName: tm-in-f27.1e100.net Type: PTR
1130 Country: United States
1131 Is Active: True (syn-ack ttl 95)
1132 Port: 25/tcp open smtp syn-ack ttl 94 Google gsmtp
1133 Script Info: | smtp-commands: mx.google.com at your service, [45.132.192.69], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1134 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 g70si2187511pje.118 - gsmtp
1135 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1136 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1137 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1138 Script Info: | Public Key type: rsa
1139 Script Info: | Public Key bits: 2048
1140 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1141 Script Info: | Not valid before: 2020-03-03T09:44:15
1142 Script Info: | Not valid after: 2020-05-26T09:44:15
1143 Script Info: | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1144 Script Info: |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1145 Script Info: |_ssl-date: 2020-03-19T17:12:24+00:00; -6s from scanner time.
1146 Os Info: Host: mx.google.com
1147 Script Info: |_clock-skew: -6s
1148 IP: 186.64.112.62
1149 HostName: ns2.dns-premium.net Type: NS
1150 Country: Chile
1151 Is Active: True (echo-reply ttl 45)
1152 Port: 53/tcp open domain syn-ack ttl 45 PowerDNS Authoritative Server 4.1.5
1153 Script Info: | dns-nsid:
1154 Script Info: | NSID: serverdns2.dns-premium.net (736572766572646e73322e646e732d7072656d69756d2e6e6574)
1155 Script Info: | id.server: serverdns2.dns-premium.net
1156 Script Info: |_ bind.version: PowerDNS Authoritative Server 4.1.5 (built Nov 6 2018 18:33:05 by root@cca71ff9c6d2)
1157 IP: 209.85.233.26
1158 HostName: ALT1.ASPMX.L.GOOGLE.COM Type: MX
1159 HostName: lr-in-f26.1e100.net Type: PTR
1160 Country: United States
1161 Is Active: True (syn-ack ttl 104)
1162 Port: 25/tcp open smtp syn-ack ttl 103 Google gsmtp
1163 Script Info: | smtp-commands: mx.google.com at your service, [45.132.192.69], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1164 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 w29si2152273lfq.18 - gsmtp
1165 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1166 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1167 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1168 Script Info: | Public Key type: rsa
1169 Script Info: | Public Key bits: 2048
1170 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1171 Script Info: | Not valid before: 2020-03-03T09:44:15
1172 Script Info: | Not valid after: 2020-05-26T09:44:15
1173 Script Info: | MD5: 1f3b aa05 371a c6f3 c9d0 34e5 9552 5f3d
1174 Script Info: |_SHA-1: 5757 7e80 a473 2c66 ff13 20bc 4fec 1957 9ce7 8009
1175 Script Info: |_ssl-date: 2020-03-19T17:13:15+00:00; -6s from scanner time.
1176 Os Info: Host: mx.google.com
1177 Script Info: |_clock-skew: -6s
1178
1179--------------End Summary --------------
1180-----------------------------------------
1181################################################################################################################################
1182----- gesaguas.cl -----
1183
1184
1185Host's addresses:
1186__________________
1187
1188gesaguas.cl. 1 IN A 170.239.85.227
1189
1190
1191Name Servers:
1192______________
1193
1194ns1.dns-premium.net. 13272 IN A 190.114.254.70
1195ns2.dns-premium.net. 13272 IN A 186.64.112.62
1196
1197
1198Mail (MX) Servers:
1199___________________
1200
1201ALT3.ASPMX.L.GOOGLE.COM. 15 IN A 108.177.97.27
1202ASPMX.L.GOOGLE.COM. 293 IN A 108.177.15.27
1203ALT4.ASPMX.L.GOOGLE.COM. 293 IN A 74.125.28.27
1204ALT1.ASPMX.L.GOOGLE.COM. 293 IN A 209.85.233.27
1205ALT2.ASPMX.L.GOOGLE.COM. 293 IN A 142.250.4.27
1206
1207
1208Trying Zone Transfers and getting Bind Versions:
1209_________________________________________________
1210
1211
1212Trying Zone Transfer for gesaguas.cl on ns1.dns-premium.net ...
1213AXFR record query failed: NOTAUTH
1214
1215Trying Zone Transfer for gesaguas.cl on ns2.dns-premium.net ...
1216AXFR record query failed: NOTAUTH
1217
1218
1219Scraping gesaguas.cl subdomains from Google:
1220_____________________________________________
1221
1222
1223 ---- Google search page: 1 ----
1224
1225
1226 ---- Google search page: 2 ----
1227
1228
1229 ---- Google search page: 3 ----
1230
1231
1232 ---- Google search page: 4 ----
1233
1234
1235
1236Google Results:
1237________________
1238
1239 perhaps Google is blocking our queries.
1240 Check manually.
1241
1242
1243Brute forcing with /usr/share/dnsenum/dns.txt:
1244_______________________________________________
1245
1246www.gesaguas.cl. 537 IN CNAME gesaguas.cl.
1247gesaguas.cl. 1 IN A 170.239.85.227
1248
1249
1250Launching Whois Queries:
1251_________________________
1252
1253 whois ip result: 170.239.85.0 -> 170.239.84.0/22
1254
1255
1256gesaguas.cl___________
1257
1258 170.239.84.0/22
1259#################################################################################################################################
1260dnsenum VERSION:1.2.6
1261
1262----- www.gesaguas.cl -----
1263
1264
1265Host's addresses:
1266__________________
1267
1268gesaguas.cl. 0 IN A 170.239.85.227
1269
1270
1271Name Servers:
1272______________
1273
1274ns2.dns-premium.net. 13638 IN A 186.64.112.62
1275ns1.dns-premium.net. 13638 IN A 190.114.254.70
1276
1277
1278Mail (MX) Servers:
1279___________________
1280
1281ALT4.ASPMX.L.GOOGLE.COM. 293 IN A 74.125.28.27
1282ALT3.ASPMX.L.GOOGLE.COM. 293 IN A 108.177.97.26
1283ASPMX.L.GOOGLE.COM. 293 IN A 74.125.140.26
1284ALT1.ASPMX.L.GOOGLE.COM. 293 IN A 209.85.233.26
1285ALT2.ASPMX.L.GOOGLE.COM. 293 IN A 142.250.4.26
1286
1287
1288Trying Zone Transfers and getting Bind Versions:
1289_________________________________________________
1290
1291
1292Trying Zone Transfer for www.gesaguas.cl on ns2.dns-premium.net ...
1293
1294Trying Zone Transfer for www.gesaguas.cl on ns1.dns-premium.net ...
1295
1296
1297Brute forcing with /usr/share/sniper/wordlists/vhosts.txt:
1298___________________________________________________________
1299
1300
1301
1302www.gesaguas.cl class C netranges:
1303___________________________________
1304
1305
1306
1307www.gesaguas.cl ip blocks:
1308___________________________
1309
1310 /32
1311
1312done.
1313#################################################################################################################################
1314URLCrazy Domain Report
1315Domain : www.gesaguas.cl
1316Keyboard : qwerty
1317At : 2020-03-19 13:05:48 -0400
1318
1319# Please wait. 163 hostnames to process
1320
1321Typo Type Typo DNS-A CC-A DNS-MX Extn
1322-------------------------------------------------------------------------------------------------------------------
1323Character Omission ww.gesaguas.cl ? cl
1324Character Omission www.esaguas.cl ? cl
1325Character Omission www.geaguas.cl ? cl
1326Character Omission www.gesagas.cl ? cl
1327Character Omission www.gesagua.cl ? cl
1328Character Omission www.gesagus.cl ? cl
1329Character Omission www.gesauas.cl ? cl
1330Character Omission www.gesguas.cl ? cl
1331Character Omission www.gsaguas.cl ? cl
1332Character Omission wwwgesaguas.cl ? cl
1333Character Repeat www.geesaguas.cl ? cl
1334Character Repeat www.gesaaguas.cl ? cl
1335Character Repeat www.gesagguas.cl ? cl
1336Character Repeat www.gesaguaas.cl ? cl
1337Character Repeat www.gesaguass.cl ? cl
1338Character Repeat www.gesaguuas.cl ? cl
1339Character Repeat www.gessaguas.cl ? cl
1340Character Repeat www.ggesaguas.cl ? cl
1341Character Repeat wwww.gesaguas.cl ? cl
1342Character Swap ww.wgesaguas.cl ? cl
1343Character Swap www.egsaguas.cl ? cl
1344Character Swap www.geasguas.cl ? cl
1345Character Swap www.gesagaus.cl ? cl
1346Character Swap www.gesaguas.lc ? lc
1347Character Swap www.gesagusa.cl ? cl
1348Character Swap www.gesaugas.cl ? cl
1349Character Swap www.gesgauas.cl ? cl
1350Character Swap www.gseaguas.cl ? cl
1351Character Swap wwwg.esaguas.cl ? cl
1352Character Replacement eww.gesaguas.cl ? cl
1353Character Replacement qww.gesaguas.cl ? cl
1354Character Replacement wew.gesaguas.cl ? cl
1355Character Replacement wqw.gesaguas.cl ? cl
1356Character Replacement wwe.gesaguas.cl ? cl
1357Character Replacement wwq.gesaguas.cl ? cl
1358Character Replacement www.fesaguas.cl ? cl
1359Character Replacement www.geaaguas.cl ? cl
1360Character Replacement www.gedaguas.cl ? cl
1361Character Replacement www.gesafuas.cl ? cl
1362Character Replacement www.gesagias.cl ? cl
1363Character Replacement www.gesaguaa.cl ? cl
1364Character Replacement www.gesaguad.cl ? cl
1365Character Replacement www.gesaguss.cl ? cl
1366Character Replacement www.gesagyas.cl ? cl
1367Character Replacement www.gesahuas.cl ? cl
1368Character Replacement www.gessguas.cl ? cl
1369Character Replacement www.grsaguas.cl ? cl
1370Character Replacement www.gwsaguas.cl ? cl
1371Character Replacement www.hesaguas.cl ? cl
1372Double Character Replacement eew.gesaguas.cl ? cl
1373Double Character Replacement qqw.gesaguas.cl ? cl
1374Double Character Replacement wee.gesaguas.cl ? cl
1375Double Character Replacement wqq.gesaguas.cl ? cl
1376Character Insertion weww.gesaguas.cl ? cl
1377Character Insertion wqww.gesaguas.cl ? cl
1378Character Insertion wwew.gesaguas.cl ? cl
1379Character Insertion wwqw.gesaguas.cl ? cl
1380Character Insertion www.gersaguas.cl ? cl
1381Character Insertion www.gesagfuas.cl ? cl
1382Character Insertion www.gesaghuas.cl ? cl
1383Character Insertion www.gesaguasa.cl ? cl
1384Character Insertion www.gesaguasd.cl ? cl
1385Character Insertion www.gesaguias.cl ? cl
1386Character Insertion www.gesaguyas.cl ? cl
1387Character Insertion www.gesasguas.cl ? cl
1388Character Insertion www.gesdaguas.cl ? cl
1389Character Insertion www.gewsaguas.cl ? cl
1390Character Insertion www.gfesaguas.cl ? cl
1391Character Insertion www.ghesaguas.cl ? cl
1392Character Insertion wwwe.gesaguas.cl ? cl
1393Character Insertion wwwq.gesaguas.cl ? cl
1394Missing Dot wwwwww.gesaguas.cl ? cl
1395Singular or Pluralise gesagua.cl ? cl
1396Singular or Pluralise gesaguas.cl 170.239.85.227 ALT4.ASPMX.L.GOOGLE.COM cl
1397Vowel Swap www.gasaguas.cl ? cl
1398Vowel Swap www.gesagaas.cl ? cl
1399Vowel Swap www.gesageas.cl ? cl
1400Vowel Swap www.gesagoas.cl ? cl
1401Vowel Swap www.gesegues.cl ? cl
1402Vowel Swap www.gesiguis.cl ? cl
1403Vowel Swap www.gesoguos.cl ? cl
1404Vowel Swap www.gesuguus.cl ? cl
1405Vowel Swap www.gisaguas.cl ? cl
1406Vowel Swap www.gosaguas.cl ? cl
1407Vowel Swap www.gusaguas.cl ? cl
1408Bit Flipping 7ww.gesaguas.cl ? cl
1409Bit Flipping gww.gesaguas.cl ? cl
1410Bit Flipping sww.gesaguas.cl ? cl
1411Bit Flipping uww.gesaguas.cl ? cl
1412Bit Flipping vww.gesaguas.cl ? cl
1413Bit Flipping w7w.gesaguas.cl ? cl
1414Bit Flipping wgw.gesaguas.cl ? cl
1415Bit Flipping wsw.gesaguas.cl ? cl
1416Bit Flipping wuw.gesaguas.cl ? cl
1417Bit Flipping wvw.gesaguas.cl ? cl
1418Bit Flipping ww7.gesaguas.cl ? cl
1419Bit Flipping wwg.gesaguas.cl ? cl
1420Bit Flipping wws.gesaguas.cl ? cl
1421Bit Flipping wwu.gesaguas.cl ? cl
1422Bit Flipping wwv.gesaguas.cl ? cl
1423Bit Flipping www.cesaguas.cl ? cl
1424Bit Flipping www.eesaguas.cl ? cl
1425Bit Flipping www.gdsaguas.cl ? cl
1426Bit Flipping www.ge3aguas.cl ? cl
1427Bit Flipping www.gecaguas.cl ? cl
1428Bit Flipping www.geqaguas.cl ? cl
1429Bit Flipping www.geraguas.cl 173.249.158.24 US,UNITED STATES geraguas.cl cl
1430Bit Flipping www.gesacuas.cl ? cl
1431Bit Flipping www.gesaeuas.cl ? cl
1432Bit Flipping www.gesag5as.cl ? cl
1433Bit Flipping www.gesagqas.cl ? cl
1434Bit Flipping www.gesagtas.cl ? cl
1435Bit Flipping www.gesagua3.cl ? cl
1436Bit Flipping www.gesaguac.cl ? cl
1437Bit Flipping www.gesaguaq.cl ? cl
1438Bit Flipping www.gesaguar.cl ? cl
1439Bit Flipping www.gesaguas.cd ? cd
1440Bit Flipping www.gesaguas.ch ? ch
1441Bit Flipping www.gesaguas.cm ? cm
1442Bit Flipping www.gesaguas.cn ? cn
1443Bit Flipping www.gesaguas.gl ? gl
1444Bit Flipping www.gesaguas.sl ? sl
1445Bit Flipping www.gesaguaw.cl ? cl
1446Bit Flipping www.gesagucs.cl ? cl
1447Bit Flipping www.gesagues.cl ? cl
1448Bit Flipping www.gesaguis.cl ? cl
1449Bit Flipping www.gesaguqs.cl ? cl
1450Bit Flipping www.gesagwas.cl ? cl
1451Bit Flipping www.gesaouas.cl ? cl
1452Bit Flipping www.gesawuas.cl ? cl
1453Bit Flipping www.gescguas.cl ? cl
1454Bit Flipping www.geseguas.cl ? cl
1455Bit Flipping www.gesiguas.cl ? cl
1456Bit Flipping www.gesqguas.cl ? cl
1457Bit Flipping www.gewaguas.cl ? cl
1458Bit Flipping www.ggsaguas.cl ? cl
1459Bit Flipping www.gmsaguas.cl ? cl
1460Bit Flipping www.oesaguas.cl ? cl
1461Bit Flipping www.wesaguas.cl ? cl
1462Bit Flipping wwwngesaguas.cl ? cl
1463Homoglyphs vvvvvv.gesaguas.cl ? cl
1464Homoglyphs vvvvw.gesaguas.cl ? cl
1465Homoglyphs vvwvv.gesaguas.cl ? cl
1466Homoglyphs vvww.gesaguas.cl ? cl
1467Homoglyphs wvvvv.gesaguas.cl ? cl
1468Homoglyphs wvvw.gesaguas.cl ? cl
1469Homoglyphs wwvv.gesaguas.cl ? cl
1470Wrong TLD gesaguas.ca ? ca
1471Wrong TLD gesaguas.ch ? ch
1472Wrong TLD gesaguas.com ? com
1473Wrong TLD gesaguas.de ? de
1474Wrong TLD gesaguas.edu ? edu
1475Wrong TLD gesaguas.es ? es
1476Wrong TLD gesaguas.fr ? fr
1477Wrong TLD gesaguas.it ? it
1478Wrong TLD gesaguas.jp ? jp
1479Wrong TLD gesaguas.net ? net
1480Wrong TLD gesaguas.nl ? nl
1481Wrong TLD gesaguas.no ? no
1482Wrong TLD gesaguas.org ? org
1483Wrong TLD gesaguas.ru ? ru
1484Wrong TLD gesaguas.se ? se
1485Wrong TLD gesaguas.us ? us
1486#################################################################################################################################
1487[*] Processing domain www.gesaguas.cl
1488[*] Using system resolvers ['10.101.0.243', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a', '192.168.0.1']
1489[+] Getting nameservers
1490190.114.254.70 - ns1.dns-premium.net
1491186.64.112.62 - ns2.dns-premium.net
1492[-] Zone transfer failed
1493
1494[+] TXT records found
1495"google-site-verification=1neJKsVYf4hCOOv9L-quMXph7OadxY5DYHZ7S8yl2ak"
1496"D1416415"
1497"google-site-verification=zKiQL9R07PeM08dNqBCL7vWtCwxLit2GuA65GHfkT3w"
1498
1499[+] MX records found, added to target list
150010 ALT4.ASPMX.L.GOOGLE.COM.
150110 ALT3.ASPMX.L.GOOGLE.COM.
15021 ASPMX.L.GOOGLE.COM.
15035 ALT1.ASPMX.L.GOOGLE.COM.
15045 ALT2.ASPMX.L.GOOGLE.COM.
1505
1506[*] Scanning www.gesaguas.cl for A records
1507170.239.85.227 - www.gesaguas.cl
1508
1509#################################################################################################################################
1510[+] www.gesaguas.cl has no SPF record!
1511[*] No DMARC record found. Looking for organizational record
1512[+] No organizational DMARC record
1513[+] Spoofing possible for www.gesaguas.cl!
1514#################################################################################################################################
1515WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
1516Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-19 13:17 EDT
1517Nmap scan report for www.gesaguas.cl (170.239.85.227)
1518Host is up (0.41s latency).
1519rDNS record for 170.239.85.227: gesaguas.cl
1520Not shown: 491 closed ports, 1 filtered port
1521Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1522PORT STATE SERVICE
152380/tcp open http
1524443/tcp open https
15253306/tcp open mysql
152622222/tcp open easyengine
1527
1528Nmap done: 1 IP address (1 host up) scanned in 5.29 seconds
1529#################################################################################################################################
1530Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-19 13:17 EDT
1531Nmap scan report for www.gesaguas.cl (170.239.85.227)
1532Host is up (0.39s latency).
1533rDNS record for 170.239.85.227: gesaguas.cl
1534Not shown: 14 closed ports
1535PORT STATE SERVICE
153667/udp open|filtered dhcps
1537
1538Nmap done: 1 IP address (1 host up) scanned in 9.40 seconds
1539#################################################################################################################################
1540HTTP/1.1 301 Moved Permanently
1541Location: https://www.gesaguas.cl/
1542Date: Thu, 19 Mar 2020 17:17:34 GMT
1543Connection: keep-alive
1544################################################################################################################################
1545/
1546https://ajax.googleapis.com/ajax/libs/jquery/3.4.0/jquery.min.js
1547https://maps.googleapis.com/maps/api/js?key=AIzaSyDjBOzXd2IuONFtH5ttB2SB4RrEu9Fy-Xw
1548https://unpkg.com/sweetalert/dist/sweetalert.min.js
1549https://use.fontawesome.com/releases/v5.8.1/js/all.js
1550https://www.googletagmanager.com/gtag/js?id=UA-73111113-1
1551./js/angular-cookies.min.js
1552./js/angular-editor.js
1553./js/markerclusterer.min.js
1554./js/simditor-all.js
1555./js/simditor-all.min.js
1556text/css
1557text/javascript
1558#################################################################################################################################
1559http://www.gesaguas.cl [301 Moved Permanently] IP[170.239.85.227], RedirectLocation[https://www.gesaguas.cl/]
1560https://www.gesaguas.cl/ [200 OK] Bootstrap[3.3.5,3.3.7], HTML5, IP[170.239.85.227], JQuery[3.4.0], Open-Graph-Protocol[Empresa], Script[text/javascript], X-Powered-By[Express]
1561#################################################################################################################################
1562Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-19 13:24 EDT
1563NSE: Loaded 161 scripts for scanning.
1564NSE: Script Pre-scanning.
1565Initiating NSE at 13:24
1566Completed NSE at 13:24, 0.00s elapsed
1567Initiating NSE at 13:24
1568Completed NSE at 13:24, 0.00s elapsed
1569Initiating Parallel DNS resolution of 1 host. at 13:24
1570Completed Parallel DNS resolution of 1 host. at 13:24, 0.03s elapsed
1571Initiating SYN Stealth Scan at 13:24
1572Scanning www.gesaguas.cl (170.239.85.227) [1 port]
1573Discovered open port 80/tcp on 170.239.85.227
1574Completed SYN Stealth Scan at 13:24, 0.43s elapsed (1 total ports)
1575Initiating Service scan at 13:24
1576Scanning 1 service on www.gesaguas.cl (170.239.85.227)
1577Completed Service scan at 13:25, 34.24s elapsed (1 service on 1 host)
1578Initiating OS detection (try #1) against www.gesaguas.cl (170.239.85.227)
1579Retrying OS detection (try #2) against www.gesaguas.cl (170.239.85.227)
1580Initiating Traceroute at 13:25
1581Completed Traceroute at 13:25, 3.39s elapsed
1582Initiating Parallel DNS resolution of 15 hosts. at 13:25
1583Completed Parallel DNS resolution of 15 hosts. at 13:25, 0.83s elapsed
1584NSE: Script scanning 170.239.85.227.
1585Initiating NSE at 13:25
1586Completed NSE at 13:26, 86.68s elapsed
1587Initiating NSE at 13:26
1588Completed NSE at 13:26, 0.92s elapsed
1589Nmap scan report for www.gesaguas.cl (170.239.85.227)
1590Host is up (0.39s latency).
1591rDNS record for 170.239.85.227: gesaguas.cl
1592
1593PORT STATE SERVICE VERSION
159480/tcp open http
1595| fingerprint-strings:
1596| DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, X11Probe:
1597| HTTP/1.1 400 Bad Request
1598| Connection: close
1599| FourOhFourRequest:
1600| HTTP/1.1 301 Moved Permanently
1601| Location: https://undefined/nice%20ports%2C/Tri%6Eity.txt%2ebak
1602| Date: Thu, 19 Mar 2020 17:24:30 GMT
1603| Connection: close
1604| GetRequest:
1605| HTTP/1.1 301 Moved Permanently
1606| Location: https://undefined/
1607| Date: Thu, 19 Mar 2020 17:24:27 GMT
1608| Connection: close
1609| HTTPOptions:
1610| HTTP/1.1 301 Moved Permanently
1611| Location: https://undefined/
1612| Date: Thu, 19 Mar 2020 17:24:28 GMT
1613|_ Connection: close
1614| http-brute:
1615|_ Path "/" does not require authentication
1616|_http-chrono: Request times for /; avg: 1046.09ms; min: 941.74ms; max: 1213.65ms
1617|_http-csrf: Couldn't find any CSRF vulnerabilities.
1618|_http-date: Thu, 19 Mar 2020 17:25:24 GMT; -6s from local time.
1619|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
1620|_http-dombased-xss: Couldn't find any DOM based XSS.
1621|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
1622|_http-errors: Couldn't find any error pages.
1623|_http-feed: Couldn't find any feeds.
1624|_http-fetch: Please enter the complete path of the directory to save data in.
1625| http-headers:
1626| Location: https://www.gesaguas.cl/
1627| Date: Thu, 19 Mar 2020 17:25:31 GMT
1628| Connection: close
1629| Transfer-Encoding: chunked
1630|
1631|_ (Request type: GET)
1632|_http-jsonp-detection: Couldn't find any JSONP endpoints.
1633| http-methods:
1634|_ Supported Methods: GET HEAD POST OPTIONS
1635|_http-mobileversion-checker: No mobile version detected.
1636|_http-passwd: ERROR: Script execution failed (use -d to debug)
1637| http-security-headers:
1638| Cache_Control:
1639|_ Header: Cache-Control: public, max-age=0
1640| http-sitemap-generator:
1641| Directory structure:
1642| Longest directory structure:
1643| Depth: 0
1644| Dir: /
1645| Total files found (by extension):
1646|_
1647|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
1648|_http-title: Did not follow redirect to https://www.gesaguas.cl/
1649| http-vhosts:
1650|_127 names had status 301
1651|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
1652|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
1653|_http-xssed: No previously reported XSS vuln.
16541 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
1655SF-Port80-TCP:V=7.80%I=7%D=3/19%Time=5E73AAD1%P=x86_64-pc-linux-gnu%r(GetR
1656SF:equest,78,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
1657SF:ps://undefined/\r\nDate:\x20Thu,\x2019\x20Mar\x202020\x2017:24:27\x20GM
1658SF:T\r\nConnection:\x20close\r\n\r\n")%r(HTTPOptions,78,"HTTP/1\.1\x20301\
1659SF:x20Moved\x20Permanently\r\nLocation:\x20https://undefined/\r\nDate:\x20
1660SF:Thu,\x2019\x20Mar\x202020\x2017:24:28\x20GMT\r\nConnection:\x20close\r\
1661SF:n\r\n")%r(RTSPRequest,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnect
1662SF:ion:\x20close\r\n\r\n")%r(X11Probe,2F,"HTTP/1\.1\x20400\x20Bad\x20Reque
1663SF:st\r\nConnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9B,"HTTP/1\.1\
1664SF:x20301\x20Moved\x20Permanently\r\nLocation:\x20https://undefined/nice%2
1665SF:0ports%2C/Tri%6Eity\.txt%2ebak\r\nDate:\x20Thu,\x2019\x20Mar\x202020\x2
1666SF:017:24:30\x20GMT\r\nConnection:\x20close\r\n\r\n")%r(RPCCheck,2F,"HTTP/
1667SF:1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(DNSVe
1668SF:rsionBindReqTCP,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x
1669SF:20close\r\n\r\n")%r(DNSStatusRequestTCP,2F,"HTTP/1\.1\x20400\x20Bad\x20
1670SF:Request\r\nConnection:\x20close\r\n\r\n")%r(Help,2F,"HTTP/1\.1\x20400\x
1671SF:20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SSLSessionReq,2F,"
1672SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(
1673SF:TerminalServerCookie,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnecti
1674SF:on:\x20close\r\n\r\n")%r(TLSSessionReq,2F,"HTTP/1\.1\x20400\x20Bad\x20R
1675SF:equest\r\nConnection:\x20close\r\n\r\n")%r(Kerberos,2F,"HTTP/1\.1\x2040
1676SF:0\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SMBProgNeg,2F,"
1677SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(
1678SF:LPDString,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20clos
1679SF:e\r\n\r\n")%r(LDAPSearchReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nC
1680SF:onnection:\x20close\r\n\r\n")%r(LDAPBindReq,2F,"HTTP/1\.1\x20400\x20Bad
1681SF:\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SIPOptions,2F,"HTTP/1\.
1682SF:1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(LANDesk-
1683SF:RC,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r
1684SF:\n")%r(TerminalServer,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnect
1685SF:ion:\x20close\r\n\r\n");
1686Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1687Aggressive OS guesses: Linux 3.10 - 4.11 (95%), Linux 3.12 (95%), Linux 3.13 (95%), Linux 3.13 or 4.2 (95%), Linux 3.16 (95%), Linux 3.18 (95%), Linux 3.2 - 4.9 (95%), Linux 3.8 - 3.11 (95%), Linux 4.2 (95%), Linux 4.4 (95%)
1688No exact OS matches for host (test conditions non-ideal).
1689Uptime guess: 140.761 days (since Wed Oct 30 19:10:14 2019)
1690Network Distance: 19 hops
1691TCP Sequence Prediction: Difficulty=260 (Good luck!)
1692IP ID Sequence Generation: All zeros
1693
1694TRACEROUTE (using port 80/tcp)
1695HOP RTT ADDRESS
16961 127.27 ms 10.203.19.1
16972 ...
16983 130.75 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
16994 127.82 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
17005 133.25 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
17016 154.29 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
17027 159.40 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
17038 251.51 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
17049 253.12 ms be12489.ccr42.par01.atlas.cogentco.com (154.54.57.70)
170510 254.79 ms be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169)
170611 250.93 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
170712 252.99 ms be3084.ccr42.dca01.atlas.cogentco.com (154.54.30.65)
170813 262.61 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
170914 277.18 ms be3401.ccr21.mia03.atlas.cogentco.com (154.54.47.30)
171015 280.00 ms be3401.ccr21.mia03.atlas.cogentco.com (154.54.47.30)
171116 ...
171217 383.09 ms 190.211.161.122
171318 ...
171419 384.59 ms gesaguas.cl (170.239.85.227)
1715
1716NSE: Script Post-scanning.
1717Initiating NSE at 13:26
1718Completed NSE at 13:26, 0.00s elapsed
1719Initiating NSE at 13:26
1720Completed NSE at 13:26, 0.00s elapsed
1721#################################################################################################################################
1722------------------------------------------------------------------------------------------------------------------------
1723
1724[ ! ] Starting SCANNER INURLBR 2.1 at [19-03-2020 13:27:12]
1725[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
1726It is the end user's responsibility to obey all applicable local, state and federal laws.
1727Developers assume no liability and are not responsible for any misuse or damage caused by this program
1728
1729[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.gesaguas.cl/output/inurlbr-www.gesaguas.cl ]
1730[ INFO ][ DORK ]::[ site:www.gesaguas.cl ]
1731[ INFO ][ SEARCHING ]:: {
1732[ INFO ][ ENGINE ]::[ GOOGLE - www.google.si ]
1733
1734[ INFO ][ SEARCHING ]::
1735-[:::]
1736[ INFO ][ ENGINE ]::[ GOOGLE API ]
1737
1738[ INFO ][ SEARCHING ]::
1739-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
1740[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.am ID: 007843865286850066037:b0heuatvay8 ]
1741
1742[ INFO ][ SEARCHING ]::
1743-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
1744
1745[ INFO ][ TOTAL FOUND VALUES ]:: [ 85 ]
1746
1747
1748 _[ - ]::--------------------------------------------------------------------------------------------------------------
1749|_[ + ] [ 0 / 85 ]-[13:27:32] [ - ]
1750|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/52 ]
1751|_[ + ] Exploit::
1752|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1753|_[ + ] More details:: / - / , ISP:
1754|_[ + ] Found:: UNIDENTIFIED
1755
1756 _[ - ]::--------------------------------------------------------------------------------------------------------------
1757|_[ + ] [ 1 / 85 ]-[13:27:35] [ - ]
1758|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/147 ]
1759|_[ + ] Exploit::
1760|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1761|_[ + ] More details:: / - / , ISP:
1762|_[ + ] Found:: UNIDENTIFIED
1763
1764 _[ - ]::--------------------------------------------------------------------------------------------------------------
1765|_[ + ] [ 2 / 85 ]-[13:27:37] [ - ]
1766|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/137 ]
1767|_[ + ] Exploit::
1768|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1769|_[ + ] More details:: / - / , ISP:
1770|_[ + ] Found:: UNIDENTIFIED
1771
1772 _[ - ]::--------------------------------------------------------------------------------------------------------------
1773|_[ + ] [ 3 / 85 ]-[13:27:41] [ - ]
1774|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/121 ]
1775|_[ + ] Exploit::
1776|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1777|_[ + ] More details:: / - / , ISP:
1778|_[ + ] Found:: UNIDENTIFIED
1779
1780 _[ - ]::--------------------------------------------------------------------------------------------------------------
1781|_[ + ] [ 4 / 85 ]-[13:27:44] [ - ]
1782|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/74 ]
1783|_[ + ] Exploit::
1784|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1785|_[ + ] More details:: / - / , ISP:
1786|_[ + ] Found:: UNIDENTIFIED
1787
1788 _[ - ]::--------------------------------------------------------------------------------------------------------------
1789|_[ + ] [ 5 / 85 ]-[13:27:46] [ - ]
1790|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/140 ]
1791|_[ + ] Exploit::
1792|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1793|_[ + ] More details:: / - / , ISP:
1794|_[ + ] Found:: UNIDENTIFIED
1795
1796 _[ - ]::--------------------------------------------------------------------------------------------------------------
1797|_[ + ] [ 6 / 85 ]-[13:27:49] [ - ]
1798|_[ + ] Target:: [ https://www.gesaguas.cl/blog/31 ]
1799|_[ + ] Exploit::
1800|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1801|_[ + ] More details:: / - / , ISP:
1802|_[ + ] Found:: UNIDENTIFIED
1803
1804 _[ - ]::--------------------------------------------------------------------------------------------------------------
1805|_[ + ] [ 7 / 85 ]-[13:27:52] [ - ]
1806|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/150 ]
1807|_[ + ] Exploit::
1808|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1809|_[ + ] More details:: / - / , ISP:
1810|_[ + ] Found:: UNIDENTIFIED
1811
1812 _[ - ]::--------------------------------------------------------------------------------------------------------------
1813|_[ + ] [ 8 / 85 ]-[13:27:55] [ - ]
1814|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/136 ]
1815|_[ + ] Exploit::
1816|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1817|_[ + ] More details:: / - / , ISP:
1818|_[ + ] Found:: UNIDENTIFIED
1819
1820 _[ - ]::--------------------------------------------------------------------------------------------------------------
1821|_[ + ] [ 9 / 85 ]-[13:27:58] [ - ]
1822|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/107 ]
1823|_[ + ] Exploit::
1824|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1825|_[ + ] More details:: / - / , ISP:
1826|_[ + ] Found:: UNIDENTIFIED
1827
1828 _[ - ]::--------------------------------------------------------------------------------------------------------------
1829|_[ + ] [ 10 / 85 ]-[13:28:00] [ - ]
1830|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/99 ]
1831|_[ + ] Exploit::
1832|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1833|_[ + ] More details:: / - / , ISP:
1834|_[ + ] Found:: UNIDENTIFIED
1835
1836 _[ - ]::--------------------------------------------------------------------------------------------------------------
1837|_[ + ] [ 11 / 85 ]-[13:28:03] [ - ]
1838|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/97 ]
1839|_[ + ] Exploit::
1840|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1841|_[ + ] More details:: / - / , ISP:
1842|_[ + ] Found:: UNIDENTIFIED
1843
1844 _[ - ]::--------------------------------------------------------------------------------------------------------------
1845|_[ + ] [ 12 / 85 ]-[13:28:05] [ - ]
1846|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/10 ]
1847|_[ + ] Exploit::
1848|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1849|_[ + ] More details:: / - / , ISP:
1850|_[ + ] Found:: UNIDENTIFIED
1851
1852 _[ - ]::--------------------------------------------------------------------------------------------------------------
1853|_[ + ] [ 13 / 85 ]-[13:28:07] [ - ]
1854|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/75 ]
1855|_[ + ] Exploit::
1856|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1857|_[ + ] More details:: / - / , ISP:
1858|_[ + ] Found:: UNIDENTIFIED
1859
1860 _[ - ]::--------------------------------------------------------------------------------------------------------------
1861|_[ + ] [ 14 / 85 ]-[13:28:10] [ - ]
1862|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/92 ]
1863|_[ + ] Exploit::
1864|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1865|_[ + ] More details:: / - / , ISP:
1866|_[ + ] Found:: UNIDENTIFIED
1867
1868 _[ - ]::--------------------------------------------------------------------------------------------------------------
1869|_[ + ] [ 15 / 85 ]-[13:28:12] [ - ]
1870|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/156 ]
1871|_[ + ] Exploit::
1872|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1873|_[ + ] More details:: / - / , ISP:
1874|_[ + ] Found:: UNIDENTIFIED
1875
1876 _[ - ]::--------------------------------------------------------------------------------------------------------------
1877|_[ + ] [ 16 / 85 ]-[13:28:16] [ - ]
1878|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/138 ]
1879|_[ + ] Exploit::
1880|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1881|_[ + ] More details:: / - / , ISP:
1882|_[ + ] Found:: UNIDENTIFIED
1883
1884 _[ - ]::--------------------------------------------------------------------------------------------------------------
1885|_[ + ] [ 17 / 85 ]-[13:28:19] [ - ]
1886|_[ + ] Target:: [ https://www.gesaguas.cl/blog/3 ]
1887|_[ + ] Exploit::
1888|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1889|_[ + ] More details:: / - / , ISP:
1890|_[ + ] Found:: UNIDENTIFIED
1891
1892 _[ - ]::--------------------------------------------------------------------------------------------------------------
1893|_[ + ] [ 18 / 85 ]-[13:28:22] [ - ]
1894|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/144 ]
1895|_[ + ] Exploit::
1896|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1897|_[ + ] More details:: / - / , ISP:
1898|_[ + ] Found:: UNIDENTIFIED
1899
1900 _[ - ]::--------------------------------------------------------------------------------------------------------------
1901|_[ + ] [ 19 / 85 ]-[13:28:24] [ - ]
1902|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/56 ]
1903|_[ + ] Exploit::
1904|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1905|_[ + ] More details:: / - / , ISP:
1906|_[ + ] Found:: UNIDENTIFIED
1907
1908 _[ - ]::--------------------------------------------------------------------------------------------------------------
1909|_[ + ] [ 20 / 85 ]-[13:28:27] [ - ]
1910|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/132 ]
1911|_[ + ] Exploit::
1912|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1913|_[ + ] More details:: / - / , ISP:
1914|_[ + ] Found:: UNIDENTIFIED
1915
1916 _[ - ]::--------------------------------------------------------------------------------------------------------------
1917|_[ + ] [ 21 / 85 ]-[13:28:29] [ - ]
1918|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/14 ]
1919|_[ + ] Exploit::
1920|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1921|_[ + ] More details:: / - / , ISP:
1922|_[ + ] Found:: UNIDENTIFIED
1923
1924 _[ - ]::--------------------------------------------------------------------------------------------------------------
1925|_[ + ] [ 22 / 85 ]-[13:28:32] [ - ]
1926|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/128 ]
1927|_[ + ] Exploit::
1928|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1929|_[ + ] More details:: / - / , ISP:
1930|_[ + ] Found:: UNIDENTIFIED
1931
1932 _[ - ]::--------------------------------------------------------------------------------------------------------------
1933|_[ + ] [ 23 / 85 ]-[13:28:34] [ - ]
1934|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/131 ]
1935|_[ + ] Exploit::
1936|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1937|_[ + ] More details:: / - / , ISP:
1938|_[ + ] Found:: UNIDENTIFIED
1939
1940 _[ - ]::--------------------------------------------------------------------------------------------------------------
1941|_[ + ] [ 24 / 85 ]-[13:28:37] [ - ]
1942|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/118 ]
1943|_[ + ] Exploit::
1944|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1945|_[ + ] More details:: / - / , ISP:
1946|_[ + ] Found:: UNIDENTIFIED
1947
1948 _[ - ]::--------------------------------------------------------------------------------------------------------------
1949|_[ + ] [ 25 / 85 ]-[13:28:39] [ - ]
1950|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/83 ]
1951|_[ + ] Exploit::
1952|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1953|_[ + ] More details:: / - / , ISP:
1954|_[ + ] Found:: UNIDENTIFIED
1955
1956 _[ - ]::--------------------------------------------------------------------------------------------------------------
1957|_[ + ] [ 26 / 85 ]-[13:28:42] [ - ]
1958|_[ + ] Target:: [ https://www.gesaguas.cl/blog/5 ]
1959|_[ + ] Exploit::
1960|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1961|_[ + ] More details:: / - / , ISP:
1962|_[ + ] Found:: UNIDENTIFIED
1963
1964 _[ - ]::--------------------------------------------------------------------------------------------------------------
1965|_[ + ] [ 27 / 85 ]-[13:28:44] [ - ]
1966|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/126 ]
1967|_[ + ] Exploit::
1968|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1969|_[ + ] More details:: / - / , ISP:
1970|_[ + ] Found:: UNIDENTIFIED
1971
1972 _[ - ]::--------------------------------------------------------------------------------------------------------------
1973|_[ + ] [ 28 / 85 ]-[13:28:47] [ - ]
1974|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/119 ]
1975|_[ + ] Exploit::
1976|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1977|_[ + ] More details:: / - / , ISP:
1978|_[ + ] Found:: UNIDENTIFIED
1979
1980 _[ - ]::--------------------------------------------------------------------------------------------------------------
1981|_[ + ] [ 29 / 85 ]-[13:28:49] [ - ]
1982|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/1 ]
1983|_[ + ] Exploit::
1984|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1985|_[ + ] More details:: / - / , ISP:
1986|_[ + ] Found:: UNIDENTIFIED
1987
1988 _[ - ]::--------------------------------------------------------------------------------------------------------------
1989|_[ + ] [ 30 / 85 ]-[13:28:52] [ - ]
1990|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/76 ]
1991|_[ + ] Exploit::
1992|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
1993|_[ + ] More details:: / - / , ISP:
1994|_[ + ] Found:: UNIDENTIFIED
1995
1996 _[ - ]::--------------------------------------------------------------------------------------------------------------
1997|_[ + ] [ 31 / 85 ]-[13:28:55] [ - ]
1998|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/103 ]
1999|_[ + ] Exploit::
2000|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2001|_[ + ] More details:: / - / , ISP:
2002|_[ + ] Found:: UNIDENTIFIED
2003
2004 _[ - ]::--------------------------------------------------------------------------------------------------------------
2005|_[ + ] [ 32 / 85 ]-[13:28:58] [ - ]
2006|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/141 ]
2007|_[ + ] Exploit::
2008|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2009|_[ + ] More details:: / - / , ISP:
2010|_[ + ] Found:: UNIDENTIFIED
2011
2012 _[ - ]::--------------------------------------------------------------------------------------------------------------
2013|_[ + ] [ 33 / 85 ]-[13:29:00] [ - ]
2014|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/8 ]
2015|_[ + ] Exploit::
2016|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2017|_[ + ] More details:: / - / , ISP:
2018|_[ + ] Found:: UNIDENTIFIED
2019
2020 _[ - ]::--------------------------------------------------------------------------------------------------------------
2021|_[ + ] [ 34 / 85 ]-[13:29:03] [ - ]
2022|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/110 ]
2023|_[ + ] Exploit::
2024|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2025|_[ + ] More details:: / - / , ISP:
2026|_[ + ] Found:: UNIDENTIFIED
2027
2028 _[ - ]::--------------------------------------------------------------------------------------------------------------
2029|_[ + ] [ 35 / 85 ]-[13:29:05] [ - ]
2030|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/70 ]
2031|_[ + ] Exploit::
2032|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2033|_[ + ] More details:: / - / , ISP:
2034|_[ + ] Found:: UNIDENTIFIED
2035
2036 _[ - ]::--------------------------------------------------------------------------------------------------------------
2037|_[ + ] [ 36 / 85 ]-[13:29:08] [ - ]
2038|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/85 ]
2039|_[ + ] Exploit::
2040|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2041|_[ + ] More details:: / - / , ISP:
2042|_[ + ] Found:: UNIDENTIFIED
2043
2044 _[ - ]::--------------------------------------------------------------------------------------------------------------
2045|_[ + ] [ 37 / 85 ]-[13:29:10] [ - ]
2046|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/153 ]
2047|_[ + ] Exploit::
2048|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2049|_[ + ] More details:: / - / , ISP:
2050|_[ + ] Found:: UNIDENTIFIED
2051
2052 _[ - ]::--------------------------------------------------------------------------------------------------------------
2053|_[ + ] [ 38 / 85 ]-[13:29:13] [ - ]
2054|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/93 ]
2055|_[ + ] Exploit::
2056|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2057|_[ + ] More details:: / - / , ISP:
2058|_[ + ] Found:: UNIDENTIFIED
2059
2060 _[ - ]::--------------------------------------------------------------------------------------------------------------
2061|_[ + ] [ 39 / 85 ]-[13:29:15] [ - ]
2062|_[ + ] Target:: [ https://www.gesaguas.cl/blog/26 ]
2063|_[ + ] Exploit::
2064|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2065|_[ + ] More details:: / - / , ISP:
2066|_[ + ] Found:: UNIDENTIFIED
2067
2068 _[ - ]::--------------------------------------------------------------------------------------------------------------
2069|_[ + ] [ 40 / 85 ]-[13:29:18] [ - ]
2070|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/62 ]
2071|_[ + ] Exploit::
2072|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2073|_[ + ] More details:: / - / , ISP:
2074|_[ + ] Found:: UNIDENTIFIED
2075
2076 _[ - ]::--------------------------------------------------------------------------------------------------------------
2077|_[ + ] [ 41 / 85 ]-[13:29:21] [ - ]
2078|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/59 ]
2079|_[ + ] Exploit::
2080|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2081|_[ + ] More details:: / - / , ISP:
2082|_[ + ] Found:: UNIDENTIFIED
2083
2084 _[ - ]::--------------------------------------------------------------------------------------------------------------
2085|_[ + ] [ 42 / 85 ]-[13:29:23] [ - ]
2086|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/134 ]
2087|_[ + ] Exploit::
2088|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2089|_[ + ] More details:: / - / , ISP:
2090|_[ + ] Found:: UNIDENTIFIED
2091
2092 _[ - ]::--------------------------------------------------------------------------------------------------------------
2093|_[ + ] [ 43 / 85 ]-[13:29:26] [ - ]
2094|_[ + ] Target:: [ https://www.gesaguas.cl/blog/17 ]
2095|_[ + ] Exploit::
2096|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2097|_[ + ] More details:: / - / , ISP:
2098|_[ + ] Found:: UNIDENTIFIED
2099
2100 _[ - ]::--------------------------------------------------------------------------------------------------------------
2101|_[ + ] [ 44 / 85 ]-[13:29:28] [ - ]
2102|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/9 ]
2103|_[ + ] Exploit::
2104|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2105|_[ + ] More details:: / - / , ISP:
2106|_[ + ] Found:: UNIDENTIFIED
2107
2108 _[ - ]::--------------------------------------------------------------------------------------------------------------
2109|_[ + ] [ 45 / 85 ]-[13:29:31] [ - ]
2110|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/84 ]
2111|_[ + ] Exploit::
2112|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2113|_[ + ] More details:: / - / , ISP:
2114|_[ + ] Found:: UNIDENTIFIED
2115
2116 _[ - ]::--------------------------------------------------------------------------------------------------------------
2117|_[ + ] [ 46 / 85 ]-[13:29:33] [ - ]
2118|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/63 ]
2119|_[ + ] Exploit::
2120|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2121|_[ + ] More details:: / - / , ISP:
2122|_[ + ] Found:: UNIDENTIFIED
2123
2124 _[ - ]::--------------------------------------------------------------------------------------------------------------
2125|_[ + ] [ 47 / 85 ]-[13:29:35] [ - ]
2126|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/129 ]
2127|_[ + ] Exploit::
2128|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2129|_[ + ] More details:: / - / , ISP:
2130|_[ + ] Found:: UNIDENTIFIED
2131
2132 _[ - ]::--------------------------------------------------------------------------------------------------------------
2133|_[ + ] [ 48 / 85 ]-[13:29:38] [ - ]
2134|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/117 ]
2135|_[ + ] Exploit::
2136|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2137|_[ + ] More details:: / - / , ISP:
2138|_[ + ] Found:: UNIDENTIFIED
2139
2140 _[ - ]::--------------------------------------------------------------------------------------------------------------
2141|_[ + ] [ 49 / 85 ]-[13:29:41] [ - ]
2142|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/58 ]
2143|_[ + ] Exploit::
2144|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2145|_[ + ] More details:: / - / , ISP:
2146|_[ + ] Found:: UNIDENTIFIED
2147
2148 _[ - ]::--------------------------------------------------------------------------------------------------------------
2149|_[ + ] [ 50 / 85 ]-[13:29:43] [ - ]
2150|_[ + ] Target:: [ https://www.gesaguas.cl/blog/13 ]
2151|_[ + ] Exploit::
2152|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2153|_[ + ] More details:: / - / , ISP:
2154|_[ + ] Found:: UNIDENTIFIED
2155
2156 _[ - ]::--------------------------------------------------------------------------------------------------------------
2157|_[ + ] [ 51 / 85 ]-[13:29:46] [ - ]
2158|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/157 ]
2159|_[ + ] Exploit::
2160|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2161|_[ + ] More details:: / - / , ISP:
2162|_[ + ] Found:: UNIDENTIFIED
2163
2164 _[ - ]::--------------------------------------------------------------------------------------------------------------
2165|_[ + ] [ 52 / 85 ]-[13:29:48] [ - ]
2166|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/154 ]
2167|_[ + ] Exploit::
2168|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2169|_[ + ] More details:: / - / , ISP:
2170|_[ + ] Found:: UNIDENTIFIED
2171
2172 _[ - ]::--------------------------------------------------------------------------------------------------------------
2173|_[ + ] [ 53 / 85 ]-[13:29:51] [ - ]
2174|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/98 ]
2175|_[ + ] Exploit::
2176|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2177|_[ + ] More details:: / - / , ISP:
2178|_[ + ] Found:: UNIDENTIFIED
2179
2180 _[ - ]::--------------------------------------------------------------------------------------------------------------
2181|_[ + ] [ 54 / 85 ]-[13:29:53] [ - ]
2182|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/148 ]
2183|_[ + ] Exploit::
2184|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2185|_[ + ] More details:: / - / , ISP:
2186|_[ + ] Found:: UNIDENTIFIED
2187
2188 _[ - ]::--------------------------------------------------------------------------------------------------------------
2189|_[ + ] [ 55 / 85 ]-[13:29:56] [ - ]
2190|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/65 ]
2191|_[ + ] Exploit::
2192|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2193|_[ + ] More details:: / - / , ISP:
2194|_[ + ] Found:: UNIDENTIFIED
2195
2196 _[ - ]::--------------------------------------------------------------------------------------------------------------
2197|_[ + ] [ 56 / 85 ]-[13:29:58] [ - ]
2198|_[ + ] Target:: [ https://www.gesaguas.cl/blog/20 ]
2199|_[ + ] Exploit::
2200|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2201|_[ + ] More details:: / - / , ISP:
2202|_[ + ] Found:: UNIDENTIFIED
2203
2204 _[ - ]::--------------------------------------------------------------------------------------------------------------
2205|_[ + ] [ 57 / 85 ]-[13:30:01] [ - ]
2206|_[ + ] Target:: [ https://www.gesaguas.cl/blog/15 ]
2207|_[ + ] Exploit::
2208|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2209|_[ + ] More details:: / - / , ISP:
2210|_[ + ] Found:: UNIDENTIFIED
2211
2212 _[ - ]::--------------------------------------------------------------------------------------------------------------
2213|_[ + ] [ 58 / 85 ]-[13:30:04] [ - ]
2214|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/50 ]
2215|_[ + ] Exploit::
2216|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2217|_[ + ] More details:: / - / , ISP:
2218|_[ + ] Found:: UNIDENTIFIED
2219
2220 _[ - ]::--------------------------------------------------------------------------------------------------------------
2221|_[ + ] [ 59 / 85 ]-[13:30:06] [ - ]
2222|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/146 ]
2223|_[ + ] Exploit::
2224|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2225|_[ + ] More details:: / - / , ISP:
2226|_[ + ] Found:: UNIDENTIFIED
2227
2228 _[ - ]::--------------------------------------------------------------------------------------------------------------
2229|_[ + ] [ 60 / 85 ]-[13:30:09] [ - ]
2230|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/143 ]
2231|_[ + ] Exploit::
2232|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2233|_[ + ] More details:: / - / , ISP:
2234|_[ + ] Found:: UNIDENTIFIED
2235
2236 _[ - ]::--------------------------------------------------------------------------------------------------------------
2237|_[ + ] [ 61 / 85 ]-[13:30:11] [ - ]
2238|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/123 ]
2239|_[ + ] Exploit::
2240|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2241|_[ + ] More details:: / - / , ISP:
2242|_[ + ] Found:: UNIDENTIFIED
2243
2244 _[ - ]::--------------------------------------------------------------------------------------------------------------
2245|_[ + ] [ 62 / 85 ]-[13:30:14] [ - ]
2246|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/48 ]
2247|_[ + ] Exploit::
2248|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2249|_[ + ] More details:: / - / , ISP:
2250|_[ + ] Found:: UNIDENTIFIED
2251
2252 _[ - ]::--------------------------------------------------------------------------------------------------------------
2253|_[ + ] [ 63 / 85 ]-[13:30:16] [ - ]
2254|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/95 ]
2255|_[ + ] Exploit::
2256|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2257|_[ + ] More details:: / - / , ISP:
2258|_[ + ] Found:: UNIDENTIFIED
2259
2260 _[ - ]::--------------------------------------------------------------------------------------------------------------
2261|_[ + ] [ 64 / 85 ]-[13:30:19] [ - ]
2262|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/80 ]
2263|_[ + ] Exploit::
2264|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2265|_[ + ] More details:: / - / , ISP:
2266|_[ + ] Found:: UNIDENTIFIED
2267
2268 _[ - ]::--------------------------------------------------------------------------------------------------------------
2269|_[ + ] [ 65 / 85 ]-[13:30:22] [ - ]
2270|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/69 ]
2271|_[ + ] Exploit::
2272|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2273|_[ + ] More details:: / - / , ISP:
2274|_[ + ] Found:: UNIDENTIFIED
2275
2276 _[ - ]::--------------------------------------------------------------------------------------------------------------
2277|_[ + ] [ 66 / 85 ]-[13:30:24] [ - ]
2278|_[ + ] Target:: [ https://www.gesaguas.cl/blog/27 ]
2279|_[ + ] Exploit::
2280|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2281|_[ + ] More details:: / - / , ISP:
2282|_[ + ] Found:: UNIDENTIFIED
2283
2284 _[ - ]::--------------------------------------------------------------------------------------------------------------
2285|_[ + ] [ 67 / 85 ]-[13:30:27] [ - ]
2286|_[ + ] Target:: [ https://www.gesaguas.cl/blog/6 ]
2287|_[ + ] Exploit::
2288|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2289|_[ + ] More details:: / - / , ISP:
2290|_[ + ] Found:: UNIDENTIFIED
2291
2292 _[ - ]::--------------------------------------------------------------------------------------------------------------
2293|_[ + ] [ 68 / 85 ]-[13:30:29] [ - ]
2294|_[ + ] Target:: [ https://www.gesaguas.cl/blog/24 ]
2295|_[ + ] Exploit::
2296|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2297|_[ + ] More details:: / - / , ISP:
2298|_[ + ] Found:: UNIDENTIFIED
2299
2300 _[ - ]::--------------------------------------------------------------------------------------------------------------
2301|_[ + ] [ 69 / 85 ]-[13:30:32] [ - ]
2302|_[ + ] Target:: [ https://www.gesaguas.cl/blog/16 ]
2303|_[ + ] Exploit::
2304|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2305|_[ + ] More details:: / - / , ISP:
2306|_[ + ] Found:: UNIDENTIFIED
2307
2308 _[ - ]::--------------------------------------------------------------------------------------------------------------
2309|_[ + ] [ 70 / 85 ]-[13:30:34] [ - ]
2310|_[ + ] Target:: [ https://www.gesaguas.cl/blog/12 ]
2311|_[ + ] Exploit::
2312|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2313|_[ + ] More details:: / - / , ISP:
2314|_[ + ] Found:: UNIDENTIFIED
2315
2316 _[ - ]::--------------------------------------------------------------------------------------------------------------
2317|_[ + ] [ 71 / 85 ]-[13:30:37] [ - ]
2318|_[ + ] Target:: [ https://www.gesaguas.cl/blog/38 ]
2319|_[ + ] Exploit::
2320|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2321|_[ + ] More details:: / - / , ISP:
2322|_[ + ] Found:: UNIDENTIFIED
2323
2324 _[ - ]::--------------------------------------------------------------------------------------------------------------
2325|_[ + ] [ 72 / 85 ]-[13:30:39] [ - ]
2326|_[ + ] Target:: [ https://www.gesaguas.cl/blog/28 ]
2327|_[ + ] Exploit::
2328|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2329|_[ + ] More details:: / - / , ISP:
2330|_[ + ] Found:: UNIDENTIFIED
2331
2332 _[ - ]::--------------------------------------------------------------------------------------------------------------
2333|_[ + ] [ 73 / 85 ]-[13:30:42] [ - ]
2334|_[ + ] Target:: [ https://www.gesaguas.cl/blog/14 ]
2335|_[ + ] Exploit::
2336|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2337|_[ + ] More details:: / - / , ISP:
2338|_[ + ] Found:: UNIDENTIFIED
2339
2340 _[ - ]::--------------------------------------------------------------------------------------------------------------
2341|_[ + ] [ 74 / 85 ]-[13:30:45] [ - ]
2342|_[ + ] Target:: [ https://www.gesaguas.cl/blog/34 ]
2343|_[ + ] Exploit::
2344|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2345|_[ + ] More details:: / - / , ISP:
2346|_[ + ] Found:: UNIDENTIFIED
2347
2348 _[ - ]::--------------------------------------------------------------------------------------------------------------
2349|_[ + ] [ 75 / 85 ]-[13:30:47] [ - ]
2350|_[ + ] Target:: [ https://www.gesaguas.cl/blog/4 ]
2351|_[ + ] Exploit::
2352|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2353|_[ + ] More details:: / - / , ISP:
2354|_[ + ] Found:: UNIDENTIFIED
2355
2356 _[ - ]::--------------------------------------------------------------------------------------------------------------
2357|_[ + ] [ 76 / 85 ]-[13:30:50] [ - ]
2358|_[ + ] Target:: [ https://www.gesaguas.cl/blog/22 ]
2359|_[ + ] Exploit::
2360|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2361|_[ + ] More details:: / - / , ISP:
2362|_[ + ] Found:: UNIDENTIFIED
2363
2364 _[ - ]::--------------------------------------------------------------------------------------------------------------
2365|_[ + ] [ 77 / 85 ]-[13:30:52] [ - ]
2366|_[ + ] Target:: [ https://www.gesaguas.cl/blog/30 ]
2367|_[ + ] Exploit::
2368|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2369|_[ + ] More details:: / - / , ISP:
2370|_[ + ] Found:: UNIDENTIFIED
2371
2372 _[ - ]::--------------------------------------------------------------------------------------------------------------
2373|_[ + ] [ 78 / 85 ]-[13:30:54] [ - ]
2374|_[ + ] Target:: [ https://www.gesaguas.cl/blog/23 ]
2375|_[ + ] Exploit::
2376|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2377|_[ + ] More details:: / - / , ISP:
2378|_[ + ] Found:: UNIDENTIFIED
2379
2380 _[ - ]::--------------------------------------------------------------------------------------------------------------
2381|_[ + ] [ 79 / 85 ]-[13:30:59] [ - ]
2382|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/111 ]
2383|_[ + ] Exploit::
2384|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2385|_[ + ] More details:: / - / , ISP:
2386|_[ + ] Found:: UNIDENTIFIED
2387
2388 _[ - ]::--------------------------------------------------------------------------------------------------------------
2389|_[ + ] [ 80 / 85 ]-[13:31:01] [ - ]
2390|_[ + ] Target:: [ https://www.gesaguas.cl/blog/29 ]
2391|_[ + ] Exploit::
2392|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2393|_[ + ] More details:: / - / , ISP:
2394|_[ + ] Found:: UNIDENTIFIED
2395
2396 _[ - ]::--------------------------------------------------------------------------------------------------------------
2397|_[ + ] [ 81 / 85 ]-[13:31:04] [ - ]
2398|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/91 ]
2399|_[ + ] Exploit::
2400|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2401|_[ + ] More details:: / - / , ISP:
2402|_[ + ] Found:: UNIDENTIFIED
2403
2404 _[ - ]::--------------------------------------------------------------------------------------------------------------
2405|_[ + ] [ 82 / 85 ]-[13:31:06] [ - ]
2406|_[ + ] Target:: [ https://www.gesaguas.cl/blog/10 ]
2407|_[ + ] Exploit::
2408|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2409|_[ + ] More details:: / - / , ISP:
2410|_[ + ] Found:: UNIDENTIFIED
2411
2412 _[ - ]::--------------------------------------------------------------------------------------------------------------
2413|_[ + ] [ 83 / 85 ]-[13:31:09] [ - ]
2414|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/100 ]
2415|_[ + ] Exploit::
2416|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2417|_[ + ] More details:: / - / , ISP:
2418|_[ + ] Found:: UNIDENTIFIED
2419
2420 _[ - ]::--------------------------------------------------------------------------------------------------------------
2421|_[ + ] [ 84 / 85 ]-[13:31:11] [ - ]
2422|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/78 ]
2423|_[ + ] Exploit::
2424|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2425|_[ + ] More details:: / - / , ISP:
2426|_[ + ] Found:: UNIDENTIFIED
2427
2428[ INFO ] [ Shutting down ]
2429[ INFO ] [ End of process INURLBR at [19-03-2020 13:31:11]
2430[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
2431[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.gesaguas.cl/output/inurlbr-www.gesaguas.cl ]
2432|_________________________________________________________________________________________
2433
2434\_________________________________________________________________________________________/
2435#################################################################################################################################
2436HTTP/1.1 200 OK
2437X-Powered-By: Express
2438Accept-Ranges: bytes
2439Cache-Control: public, max-age=0
2440Last-Modified: Wed, 26 Feb 2020 15:00:47 GMT
2441ETag: W/"1fbf-1708203bb4a"
2442Content-Type: text/html; charset=UTF-8
2443Content-Length: 8127
2444Date: Thu, 19 Mar 2020 17:31:11 GMT
2445Connection: keep-alive
2446
2447Allow: GET,HEAD
2448#################################################################################################################################
2449/
2450https://ajax.googleapis.com/ajax/libs/jquery/3.4.0/jquery.min.js
2451https://maps.googleapis.com/maps/api/js?key=AIzaSyDjBOzXd2IuONFtH5ttB2SB4RrEu9Fy-Xw
2452https://unpkg.com/sweetalert/dist/sweetalert.min.js
2453https://use.fontawesome.com/releases/v5.8.1/js/all.js
2454https://www.googletagmanager.com/gtag/js?id=UA-73111113-1
2455./js/angular-cookies.min.js
2456./js/angular-editor.js
2457./js/markerclusterer.min.js
2458./js/simditor-all.js
2459./js/simditor-all.min.js
2460text/css
2461text/javascript
2462#################################################################################################################################
2463https://www.gesaguas.cl [200 OK] Bootstrap[3.3.5,3.3.7], HTML5, IP[170.239.85.227], JQuery[3.4.0], Open-Graph-Protocol[Empresa], Script[text/javascript], X-Powered-By[Express]
2464#################################################################################################################################
2465Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-19 13:32 EDT
2466NSE: Loaded 161 scripts for scanning.
2467NSE: Script Pre-scanning.
2468Initiating NSE at 13:32
2469Completed NSE at 13:32, 0.00s elapsed
2470Initiating NSE at 13:32
2471Completed NSE at 13:32, 0.00s elapsed
2472Initiating Parallel DNS resolution of 1 host. at 13:32
2473Completed Parallel DNS resolution of 1 host. at 13:32, 0.02s elapsed
2474Initiating SYN Stealth Scan at 13:32
2475Scanning www.gesaguas.cl (170.239.85.227) [1 port]
2476Discovered open port 443/tcp on 170.239.85.227
2477Completed SYN Stealth Scan at 13:32, 0.43s elapsed (1 total ports)
2478Initiating Service scan at 13:32
2479Scanning 1 service on www.gesaguas.cl (170.239.85.227)
2480Completed Service scan at 13:33, 14.43s elapsed (1 service on 1 host)
2481Initiating OS detection (try #1) against www.gesaguas.cl (170.239.85.227)
2482Retrying OS detection (try #2) against www.gesaguas.cl (170.239.85.227)
2483Initiating Traceroute at 13:33
2484Completed Traceroute at 13:33, 3.40s elapsed
2485Initiating Parallel DNS resolution of 16 hosts. at 13:33
2486Completed Parallel DNS resolution of 16 hosts. at 13:33, 1.19s elapsed
2487NSE: Script scanning 170.239.85.227.
2488Initiating NSE at 13:33
2489Completed NSE at 13:34, 91.12s elapsed
2490Initiating NSE at 13:34
2491Completed NSE at 13:34, 1.81s elapsed
2492Nmap scan report for www.gesaguas.cl (170.239.85.227)
2493Host is up (0.39s latency).
2494rDNS record for 170.239.85.227: gesaguas.cl
2495
2496PORT STATE SERVICE VERSION
2497443/tcp open ssl/http Node.js Express framework
2498|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
2499| http-brute:
2500|_ Path "/" does not require authentication
2501|_http-chrono: ERROR: Script execution failed (use -d to debug)
2502|_http-csrf: Couldn't find any CSRF vulnerabilities.
2503|_http-errors: Couldn't find any error pages.
2504|_http-feed: Couldn't find any feeds.
2505|_http-fetch: Please enter the complete path of the directory to save data in.
2506|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2507| http-security-headers:
2508| Strict_Transport_Security:
2509|_ HSTS not configured in HTTPS Server
2510|_http-traceroute: ERROR: Script execution failed (use -d to debug)
2511| http-vhosts:
2512|_127 names had status ERROR
2513|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
2514|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2515|_http-xssed: No previously reported XSS vuln.
2516Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2517Aggressive OS guesses: HP P2000 G3 NAS device (96%), Linux 3.16 (95%), Linux 3.10 - 4.11 (95%), Linux 3.12 (95%), Linux 3.13 (95%), Linux 3.13 or 4.2 (95%), Linux 3.18 (95%), Linux 3.2 - 4.9 (95%), Linux 3.8 - 3.11 (95%), DD-WRT (Linux 3.18) (95%)
2518No exact OS matches for host (test conditions non-ideal).
2519Network Distance: 19 hops
2520
2521TRACEROUTE (using port 443/tcp)
2522HOP RTT ADDRESS
25231 126.22 ms 10.203.19.1
25242 ...
25253 128.30 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
25264 128.32 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
25275 132.37 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
25286 154.42 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
25297 159.88 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
25308 249.84 ms be12194.ccr41.lon13.atlas.cogentco.com (154.54.56.93)
25319 252.22 ms be12489.ccr42.par01.atlas.cogentco.com (154.54.57.70)
253210 246.45 ms be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169)
253311 244.70 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
253412 247.71 ms be3084.ccr42.dca01.atlas.cogentco.com (154.54.30.65)
253513 257.32 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
253614 272.14 ms be3401.ccr21.mia03.atlas.cogentco.com (154.54.47.30)
253715 269.12 ms hu0-4-0-4.ccr21.mia03.atlas.cogentco.com (38.88.164.113)
253816 273.56 ms hu0-4-0-4.ccr21.mia03.atlas.cogentco.com (38.88.164.113)
253917 383.01 ms 190.211.161.122
254018 ...
254119 383.53 ms gesaguas.cl (170.239.85.227)
2542
2543NSE: Script Post-scanning.
2544Initiating NSE at 13:34
2545Completed NSE at 13:34, 0.00s elapsed
2546Initiating NSE at 13:34
2547Completed NSE at 13:34, 0.00s elapsed
2548#################################################################################################################################
2549Version: 2.0.0-static
2550OpenSSL 1.1.1e-dev xx XXX xxxx
2551
2552Connected to 170.239.85.227
2553
2554Testing SSL server www.gesaguas.cl on port 443 using SNI name www.gesaguas.cl
2555
2556 SSL/TLS Protocols:
2557SSLv2 disabled
2558SSLv3 disabled
2559TLSv1.0 enabled
2560TLSv1.1 enabled
2561TLSv1.2 enabled
2562TLSv1.3 disabled
2563
2564 TLS Fallback SCSV:
2565Server supports TLS Fallback SCSV
2566
2567 TLS renegotiation:
2568Secure session renegotiation supported
2569
2570 TLS Compression:
2571Compression disabled
2572
2573 Heartbleed:
2574TLSv1.2 not vulnerable to heartbleed
2575TLSv1.1 not vulnerable to heartbleed
2576TLSv1.0 not vulnerable to heartbleed
2577
2578 Supported Server Cipher(s):
2579Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve 25519 DHE 253
2580Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve 25519 DHE 253
2581Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve 25519 DHE 253
2582Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve 25519 DHE 253
2583Accepted TLSv1.2 256 bits ECDHE-RSA-CHACHA20-POLY1305 Curve 25519 DHE 253
2584Accepted TLSv1.2 256 bits ECDHE-ARIA256-GCM-SHA384 Curve 25519 DHE 253
2585Accepted TLSv1.2 128 bits ECDHE-ARIA128-GCM-SHA256 Curve 25519 DHE 253
2586Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve 25519 DHE 253
2587Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve 25519 DHE 253
2588Accepted TLSv1.2 256 bits AES256-GCM-SHA384
2589Accepted TLSv1.2 256 bits AES256-CCM8
2590Accepted TLSv1.2 256 bits AES256-CCM
2591Accepted TLSv1.2 256 bits ARIA256-GCM-SHA384
2592Accepted TLSv1.2 128 bits AES128-GCM-SHA256
2593Accepted TLSv1.2 128 bits AES128-CCM8
2594Accepted TLSv1.2 128 bits AES128-CCM
2595Accepted TLSv1.2 128 bits ARIA128-GCM-SHA256
2596Accepted TLSv1.2 256 bits AES256-SHA256
2597Accepted TLSv1.2 128 bits AES128-SHA256
2598Accepted TLSv1.2 256 bits AES256-SHA
2599Accepted TLSv1.2 128 bits AES128-SHA
2600Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve 25519 DHE 253
2601Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve 25519 DHE 253
2602Accepted TLSv1.1 256 bits AES256-SHA
2603Accepted TLSv1.1 128 bits AES128-SHA
2604Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve 25519 DHE 253
2605Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve 25519 DHE 253
2606Accepted TLSv1.0 256 bits AES256-SHA
2607Accepted TLSv1.0 128 bits AES128-SHA
2608
2609 Server Key Exchange Group(s):
2610TLSv1.2 128 bits secp256r1 (NIST P-256)
2611TLSv1.2 192 bits secp384r1 (NIST P-384)
2612TLSv1.2 260 bits secp521r1 (NIST P-521)
2613TLSv1.2 128 bits x25519
2614TLSv1.2 224 bits x448
2615
2616 Server Signature Algorithm(s):
2617TLSv1.2 rsa_pkcs1_sha1
2618TLSv1.2 rsa_pkcs1_sha224
2619TLSv1.2 rsa_pkcs1_sha256
2620TLSv1.2 rsa_pkcs1_sha384
2621TLSv1.2 rsa_pkcs1_sha512
2622TLSv1.2 rsa_pss_rsae_sha256
2623TLSv1.2 rsa_pss_rsae_sha384
2624TLSv1.2 rsa_pss_rsae_sha512
2625
2626 SSL Certificate:
2627Signature Algorithm: sha256WithRSAEncryption
2628RSA Key Strength: 2048
2629
2630Subject: gesaguas.cl
2631Altnames: DNS:gesaguas.cl, DNS:www.gesaguas.cl
2632Issuer: Let's Encrypt Authority X3
2633
2634Not valid before: Mar 3 16:24:43 2020 GMT
2635Not valid after: Jun 1 16:24:43 2020 GMT
2636#################################################################################################################################
2637------------------------------------------------------------------------------------------------------------------------
2638
2639[ ! ] Starting SCANNER INURLBR 2.1 at [19-03-2020 13:41:45]
2640[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
2641It is the end user's responsibility to obey all applicable local, state and federal laws.
2642Developers assume no liability and are not responsible for any misuse or damage caused by this program
2643
2644[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.gesaguas.cl/output/inurlbr-www.gesaguas.cl ]
2645[ INFO ][ DORK ]::[ site:www.gesaguas.cl ]
2646[ INFO ][ SEARCHING ]:: {
2647[ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.mz ]
2648
2649[ INFO ][ SEARCHING ]::
2650-[:::]
2651[ INFO ][ ENGINE ]::[ GOOGLE API ]
2652
2653[ INFO ][ SEARCHING ]::
2654-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2655[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.gm ID: 003917828085772992913:gmoeray5sa8 ]
2656
2657[ INFO ][ SEARCHING ]::
2658-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2659
2660[ INFO ][ TOTAL FOUND VALUES ]:: [ 85 ]
2661
2662
2663 _[ - ]::--------------------------------------------------------------------------------------------------------------
2664|_[ + ] [ 0 / 85 ]-[13:42:07] [ - ]
2665|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/52 ]
2666|_[ + ] Exploit::
2667|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2668|_[ + ] More details:: / - / , ISP:
2669|_[ + ] Found:: UNIDENTIFIED
2670
2671 _[ - ]::--------------------------------------------------------------------------------------------------------------
2672|_[ + ] [ 1 / 85 ]-[13:42:10] [ - ]
2673|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/147 ]
2674|_[ + ] Exploit::
2675|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2676|_[ + ] More details:: / - / , ISP:
2677|_[ + ] Found:: UNIDENTIFIED
2678
2679 _[ - ]::--------------------------------------------------------------------------------------------------------------
2680|_[ + ] [ 2 / 85 ]-[13:42:14] [ - ]
2681|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/137 ]
2682|_[ + ] Exploit::
2683|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2684|_[ + ] More details:: / - / , ISP:
2685|_[ + ] Found:: UNIDENTIFIED
2686
2687 _[ - ]::--------------------------------------------------------------------------------------------------------------
2688|_[ + ] [ 3 / 85 ]-[13:42:16] [ - ]
2689|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/121 ]
2690|_[ + ] Exploit::
2691|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2692|_[ + ] More details:: / - / , ISP:
2693|_[ + ] Found:: UNIDENTIFIED
2694
2695 _[ - ]::--------------------------------------------------------------------------------------------------------------
2696|_[ + ] [ 4 / 85 ]-[13:42:20] [ - ]
2697|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/74 ]
2698|_[ + ] Exploit::
2699|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2700|_[ + ] More details:: / - / , ISP:
2701|_[ + ] Found:: UNIDENTIFIED
2702
2703 _[ - ]::--------------------------------------------------------------------------------------------------------------
2704|_[ + ] [ 5 / 85 ]-[13:42:22] [ - ]
2705|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/140 ]
2706|_[ + ] Exploit::
2707|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2708|_[ + ] More details:: / - / , ISP:
2709|_[ + ] Found:: UNIDENTIFIED
2710
2711 _[ - ]::--------------------------------------------------------------------------------------------------------------
2712|_[ + ] [ 6 / 85 ]-[13:42:25] [ - ]
2713|_[ + ] Target:: [ https://www.gesaguas.cl/blog/31 ]
2714|_[ + ] Exploit::
2715|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2716|_[ + ] More details:: / - / , ISP:
2717|_[ + ] Found:: UNIDENTIFIED
2718
2719 _[ - ]::--------------------------------------------------------------------------------------------------------------
2720|_[ + ] [ 7 / 85 ]-[13:42:27] [ - ]
2721|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/150 ]
2722|_[ + ] Exploit::
2723|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2724|_[ + ] More details:: / - / , ISP:
2725|_[ + ] Found:: UNIDENTIFIED
2726
2727 _[ - ]::--------------------------------------------------------------------------------------------------------------
2728|_[ + ] [ 8 / 85 ]-[13:42:30] [ - ]
2729|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/136 ]
2730|_[ + ] Exploit::
2731|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2732|_[ + ] More details:: / - / , ISP:
2733|_[ + ] Found:: UNIDENTIFIED
2734
2735 _[ - ]::--------------------------------------------------------------------------------------------------------------
2736|_[ + ] [ 9 / 85 ]-[13:42:32] [ - ]
2737|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/107 ]
2738|_[ + ] Exploit::
2739|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2740|_[ + ] More details:: / - / , ISP:
2741|_[ + ] Found:: UNIDENTIFIED
2742
2743 _[ - ]::--------------------------------------------------------------------------------------------------------------
2744|_[ + ] [ 10 / 85 ]-[13:42:35] [ - ]
2745|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/99 ]
2746|_[ + ] Exploit::
2747|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2748|_[ + ] More details:: / - / , ISP:
2749|_[ + ] Found:: UNIDENTIFIED
2750
2751 _[ - ]::--------------------------------------------------------------------------------------------------------------
2752|_[ + ] [ 11 / 85 ]-[13:42:37] [ - ]
2753|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/97 ]
2754|_[ + ] Exploit::
2755|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2756|_[ + ] More details:: / - / , ISP:
2757|_[ + ] Found:: UNIDENTIFIED
2758
2759 _[ - ]::--------------------------------------------------------------------------------------------------------------
2760|_[ + ] [ 12 / 85 ]-[13:42:40] [ - ]
2761|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/10 ]
2762|_[ + ] Exploit::
2763|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2764|_[ + ] More details:: / - / , ISP:
2765|_[ + ] Found:: UNIDENTIFIED
2766
2767 _[ - ]::--------------------------------------------------------------------------------------------------------------
2768|_[ + ] [ 13 / 85 ]-[13:42:42] [ - ]
2769|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/75 ]
2770|_[ + ] Exploit::
2771|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2772|_[ + ] More details:: / - / , ISP:
2773|_[ + ] Found:: UNIDENTIFIED
2774
2775 _[ - ]::--------------------------------------------------------------------------------------------------------------
2776|_[ + ] [ 14 / 85 ]-[13:42:45] [ - ]
2777|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/92 ]
2778|_[ + ] Exploit::
2779|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2780|_[ + ] More details:: / - / , ISP:
2781|_[ + ] Found:: UNIDENTIFIED
2782
2783 _[ - ]::--------------------------------------------------------------------------------------------------------------
2784|_[ + ] [ 15 / 85 ]-[13:42:48] [ - ]
2785|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/156 ]
2786|_[ + ] Exploit::
2787|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2788|_[ + ] More details:: / - / , ISP:
2789|_[ + ] Found:: UNIDENTIFIED
2790
2791 _[ - ]::--------------------------------------------------------------------------------------------------------------
2792|_[ + ] [ 16 / 85 ]-[13:42:50] [ - ]
2793|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/138 ]
2794|_[ + ] Exploit::
2795|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2796|_[ + ] More details:: / - / , ISP:
2797|_[ + ] Found:: UNIDENTIFIED
2798
2799 _[ - ]::--------------------------------------------------------------------------------------------------------------
2800|_[ + ] [ 17 / 85 ]-[13:42:53] [ - ]
2801|_[ + ] Target:: [ https://www.gesaguas.cl/blog/3 ]
2802|_[ + ] Exploit::
2803|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2804|_[ + ] More details:: / - / , ISP:
2805|_[ + ] Found:: UNIDENTIFIED
2806
2807 _[ - ]::--------------------------------------------------------------------------------------------------------------
2808|_[ + ] [ 18 / 85 ]-[13:42:55] [ - ]
2809|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/144 ]
2810|_[ + ] Exploit::
2811|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2812|_[ + ] More details:: / - / , ISP:
2813|_[ + ] Found:: UNIDENTIFIED
2814
2815 _[ - ]::--------------------------------------------------------------------------------------------------------------
2816|_[ + ] [ 19 / 85 ]-[13:42:58] [ - ]
2817|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/56 ]
2818|_[ + ] Exploit::
2819|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2820|_[ + ] More details:: / - / , ISP:
2821|_[ + ] Found:: UNIDENTIFIED
2822
2823 _[ - ]::--------------------------------------------------------------------------------------------------------------
2824|_[ + ] [ 20 / 85 ]-[13:43:00] [ - ]
2825|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/132 ]
2826|_[ + ] Exploit::
2827|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2828|_[ + ] More details:: / - / , ISP:
2829|_[ + ] Found:: UNIDENTIFIED
2830
2831 _[ - ]::--------------------------------------------------------------------------------------------------------------
2832|_[ + ] [ 21 / 85 ]-[13:43:03] [ - ]
2833|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/14 ]
2834|_[ + ] Exploit::
2835|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2836|_[ + ] More details:: / - / , ISP:
2837|_[ + ] Found:: UNIDENTIFIED
2838
2839 _[ - ]::--------------------------------------------------------------------------------------------------------------
2840|_[ + ] [ 22 / 85 ]-[13:43:06] [ - ]
2841|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/128 ]
2842|_[ + ] Exploit::
2843|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2844|_[ + ] More details:: / - / , ISP:
2845|_[ + ] Found:: UNIDENTIFIED
2846
2847 _[ - ]::--------------------------------------------------------------------------------------------------------------
2848|_[ + ] [ 23 / 85 ]-[13:43:10] [ - ]
2849|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/131 ]
2850|_[ + ] Exploit::
2851|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2852|_[ + ] More details:: / - / , ISP:
2853|_[ + ] Found:: UNIDENTIFIED
2854
2855 _[ - ]::--------------------------------------------------------------------------------------------------------------
2856|_[ + ] [ 24 / 85 ]-[13:43:13] [ - ]
2857|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/118 ]
2858|_[ + ] Exploit::
2859|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2860|_[ + ] More details:: / - / , ISP:
2861|_[ + ] Found:: UNIDENTIFIED
2862
2863 _[ - ]::--------------------------------------------------------------------------------------------------------------
2864|_[ + ] [ 25 / 85 ]-[13:43:15] [ - ]
2865|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/83 ]
2866|_[ + ] Exploit::
2867|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2868|_[ + ] More details:: / - / , ISP:
2869|_[ + ] Found:: UNIDENTIFIED
2870
2871 _[ - ]::--------------------------------------------------------------------------------------------------------------
2872|_[ + ] [ 26 / 85 ]-[13:43:17] [ - ]
2873|_[ + ] Target:: [ https://www.gesaguas.cl/blog/5 ]
2874|_[ + ] Exploit::
2875|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2876|_[ + ] More details:: / - / , ISP:
2877|_[ + ] Found:: UNIDENTIFIED
2878
2879 _[ - ]::--------------------------------------------------------------------------------------------------------------
2880|_[ + ] [ 27 / 85 ]-[13:43:20] [ - ]
2881|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/126 ]
2882|_[ + ] Exploit::
2883|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2884|_[ + ] More details:: / - / , ISP:
2885|_[ + ] Found:: UNIDENTIFIED
2886
2887 _[ - ]::--------------------------------------------------------------------------------------------------------------
2888|_[ + ] [ 28 / 85 ]-[13:43:23] [ - ]
2889|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/119 ]
2890|_[ + ] Exploit::
2891|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2892|_[ + ] More details:: / - / , ISP:
2893|_[ + ] Found:: UNIDENTIFIED
2894
2895 _[ - ]::--------------------------------------------------------------------------------------------------------------
2896|_[ + ] [ 29 / 85 ]-[13:43:25] [ - ]
2897|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/1 ]
2898|_[ + ] Exploit::
2899|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2900|_[ + ] More details:: / - / , ISP:
2901|_[ + ] Found:: UNIDENTIFIED
2902
2903 _[ - ]::--------------------------------------------------------------------------------------------------------------
2904|_[ + ] [ 30 / 85 ]-[13:43:28] [ - ]
2905|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/76 ]
2906|_[ + ] Exploit::
2907|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2908|_[ + ] More details:: / - / , ISP:
2909|_[ + ] Found:: UNIDENTIFIED
2910
2911 _[ - ]::--------------------------------------------------------------------------------------------------------------
2912|_[ + ] [ 31 / 85 ]-[13:43:31] [ - ]
2913|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/103 ]
2914|_[ + ] Exploit::
2915|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2916|_[ + ] More details:: / - / , ISP:
2917|_[ + ] Found:: UNIDENTIFIED
2918
2919 _[ - ]::--------------------------------------------------------------------------------------------------------------
2920|_[ + ] [ 32 / 85 ]-[13:43:33] [ - ]
2921|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/141 ]
2922|_[ + ] Exploit::
2923|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2924|_[ + ] More details:: / - / , ISP:
2925|_[ + ] Found:: UNIDENTIFIED
2926
2927 _[ - ]::--------------------------------------------------------------------------------------------------------------
2928|_[ + ] [ 33 / 85 ]-[13:43:36] [ - ]
2929|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/8 ]
2930|_[ + ] Exploit::
2931|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2932|_[ + ] More details:: / - / , ISP:
2933|_[ + ] Found:: UNIDENTIFIED
2934
2935 _[ - ]::--------------------------------------------------------------------------------------------------------------
2936|_[ + ] [ 34 / 85 ]-[13:43:39] [ - ]
2937|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/110 ]
2938|_[ + ] Exploit::
2939|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2940|_[ + ] More details:: / - / , ISP:
2941|_[ + ] Found:: UNIDENTIFIED
2942
2943 _[ - ]::--------------------------------------------------------------------------------------------------------------
2944|_[ + ] [ 35 / 85 ]-[13:43:41] [ - ]
2945|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/70 ]
2946|_[ + ] Exploit::
2947|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2948|_[ + ] More details:: / - / , ISP:
2949|_[ + ] Found:: UNIDENTIFIED
2950
2951 _[ - ]::--------------------------------------------------------------------------------------------------------------
2952|_[ + ] [ 36 / 85 ]-[13:43:43] [ - ]
2953|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/85 ]
2954|_[ + ] Exploit::
2955|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2956|_[ + ] More details:: / - / , ISP:
2957|_[ + ] Found:: UNIDENTIFIED
2958
2959 _[ - ]::--------------------------------------------------------------------------------------------------------------
2960|_[ + ] [ 37 / 85 ]-[13:43:49] [ - ]
2961|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/153 ]
2962|_[ + ] Exploit::
2963|_[ + ] Information Server:: , , IP:170.239.85.227:443
2964|_[ + ] More details:: / - / , ISP:
2965|_[ + ] Found:: UNIDENTIFIED
2966
2967 _[ - ]::--------------------------------------------------------------------------------------------------------------
2968|_[ + ] [ 38 / 85 ]-[13:43:52] [ - ]
2969|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/93 ]
2970|_[ + ] Exploit::
2971|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2972|_[ + ] More details:: / - / , ISP:
2973|_[ + ] Found:: UNIDENTIFIED
2974
2975 _[ - ]::--------------------------------------------------------------------------------------------------------------
2976|_[ + ] [ 39 / 85 ]-[13:43:55] [ - ]
2977|_[ + ] Target:: [ https://www.gesaguas.cl/blog/26 ]
2978|_[ + ] Exploit::
2979|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2980|_[ + ] More details:: / - / , ISP:
2981|_[ + ] Found:: UNIDENTIFIED
2982
2983 _[ - ]::--------------------------------------------------------------------------------------------------------------
2984|_[ + ] [ 40 / 85 ]-[13:43:58] [ - ]
2985|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/62 ]
2986|_[ + ] Exploit::
2987|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2988|_[ + ] More details:: / - / , ISP:
2989|_[ + ] Found:: UNIDENTIFIED
2990
2991 _[ - ]::--------------------------------------------------------------------------------------------------------------
2992|_[ + ] [ 41 / 85 ]-[13:44:01] [ - ]
2993|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/59 ]
2994|_[ + ] Exploit::
2995|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
2996|_[ + ] More details:: / - / , ISP:
2997|_[ + ] Found:: UNIDENTIFIED
2998
2999 _[ - ]::--------------------------------------------------------------------------------------------------------------
3000|_[ + ] [ 42 / 85 ]-[13:44:04] [ - ]
3001|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/134 ]
3002|_[ + ] Exploit::
3003|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3004|_[ + ] More details:: / - / , ISP:
3005|_[ + ] Found:: UNIDENTIFIED
3006
3007 _[ - ]::--------------------------------------------------------------------------------------------------------------
3008|_[ + ] [ 43 / 85 ]-[13:44:06] [ - ]
3009|_[ + ] Target:: [ https://www.gesaguas.cl/blog/17 ]
3010|_[ + ] Exploit::
3011|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3012|_[ + ] More details:: / - / , ISP:
3013|_[ + ] Found:: UNIDENTIFIED
3014
3015 _[ - ]::--------------------------------------------------------------------------------------------------------------
3016|_[ + ] [ 44 / 85 ]-[13:44:09] [ - ]
3017|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/9 ]
3018|_[ + ] Exploit::
3019|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3020|_[ + ] More details:: / - / , ISP:
3021|_[ + ] Found:: UNIDENTIFIED
3022
3023 _[ - ]::--------------------------------------------------------------------------------------------------------------
3024|_[ + ] [ 45 / 85 ]-[13:44:11] [ - ]
3025|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/84 ]
3026|_[ + ] Exploit::
3027|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3028|_[ + ] More details:: / - / , ISP:
3029|_[ + ] Found:: UNIDENTIFIED
3030
3031 _[ - ]::--------------------------------------------------------------------------------------------------------------
3032|_[ + ] [ 46 / 85 ]-[13:44:14] [ - ]
3033|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/63 ]
3034|_[ + ] Exploit::
3035|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3036|_[ + ] More details:: / - / , ISP:
3037|_[ + ] Found:: UNIDENTIFIED
3038
3039 _[ - ]::--------------------------------------------------------------------------------------------------------------
3040|_[ + ] [ 47 / 85 ]-[13:44:17] [ - ]
3041|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/129 ]
3042|_[ + ] Exploit::
3043|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3044|_[ + ] More details:: / - / , ISP:
3045|_[ + ] Found:: UNIDENTIFIED
3046
3047 _[ - ]::--------------------------------------------------------------------------------------------------------------
3048|_[ + ] [ 48 / 85 ]-[13:44:20] [ - ]
3049|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/117 ]
3050|_[ + ] Exploit::
3051|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3052|_[ + ] More details:: / - / , ISP:
3053|_[ + ] Found:: UNIDENTIFIED
3054
3055 _[ - ]::--------------------------------------------------------------------------------------------------------------
3056|_[ + ] [ 49 / 85 ]-[13:44:22] [ - ]
3057|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/58 ]
3058|_[ + ] Exploit::
3059|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3060|_[ + ] More details:: / - / , ISP:
3061|_[ + ] Found:: UNIDENTIFIED
3062
3063 _[ - ]::--------------------------------------------------------------------------------------------------------------
3064|_[ + ] [ 50 / 85 ]-[13:44:25] [ - ]
3065|_[ + ] Target:: [ https://www.gesaguas.cl/blog/13 ]
3066|_[ + ] Exploit::
3067|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3068|_[ + ] More details:: / - / , ISP:
3069|_[ + ] Found:: UNIDENTIFIED
3070
3071 _[ - ]::--------------------------------------------------------------------------------------------------------------
3072|_[ + ] [ 51 / 85 ]-[13:44:28] [ - ]
3073|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/157 ]
3074|_[ + ] Exploit::
3075|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3076|_[ + ] More details:: / - / , ISP:
3077|_[ + ] Found:: UNIDENTIFIED
3078
3079 _[ - ]::--------------------------------------------------------------------------------------------------------------
3080|_[ + ] [ 52 / 85 ]-[13:44:30] [ - ]
3081|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/154 ]
3082|_[ + ] Exploit::
3083|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3084|_[ + ] More details:: / - / , ISP:
3085|_[ + ] Found:: UNIDENTIFIED
3086
3087 _[ - ]::--------------------------------------------------------------------------------------------------------------
3088|_[ + ] [ 53 / 85 ]-[13:44:32] [ - ]
3089|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/98 ]
3090|_[ + ] Exploit::
3091|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3092|_[ + ] More details:: / - / , ISP:
3093|_[ + ] Found:: UNIDENTIFIED
3094
3095 _[ - ]::--------------------------------------------------------------------------------------------------------------
3096|_[ + ] [ 54 / 85 ]-[13:44:35] [ - ]
3097|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/148 ]
3098|_[ + ] Exploit::
3099|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3100|_[ + ] More details:: / - / , ISP:
3101|_[ + ] Found:: UNIDENTIFIED
3102
3103 _[ - ]::--------------------------------------------------------------------------------------------------------------
3104|_[ + ] [ 55 / 85 ]-[13:44:37] [ - ]
3105|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/65 ]
3106|_[ + ] Exploit::
3107|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3108|_[ + ] More details:: / - / , ISP:
3109|_[ + ] Found:: UNIDENTIFIED
3110
3111 _[ - ]::--------------------------------------------------------------------------------------------------------------
3112|_[ + ] [ 56 / 85 ]-[13:44:40] [ - ]
3113|_[ + ] Target:: [ https://www.gesaguas.cl/blog/20 ]
3114|_[ + ] Exploit::
3115|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3116|_[ + ] More details:: / - / , ISP:
3117|_[ + ] Found:: UNIDENTIFIED
3118
3119 _[ - ]::--------------------------------------------------------------------------------------------------------------
3120|_[ + ] [ 57 / 85 ]-[13:44:43] [ - ]
3121|_[ + ] Target:: [ https://www.gesaguas.cl/blog/15 ]
3122|_[ + ] Exploit::
3123|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3124|_[ + ] More details:: / - / , ISP:
3125|_[ + ] Found:: UNIDENTIFIED
3126
3127 _[ - ]::--------------------------------------------------------------------------------------------------------------
3128|_[ + ] [ 58 / 85 ]-[13:44:45] [ - ]
3129|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/50 ]
3130|_[ + ] Exploit::
3131|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3132|_[ + ] More details:: / - / , ISP:
3133|_[ + ] Found:: UNIDENTIFIED
3134
3135 _[ - ]::--------------------------------------------------------------------------------------------------------------
3136|_[ + ] [ 59 / 85 ]-[13:44:48] [ - ]
3137|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/146 ]
3138|_[ + ] Exploit::
3139|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3140|_[ + ] More details:: / - / , ISP:
3141|_[ + ] Found:: UNIDENTIFIED
3142
3143 _[ - ]::--------------------------------------------------------------------------------------------------------------
3144|_[ + ] [ 60 / 85 ]-[13:44:51] [ - ]
3145|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/143 ]
3146|_[ + ] Exploit::
3147|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3148|_[ + ] More details:: / - / , ISP:
3149|_[ + ] Found:: UNIDENTIFIED
3150
3151 _[ - ]::--------------------------------------------------------------------------------------------------------------
3152|_[ + ] [ 61 / 85 ]-[13:44:53] [ - ]
3153|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/123 ]
3154|_[ + ] Exploit::
3155|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3156|_[ + ] More details:: / - / , ISP:
3157|_[ + ] Found:: UNIDENTIFIED
3158
3159 _[ - ]::--------------------------------------------------------------------------------------------------------------
3160|_[ + ] [ 62 / 85 ]-[13:44:56] [ - ]
3161|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/48 ]
3162|_[ + ] Exploit::
3163|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3164|_[ + ] More details:: / - / , ISP:
3165|_[ + ] Found:: UNIDENTIFIED
3166
3167 _[ - ]::--------------------------------------------------------------------------------------------------------------
3168|_[ + ] [ 63 / 85 ]-[13:44:58] [ - ]
3169|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/95 ]
3170|_[ + ] Exploit::
3171|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3172|_[ + ] More details:: / - / , ISP:
3173|_[ + ] Found:: UNIDENTIFIED
3174
3175 _[ - ]::--------------------------------------------------------------------------------------------------------------
3176|_[ + ] [ 64 / 85 ]-[13:45:02] [ - ]
3177|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/80 ]
3178|_[ + ] Exploit::
3179|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3180|_[ + ] More details:: / - / , ISP:
3181|_[ + ] Found:: UNIDENTIFIED
3182
3183 _[ - ]::--------------------------------------------------------------------------------------------------------------
3184|_[ + ] [ 65 / 85 ]-[13:45:05] [ - ]
3185|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/69 ]
3186|_[ + ] Exploit::
3187|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3188|_[ + ] More details:: / - / , ISP:
3189|_[ + ] Found:: UNIDENTIFIED
3190
3191 _[ - ]::--------------------------------------------------------------------------------------------------------------
3192|_[ + ] [ 66 / 85 ]-[13:45:07] [ - ]
3193|_[ + ] Target:: [ https://www.gesaguas.cl/blog/27 ]
3194|_[ + ] Exploit::
3195|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3196|_[ + ] More details:: / - / , ISP:
3197|_[ + ] Found:: UNIDENTIFIED
3198
3199 _[ - ]::--------------------------------------------------------------------------------------------------------------
3200|_[ + ] [ 67 / 85 ]-[13:45:10] [ - ]
3201|_[ + ] Target:: [ https://www.gesaguas.cl/blog/6 ]
3202|_[ + ] Exploit::
3203|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3204|_[ + ] More details:: / - / , ISP:
3205|_[ + ] Found:: UNIDENTIFIED
3206
3207 _[ - ]::--------------------------------------------------------------------------------------------------------------
3208|_[ + ] [ 68 / 85 ]-[13:45:15] [ - ]
3209|_[ + ] Target:: [ https://www.gesaguas.cl/blog/24 ]
3210|_[ + ] Exploit::
3211|_[ + ] Information Server:: , , IP:170.239.85.227:443
3212|_[ + ] More details:: / - / , ISP:
3213|_[ + ] Found:: UNIDENTIFIED
3214
3215 _[ - ]::--------------------------------------------------------------------------------------------------------------
3216|_[ + ] [ 69 / 85 ]-[13:45:19] [ - ]
3217|_[ + ] Target:: [ https://www.gesaguas.cl/blog/16 ]
3218|_[ + ] Exploit::
3219|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3220|_[ + ] More details:: / - / , ISP:
3221|_[ + ] Found:: UNIDENTIFIED
3222
3223 _[ - ]::--------------------------------------------------------------------------------------------------------------
3224|_[ + ] [ 70 / 85 ]-[13:45:23] [ - ]
3225|_[ + ] Target:: [ https://www.gesaguas.cl/blog/12 ]
3226|_[ + ] Exploit::
3227|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3228|_[ + ] More details:: / - / , ISP:
3229|_[ + ] Found:: UNIDENTIFIED
3230
3231 _[ - ]::--------------------------------------------------------------------------------------------------------------
3232|_[ + ] [ 71 / 85 ]-[13:45:25] [ - ]
3233|_[ + ] Target:: [ https://www.gesaguas.cl/blog/38 ]
3234|_[ + ] Exploit::
3235|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3236|_[ + ] More details:: / - / , ISP:
3237|_[ + ] Found:: UNIDENTIFIED
3238
3239 _[ - ]::--------------------------------------------------------------------------------------------------------------
3240|_[ + ] [ 72 / 85 ]-[13:45:28] [ - ]
3241|_[ + ] Target:: [ https://www.gesaguas.cl/blog/28 ]
3242|_[ + ] Exploit::
3243|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3244|_[ + ] More details:: / - / , ISP:
3245|_[ + ] Found:: UNIDENTIFIED
3246
3247 _[ - ]::--------------------------------------------------------------------------------------------------------------
3248|_[ + ] [ 73 / 85 ]-[13:45:31] [ - ]
3249|_[ + ] Target:: [ https://www.gesaguas.cl/blog/14 ]
3250|_[ + ] Exploit::
3251|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3252|_[ + ] More details:: / - / , ISP:
3253|_[ + ] Found:: UNIDENTIFIED
3254
3255 _[ - ]::--------------------------------------------------------------------------------------------------------------
3256|_[ + ] [ 74 / 85 ]-[13:45:33] [ - ]
3257|_[ + ] Target:: [ https://www.gesaguas.cl/blog/34 ]
3258|_[ + ] Exploit::
3259|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3260|_[ + ] More details:: / - / , ISP:
3261|_[ + ] Found:: UNIDENTIFIED
3262
3263 _[ - ]::--------------------------------------------------------------------------------------------------------------
3264|_[ + ] [ 75 / 85 ]-[13:45:35] [ - ]
3265|_[ + ] Target:: [ https://www.gesaguas.cl/blog/4 ]
3266|_[ + ] Exploit::
3267|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3268|_[ + ] More details:: / - / , ISP:
3269|_[ + ] Found:: UNIDENTIFIED
3270
3271 _[ - ]::--------------------------------------------------------------------------------------------------------------
3272|_[ + ] [ 76 / 85 ]-[13:45:38] [ - ]
3273|_[ + ] Target:: [ https://www.gesaguas.cl/blog/22 ]
3274|_[ + ] Exploit::
3275|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3276|_[ + ] More details:: / - / , ISP:
3277|_[ + ] Found:: UNIDENTIFIED
3278
3279 _[ - ]::--------------------------------------------------------------------------------------------------------------
3280|_[ + ] [ 77 / 85 ]-[13:45:40] [ - ]
3281|_[ + ] Target:: [ https://www.gesaguas.cl/blog/30 ]
3282|_[ + ] Exploit::
3283|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3284|_[ + ] More details:: / - / , ISP:
3285|_[ + ] Found:: UNIDENTIFIED
3286
3287 _[ - ]::--------------------------------------------------------------------------------------------------------------
3288|_[ + ] [ 78 / 85 ]-[13:45:44] [ - ]
3289|_[ + ] Target:: [ https://www.gesaguas.cl/blog/23 ]
3290|_[ + ] Exploit::
3291|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3292|_[ + ] More details:: / - / , ISP:
3293|_[ + ] Found:: UNIDENTIFIED
3294
3295 _[ - ]::--------------------------------------------------------------------------------------------------------------
3296|_[ + ] [ 79 / 85 ]-[13:45:46] [ - ]
3297|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/111 ]
3298|_[ + ] Exploit::
3299|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3300|_[ + ] More details:: / - / , ISP:
3301|_[ + ] Found:: UNIDENTIFIED
3302
3303 _[ - ]::--------------------------------------------------------------------------------------------------------------
3304|_[ + ] [ 80 / 85 ]-[13:45:48] [ - ]
3305|_[ + ] Target:: [ https://www.gesaguas.cl/blog/29 ]
3306|_[ + ] Exploit::
3307|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3308|_[ + ] More details:: / - / , ISP:
3309|_[ + ] Found:: UNIDENTIFIED
3310
3311 _[ - ]::--------------------------------------------------------------------------------------------------------------
3312|_[ + ] [ 81 / 85 ]-[13:45:53] [ - ]
3313|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/91 ]
3314|_[ + ] Exploit::
3315|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3316|_[ + ] More details:: / - / , ISP:
3317|_[ + ] Found:: UNIDENTIFIED
3318
3319 _[ - ]::--------------------------------------------------------------------------------------------------------------
3320|_[ + ] [ 82 / 85 ]-[13:45:55] [ - ]
3321|_[ + ] Target:: [ https://www.gesaguas.cl/blog/10 ]
3322|_[ + ] Exploit::
3323|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3324|_[ + ] More details:: / - / , ISP:
3325|_[ + ] Found:: UNIDENTIFIED
3326
3327 _[ - ]::--------------------------------------------------------------------------------------------------------------
3328|_[ + ] [ 83 / 85 ]-[13:45:58] [ - ]
3329|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/100 ]
3330|_[ + ] Exploit::
3331|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3332|_[ + ] More details:: / - / , ISP:
3333|_[ + ] Found:: UNIDENTIFIED
3334
3335 _[ - ]::--------------------------------------------------------------------------------------------------------------
3336|_[ + ] [ 84 / 85 ]-[13:46:00] [ - ]
3337|_[ + ] Target:: [ https://www.gesaguas.cl/derecho/78 ]
3338|_[ + ] Exploit::
3339|_[ + ] Information Server:: HTTP/1.1 200 OK, X-Powered-By: Express, IP:170.239.85.227:443
3340|_[ + ] More details:: / - / , ISP:
3341|_[ + ] Found:: UNIDENTIFIED
3342
3343[ INFO ] [ Shutting down ]
3344[ INFO ] [ End of process INURLBR at [19-03-2020 13:46:00]
3345[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
3346[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.gesaguas.cl/output/inurlbr-www.gesaguas.cl ]
3347|_________________________________________________________________________________________
3348
3349\_________________________________________________________________________________________/
3350#################################################################################################################################
3351Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-19 13:46 EDT
3352NSE: Loaded 57 scripts for scanning.
3353NSE: Script Pre-scanning.
3354Initiating NSE at 13:46
3355Completed NSE at 13:46, 0.00s elapsed
3356Initiating NSE at 13:46
3357Completed NSE at 13:46, 0.00s elapsed
3358Initiating Parallel DNS resolution of 1 host. at 13:46
3359Completed Parallel DNS resolution of 1 host. at 13:46, 0.02s elapsed
3360Initiating SYN Stealth Scan at 13:46
3361Scanning www.gesaguas.cl (170.239.85.227) [1 port]
3362Discovered open port 3306/tcp on 170.239.85.227
3363Completed SYN Stealth Scan at 13:46, 0.42s elapsed (1 total ports)
3364Initiating Service scan at 13:46
3365Scanning 1 service on www.gesaguas.cl (170.239.85.227)
3366Completed Service scan at 13:46, 0.82s elapsed (1 service on 1 host)
3367Initiating OS detection (try #1) against www.gesaguas.cl (170.239.85.227)
3368Retrying OS detection (try #2) against www.gesaguas.cl (170.239.85.227)
3369Initiating Traceroute at 13:46
3370Completed Traceroute at 13:46, 3.47s elapsed
3371Initiating Parallel DNS resolution of 14 hosts. at 13:46
3372Completed Parallel DNS resolution of 14 hosts. at 13:46, 0.89s elapsed
3373NSE: Script scanning 170.239.85.227.
3374Initiating NSE at 13:46
3375NSE Timing: About 72.00% done; ETC: 13:48 (0:00:30 remaining)
3376Completed NSE at 13:47, 90.83s elapsed
3377Initiating NSE at 13:47
3378Completed NSE at 13:47, 0.05s elapsed
3379Nmap scan report for www.gesaguas.cl (170.239.85.227)
3380Host is up (0.51s latency).
3381rDNS record for 170.239.85.227: gesaguas.cl
3382
3383PORT STATE SERVICE VERSION
33843306/tcp open mysql MySQL (blocked - too many connection errors)
3385|_mysql-empty-password: Host '45.132.192.69' is blocked because of many connection errors; unblock with 'mysqladmin flush-hosts'
3386| mysql-enum:
3387| Accounts: No valid accounts found
3388| Statistics: Performed 5 guesses in 1 seconds, average tps: 5.0
3389|_ ERROR: Host '45.132.192.69' is blocked because of many connection errors; unblock with 'mysqladmin flush-hosts'
3390|_mysql-vuln-cve2012-2122: ERROR: Script execution failed (use -d to debug)
3391Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3392Aggressive OS guesses: Linux 3.10 - 4.11 (95%), Linux 3.12 (95%), Linux 3.13 (95%), Linux 3.13 or 4.2 (95%), Linux 3.16 (95%), Linux 3.2 - 4.9 (95%), Linux 3.8 - 3.11 (95%), Linux 4.2 (95%), Linux 4.4 (95%), Linux 3.18 (94%)
3393No exact OS matches for host (test conditions non-ideal).
3394Uptime guess: 144.154 days (since Sun Oct 27 10:05:34 2019)
3395Network Distance: 20 hops
3396TCP Sequence Prediction: Difficulty=261 (Good luck!)
3397IP ID Sequence Generation: All zeros
3398
3399TRACEROUTE (using port 3306/tcp)
3400HOP RTT ADDRESS
34011 127.00 ms 10.203.19.1
34022 ...
34033 126.55 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
34044 126.38 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
34055 134.65 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
34066 156.28 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
34077 160.81 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
34088 250.73 ms be12194.ccr41.lon13.atlas.cogentco.com (154.54.56.93)
34099 248.68 ms be12497.ccr41.par01.atlas.cogentco.com (154.54.56.130)
341010 251.68 ms be3627.ccr41.jfk02.atlas.cogentco.com (66.28.4.197)
341111 254.21 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
341212 260.15 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
341313 279.42 ms be3482.ccr21.mia01.atlas.cogentco.com (154.54.24.146)
341414 274.82 ms be3400.ccr21.mia03.atlas.cogentco.com (154.54.47.18)
341515 ... 19
341620 784.19 ms gesaguas.cl (170.239.85.227)
3417
3418NSE: Script Post-scanning.
3419Initiating NSE at 13:47
3420Completed NSE at 13:47, 0.05s elapsed
3421Initiating NSE at 13:47
3422Completed NSE at 13:47, 0.05s elapsed #################################################################################################################################
3423Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-19 13:01 EDT
3424Nmap scan report for gesaguas.cl (170.239.85.227)
3425Host is up (0.31s latency).
3426Not shown: 448 closed ports, 24 filtered ports
3427Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
3428PORT STATE SERVICE VERSION
342980/tcp open http
3430| fingerprint-strings:
3431| DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, X11Probe:
3432| HTTP/1.1 400 Bad Request
3433| Connection: close
3434| FourOhFourRequest:
3435| HTTP/1.1 301 Moved Permanently
3436| Location: https://undefined/nice%20ports%2C/Tri%6Eity.txt%2ebak
3437| Date: Thu, 19 Mar 2020 17:01:08 GMT
3438| Connection: close
3439| GetRequest, HTTPOptions:
3440| HTTP/1.1 301 Moved Permanently
3441| Location: https://undefined/
3442| Date: Thu, 19 Mar 2020 17:01:05 GMT
3443|_ Connection: close
3444|_http-title: Did not follow redirect to https://gesaguas.cl/
3445443/tcp open ssl/http Node.js Express framework
3446| ssl-cert: Subject: commonName=gesaguas.cl
3447| Subject Alternative Name: DNS:gesaguas.cl, DNS:www.gesaguas.cl
3448| Not valid before: 2020-03-03T16:24:43
3449|_Not valid after: 2020-06-01T16:24:43
3450|_ssl-date: TLS randomness does not represent time
3451| tls-alpn:
3452|_ http/1.1
34533306/tcp open mysql MySQL 5.5.62-0ubuntu0.14.04.1
3454| mysql-info:
3455| Protocol: 10
3456| Version: 5.5.62-0ubuntu0.14.04.1
3457| Thread ID: 87992
3458| Capabilities flags: 63487
3459| Some Capabilities: Support41Auth, LongColumnFlag, Speaks41ProtocolOld, IgnoreSpaceBeforeParenthesis, IgnoreSigpipes, ODBCClient, SupportsLoadDataLocal, ConnectWithDatabase, SupportsCompression, InteractiveClient, Speaks41ProtocolNew, LongPassword, SupportsTransactions, DontAllowDatabaseTableColumn, FoundRows, SupportsMultipleStatments, SupportsMultipleResults, SupportsAuthPlugins
3460| Status: Autocommit
3461| Salt: {1}G(3e%$%.VIJv7KVKU
3462|_ Auth Plugin Name: mysql_native_password
346322222/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.6 (Ubuntu Linux; protocol 2.0)
3464| ssh-hostkey:
3465| 1024 9a:39:e1:22:a5:9a:c9:97:6d:34:eb:8f:be:55:d6:ef (DSA)
3466| 2048 2c:b0:2b:98:33:32:38:a1:77:9b:18:78:db:2d:3f:54 (RSA)
3467| 256 8c:88:3c:18:da:79:89:3b:df:2b:d1:b6:37:63:39:3a (ECDSA)
3468|_ 256 e8:14:52:33:76:4b:9e:3a:09:a7:ef:f7:4f:cf:d7:02 (ED25519)
34691 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
3470SF-Port80-TCP:V=7.80%I=7%D=3/19%Time=5E73A556%P=x86_64-pc-linux-gnu%r(GetR
3471SF:equest,78,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
3472SF:ps://undefined/\r\nDate:\x20Thu,\x2019\x20Mar\x202020\x2017:01:05\x20GM
3473SF:T\r\nConnection:\x20close\r\n\r\n")%r(HTTPOptions,78,"HTTP/1\.1\x20301\
3474SF:x20Moved\x20Permanently\r\nLocation:\x20https://undefined/\r\nDate:\x20
3475SF:Thu,\x2019\x20Mar\x202020\x2017:01:05\x20GMT\r\nConnection:\x20close\r\
3476SF:n\r\n")%r(RTSPRequest,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnect
3477SF:ion:\x20close\r\n\r\n")%r(X11Probe,2F,"HTTP/1\.1\x20400\x20Bad\x20Reque
3478SF:st\r\nConnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9B,"HTTP/1\.1\
3479SF:x20301\x20Moved\x20Permanently\r\nLocation:\x20https://undefined/nice%2
3480SF:0ports%2C/Tri%6Eity\.txt%2ebak\r\nDate:\x20Thu,\x2019\x20Mar\x202020\x2
3481SF:017:01:08\x20GMT\r\nConnection:\x20close\r\n\r\n")%r(RPCCheck,2F,"HTTP/
3482SF:1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(DNSVe
3483SF:rsionBindReqTCP,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x
3484SF:20close\r\n\r\n")%r(DNSStatusRequestTCP,2F,"HTTP/1\.1\x20400\x20Bad\x20
3485SF:Request\r\nConnection:\x20close\r\n\r\n")%r(Help,2F,"HTTP/1\.1\x20400\x
3486SF:20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SSLSessionReq,2F,"
3487SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(
3488SF:TerminalServerCookie,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnecti
3489SF:on:\x20close\r\n\r\n")%r(TLSSessionReq,2F,"HTTP/1\.1\x20400\x20Bad\x20R
3490SF:equest\r\nConnection:\x20close\r\n\r\n")%r(Kerberos,2F,"HTTP/1\.1\x2040
3491SF:0\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SMBProgNeg,2F,"
3492SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(
3493SF:LPDString,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20clos
3494SF:e\r\n\r\n")%r(LDAPSearchReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nC
3495SF:onnection:\x20close\r\n\r\n")%r(LDAPBindReq,2F,"HTTP/1\.1\x20400\x20Bad
3496SF:\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SIPOptions,2F,"HTTP/1\.
3497SF:1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(LANDesk-
3498SF:RC,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r
3499SF:\n")%r(TerminalServer,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnect
3500SF:ion:\x20close\r\n\r\n");
3501Aggressive OS guesses: Linux 3.10 - 4.11 (95%), Linux 3.13 (95%), Linux 3.13 or 4.2 (95%), Linux 4.2 (95%), Linux 4.4 (95%), Linux 3.16 (94%), Linux 3.16 - 4.6 (94%), Linux 3.12 (93%), Linux 3.2 - 4.9 (93%), Linux 3.8 - 3.11 (93%)
3502No exact OS matches for host (test conditions non-ideal).
3503Network Distance: 20 hops
3504Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
3505
3506TRACEROUTE (using port 80/tcp)
3507HOP RTT ADDRESS
35081 126.51 ms 10.203.19.1
35092 ...
35103 132.75 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
35114 127.71 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
35125 133.29 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
35136 154.67 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
35147 160.12 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
35158 247.80 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
35169 246.08 ms be12497.ccr41.par01.atlas.cogentco.com (154.54.56.130)
351710 244.25 ms be3627.ccr41.jfk02.atlas.cogentco.com (66.28.4.197)
351811 247.12 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
351912 257.13 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
352013 273.96 ms be3482.ccr21.mia01.atlas.cogentco.com (154.54.24.146)
352114 274.14 ms be3400.ccr21.mia03.atlas.cogentco.com (154.54.47.18)
352215 277.03 ms hu0-4-0-4.ccr21.mia03.atlas.cogentco.com (38.88.164.113)
352316 384.65 ms 190.211.161.121
352417 387.42 ms 190.211.161.121
352518 391.86 ms 190.211.161.122
352619 ...
352720 405.16 ms gesaguas.cl (170.239.85.227)
3528#################################################################################################################################
3529Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-19 13:02 EDT
3530Warning: 170.239.85.227 giving up on port because retransmission cap hit (2).
3531Nmap scan report for gesaguas.cl (170.239.85.227)
3532Host is up (0.25s latency).
3533Not shown: 22 closed ports
3534PORT STATE SERVICE VERSION
353553/udp open|filtered domain
353667/udp open|filtered dhcps
353769/udp open|filtered tftp
3538139/udp open|filtered netbios-ssn
3539162/udp open|filtered snmptrap
35402049/udp open|filtered nfs
3541Too many fingerprints match this host to give specific OS details
3542Network Distance: 19 hops
3543
3544TRACEROUTE (using port 68/udp)
3545HOP RTT ADDRESS
35461 126.41 ms 10.203.19.1
35472 ...
35483 128.24 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
35494 131.38 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
35505 135.82 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
35516 156.09 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
35527 161.55 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
35538 245.12 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
35549 247.99 ms be12489.ccr42.par01.atlas.cogentco.com (154.54.57.70)
355510 251.61 ms be2318.ccr32.bio02.atlas.cogentco.com (154.54.61.117)
355611 252.60 ms be2332.ccr41.iad02.atlas.cogentco.com (154.54.85.245)
355712 253.84 ms be3084.ccr42.dca01.atlas.cogentco.com (154.54.30.65)
355813 262.02 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
355914 ... 16
356017 391.62 ms 190.211.161.122
356118 ...
356219 391.12 ms gesaguas.cl (170.239.85.227)
3563#################################################################################################################################
3564Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-19 13:04 EDT
3565Nmap scan report for gesaguas.cl (170.239.85.227)
3566Host is up (0.26s latency).
3567
3568PORT STATE SERVICE VERSION
356967/tcp closed dhcps
357067/udp open|filtered dhcps
3571|_dhcp-discover: ERROR: Script execution failed (use -d to debug)
3572Too many fingerprints match this host to give specific OS details
3573Network Distance: 19 hops
3574
3575TRACEROUTE (using port 67/tcp)
3576HOP RTT ADDRESS
35771 128.39 ms 10.203.19.1
35782 ...
35793 127.60 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
35804 126.80 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
35815 132.15 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
35826 150.16 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
35837 155.85 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
35848 251.34 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
35859 249.24 ms be12489.ccr42.par01.atlas.cogentco.com (154.54.57.70)
358610 249.82 ms be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169)
358711 253.24 ms be2332.ccr41.iad02.atlas.cogentco.com (154.54.85.245)
358812 245.51 ms be3084.ccr42.dca01.atlas.cogentco.com (154.54.30.65)
358913 267.35 ms be3483.ccr22.mia01.atlas.cogentco.com (154.54.28.50)
359014 272.21 ms be3401.ccr21.mia03.atlas.cogentco.com (154.54.47.30)
359115 278.41 ms be3401.ccr21.mia03.atlas.cogentco.com (154.54.47.30)
359216 382.27 ms 190.211.161.121
359317 431.86 ms 190.211.161.122
359418 ...
359519 386.52 ms gesaguas.cl (170.239.85.227)
3596#################################################################################################################################
3597Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-19 13:06 EDT
3598Nmap scan report for gesaguas.cl (170.239.85.227)
3599Host is up (0.26s latency).
3600
3601PORT STATE SERVICE VERSION
360269/tcp closed tftp
360369/udp closed tftp
3604Too many fingerprints match this host to give specific OS details
3605Network Distance: 20 hops
3606
3607TRACEROUTE (using port 69/tcp)
3608HOP RTT ADDRESS
36091 127.38 ms 10.203.19.1
36102 ...
36113 128.27 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
36124 128.26 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
36135 133.45 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
36146 151.29 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
36157 157.18 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
36168 246.49 ms be12194.ccr41.lon13.atlas.cogentco.com (154.54.56.93)
36179 245.64 ms be12497.ccr41.par01.atlas.cogentco.com (154.54.56.130)
361810 248.39 ms be3627.ccr41.jfk02.atlas.cogentco.com (66.28.4.197)
361911 248.34 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
362012 256.75 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
362113 276.61 ms be3482.ccr21.mia01.atlas.cogentco.com (154.54.24.146)
362214 278.19 ms be3400.ccr21.mia03.atlas.cogentco.com (154.54.47.18)
362315 278.62 ms hu0-4-0-4.ccr21.mia03.atlas.cogentco.com (38.88.164.113)
362416 280.61 ms hu0-4-0-4.ccr21.mia03.atlas.cogentco.com (38.88.164.113)
362517 387.57 ms 190.211.161.121
362618 ... 19
362720 385.06 ms gesaguas.cl (170.239.85.227)
3628#################################################################################################################################
3629http://170.239.85.227 [301 Moved Permanently] IP[170.239.85.227], RedirectLocation[https://170.239.85.227/]
3630https://170.239.85.227/ [200 OK] Bootstrap[3.3.5,3.3.7], HTML5, IP[170.239.85.227], JQuery[3.4.0], Open-Graph-Protocol[Empresa], Script[text/javascript], X-Powered-By[Express]
3631#################################################################################################################################
3632HTTP/1.1 301 Moved Permanently
3633Location: https://170.239.85.227/
3634Date: Thu, 19 Mar 2020 17:07:22 GMT
3635Connection: keep-alive
3636
3637HTTP/1.1 301 Moved Permanently
3638Location: https://170.239.85.227/
3639Date: Thu, 19 Mar 2020 17:07:23 GMT
3640Connection: keep-alive
3641#################################################################################################################################
3642Version: 2.0.0-static
3643OpenSSL 1.1.1e-dev xx XXX xxxx
3644
3645Connected to 170.239.85.227
3646
3647Testing SSL server 170.239.85.227 on port 443 using SNI name 170.239.85.227
3648
3649 SSL/TLS Protocols:
3650SSLv2 disabled
3651SSLv3 disabled
3652TLSv1.0 enabled
3653TLSv1.1 enabled
3654TLSv1.2 enabled
3655TLSv1.3 disabled
3656
3657 TLS Fallback SCSV:
3658Server supports TLS Fallback SCSV
3659
3660 TLS renegotiation:
3661Secure session renegotiation supported
3662
3663 TLS Compression:
3664Compression disabled
3665
3666 Heartbleed:
3667TLSv1.2 not vulnerable to heartbleed
3668TLSv1.1 not vulnerable to heartbleed
3669TLSv1.0 not vulnerable to heartbleed
3670
3671 Supported Server Cipher(s):
3672Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve 25519 DHE 253
3673Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve 25519 DHE 253
3674Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve 25519 DHE 253
3675Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve 25519 DHE 253
3676Accepted TLSv1.2 256 bits ECDHE-RSA-CHACHA20-POLY1305 Curve 25519 DHE 253
3677Accepted TLSv1.2 256 bits ECDHE-ARIA256-GCM-SHA384 Curve 25519 DHE 253
3678Accepted TLSv1.2 128 bits ECDHE-ARIA128-GCM-SHA256 Curve 25519 DHE 253
3679Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve 25519 DHE 253
3680Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve 25519 DHE 253
3681Accepted TLSv1.2 256 bits AES256-GCM-SHA384
3682Accepted TLSv1.2 256 bits AES256-CCM8
3683Accepted TLSv1.2 256 bits AES256-CCM
3684Accepted TLSv1.2 256 bits ARIA256-GCM-SHA384
3685Accepted TLSv1.2 128 bits AES128-GCM-SHA256
3686Accepted TLSv1.2 128 bits AES128-CCM8
3687Accepted TLSv1.2 128 bits AES128-CCM
3688Accepted TLSv1.2 128 bits ARIA128-GCM-SHA256
3689Accepted TLSv1.2 256 bits AES256-SHA256
3690Accepted TLSv1.2 128 bits AES128-SHA256
3691Accepted TLSv1.2 256 bits AES256-SHA
3692Accepted TLSv1.2 128 bits AES128-SHA
3693Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve 25519 DHE 253
3694Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve 25519 DHE 253
3695Accepted TLSv1.1 256 bits AES256-SHA
3696Accepted TLSv1.1 128 bits AES128-SHA
3697Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve 25519 DHE 253
3698Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve 25519 DHE 253
3699Accepted TLSv1.0 256 bits AES256-SHA
3700Accepted TLSv1.0 128 bits AES128-SHA
3701
3702 Server Key Exchange Group(s):
3703TLSv1.2 128 bits secp256r1 (NIST P-256)
3704TLSv1.2 192 bits secp384r1 (NIST P-384)
3705TLSv1.2 260 bits secp521r1 (NIST P-521)
3706TLSv1.2 128 bits x25519
3707TLSv1.2 224 bits x448
3708
3709 Server Signature Algorithm(s):
3710TLSv1.2 rsa_pkcs1_sha1
3711TLSv1.2 rsa_pkcs1_sha224
3712TLSv1.2 rsa_pkcs1_sha256
3713TLSv1.2 rsa_pkcs1_sha384
3714TLSv1.2 rsa_pkcs1_sha512
3715TLSv1.2 rsa_pss_rsae_sha256
3716TLSv1.2 rsa_pss_rsae_sha384
3717TLSv1.2 rsa_pss_rsae_sha512
3718
3719 SSL Certificate:
3720Signature Algorithm: sha256WithRSAEncryption
3721RSA Key Strength: 2048
3722
3723Subject: gesaguas.cl
3724Altnames: DNS:gesaguas.cl, DNS:www.gesaguas.cl
3725Issuer: Let's Encrypt Authority X3
3726
3727Not valid before: Mar 3 16:24:43 2020 GMT
3728Not valid after: Jun 1 16:24:43 2020 GMT
3729#################################################################################################################################
3730Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-19 13:10 EDT
3731NSE: [mysql-brute] usernames: Time limit 3m00s exceeded.
3732NSE: [mysql-brute] usernames: Time limit 3m00s exceeded.
3733NSE: [mysql-brute] passwords: Time limit 3m00s exceeded.
3734Nmap scan report for gesaguas.cl (170.239.85.227)
3735Host is up (0.32s latency).
3736
3737PORT STATE SERVICE VERSION
37383306/tcp open mysql MySQL 5.5.62-0ubuntu0.14.04.1
3739| mysql-brute:
3740| Accounts: No valid accounts found
3741|_ Statistics: Performed 4251 guesses in 180 seconds, average tps: 23.1
3742| mysql-enum:
3743| Valid usernames:
3744| root:<empty> - Valid credentials
3745| test:<empty> - Valid credentials
3746| netadmin:<empty> - Valid credentials
3747| user:<empty> - Valid credentials
3748| guest:<empty> - Valid credentials
3749| sysadmin:<empty> - Valid credentials
3750| administrator:<empty> - Valid credentials
3751| webadmin:<empty> - Valid credentials
3752| admin:<empty> - Valid credentials
3753| web:<empty> - Valid credentials
3754|_ Statistics: Performed 10 guesses in 2 seconds, average tps: 5.0
3755| mysql-info:
3756| Protocol: 10
3757| Version: 5.5.62-0ubuntu0.14.04.1
3758| Thread ID: 87996
3759| Capabilities flags: 63487
3760| Some Capabilities: SupportsTransactions, DontAllowDatabaseTableColumn, ODBCClient, ConnectWithDatabase, FoundRows, Support41Auth, LongPassword, IgnoreSpaceBeforeParenthesis, Speaks41ProtocolOld, LongColumnFlag, SupportsCompression, InteractiveClient, SupportsLoadDataLocal, IgnoreSigpipes, Speaks41ProtocolNew, SupportsMultipleStatments, SupportsMultipleResults, SupportsAuthPlugins
3761| Status: Autocommit
3762| Salt: hkc1e.P*!cTYB|j"cPEK
3763|_ Auth Plugin Name: mysql_native_password
3764|_mysql-vuln-cve2012-2122: ERROR: Script execution failed (use -d to debug)
3765Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3766Aggressive OS guesses: Linux 3.10 - 4.11 (95%), Linux 3.12 (95%), Linux 3.13 (95%), Linux 3.13 or 4.2 (95%), Linux 3.16 (95%), Linux 3.18 (95%), Linux 3.2 - 4.9 (95%), Linux 3.8 - 3.11 (95%), Linux 4.2 (95%), Linux 4.4 (95%)
3767No exact OS matches for host (test conditions non-ideal).
3768Network Distance: 19 hops
3769
3770TRACEROUTE (using port 3306/tcp)
3771HOP RTT ADDRESS
37721 129.85 ms 10.203.19.1
37732 ...
37743 130.48 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
37754 126.71 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
37765 131.74 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
37776 156.35 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
37787 161.03 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
37798 252.73 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
37809 250.65 ms be12497.ccr41.par01.atlas.cogentco.com (154.54.56.130)
378110 250.44 ms be3627.ccr41.jfk02.atlas.cogentco.com (66.28.4.197)
378211 247.63 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
378312 258.30 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
378413 271.87 ms be3482.ccr21.mia01.atlas.cogentco.com (154.54.24.146)
378514 272.02 ms be3400.ccr21.mia03.atlas.cogentco.com (154.54.47.18)
378615 274.10 ms hu0-4-0-4.ccr21.mia03.atlas.cogentco.com (38.88.164.113)
378716 386.33 ms 190.211.161.121
378817 385.51 ms 190.211.161.122
378918 388.36 ms 190.211.161.122
379019 382.40 ms gesaguas.cl (170.239.85.227)
3791#################################################################################################################################
3792Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-19 13:35 EDT
3793Nmap scan report for gesaguas.cl (170.239.85.227)
3794Host is up (0.19s latency).
3795
3796PORT STATE SERVICE VERSION
379753/tcp closed domain
379867/tcp closed dhcps
379968/tcp closed dhcpc
380069/tcp closed tftp
380188/tcp closed kerberos-sec
3802123/tcp closed ntp
3803137/tcp closed netbios-ns
3804138/tcp closed netbios-dgm
3805139/tcp closed netbios-ssn
3806161/tcp closed snmp
3807162/tcp closed snmptrap
3808389/tcp closed ldap
3809520/tcp closed efs
38102049/tcp closed nfs
381153/udp closed domain
381267/udp open|filtered dhcps
381368/udp closed dhcpc
381469/udp closed tftp
381588/udp open|filtered kerberos-sec
3816123/udp closed ntp
3817137/udp closed netbios-ns
3818138/udp open|filtered netbios-dgm
3819139/udp closed netbios-ssn
3820161/udp open|filtered snmp
3821162/udp open|filtered snmptrap
3822389/udp open|filtered ldap
3823520/udp open|filtered route
38242049/udp closed nfs
3825Too many fingerprints match this host to give specific OS details
3826Network Distance: 20 hops
3827
3828TRACEROUTE (using port 53/tcp)
3829HOP RTT ADDRESS
38301 126.75 ms 10.203.19.1
38312 ...
38323 128.18 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
38334 128.88 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
38345 132.04 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
38356 152.24 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
38367 157.55 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
38378 248.98 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
38389 248.86 ms be12497.ccr41.par01.atlas.cogentco.com (154.54.56.130)
383910 248.41 ms be3627.ccr41.jfk02.atlas.cogentco.com (66.28.4.197)
384011 245.92 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
384112 255.65 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
384213 276.24 ms be3482.ccr21.mia01.atlas.cogentco.com (154.54.24.146)
384314 276.60 ms be3400.ccr21.mia03.atlas.cogentco.com (154.54.47.18)
384415 274.93 ms hu0-4-0-4.ccr21.mia03.atlas.cogentco.com (38.88.164.113)
384516 ... 17
384618 388.31 ms 190.211.161.122
384719 ...
384820 396.73 ms gesaguas.cl (170.239.85.227)
3849#################################################################################################################################
3850Hosts
3851=====
3852
3853address mac name os_name os_flavor os_sp purpose info comments
3854------- --- ---- ------- --------- ----- ------- ---- --------
38553.83.211.23 ec2-3-83-211-23.compute-1.amazonaws.com embedded device
38563.216.98.236 ec2-3-216-98-236.compute-1.amazonaws.com Linux 3.X server
38575.45.67.166 dns.sflex.net Unknown device
385823.229.234.138 ip-23-229-234-138.ip.secureserver.net Linux 3.X server
385934.224.171.238 ec2-34-224-171-238.compute-1.amazonaws.com Linux server
386034.236.0.217 ec2-34-236-0-217.compute-1.amazonaws.com Linux 3.X server
386134.253.89.155 ec2-34-253-89-155.eu-west-1.compute.amazonaws.com Linux 4.X server
386237.1.207.121 teens-sins.net 2-Series 3.X device
386343.245.223.4 Linux 2.6.X server
386445.60.47.218 Linux 3.X server
386545.88.202.111 Linux 3.X server
386645.239.108.252 whale.ecohosting.cl Linux 3.X server
386752.1.2.24 ec2-52-1-2-24.compute-1.amazonaws.com Linux server
386852.1.174.10 ec2-52-1-174-10.compute-1.amazonaws.com Linux 3.X server
386952.30.54.73 ec2-52-30-54-73.eu-west-1.compute.amazonaws.com Linux 4.X server
387052.52.234.222 ec2-52-52-234-222.us-west-1.compute.amazonaws.com Unknown device
387154.36.158.42 lb.xtgem.com Linux 3.X server
387254.72.57.25 ec2-54-72-57-25.eu-west-1.compute.amazonaws.com Linux 4.X server
387354.85.59.109 ec2-54-85-59-109.compute-1.amazonaws.com Linux 3.X server
387454.194.134.190 ec2-54-194-134-190.eu-west-1.compute.amazonaws.com Linux 4.X server
387564.69.94.253 Unknown device
387669.163.233.4 ps54052.dreamhostps.com Linux 14.04 server
387774.117.180.192 embedded device
387882.94.222.131 Unknown device
387992.123.250.35 a92-123-250-35.deploy.static.akamaitechnologies.com embedded device
388092.123.250.65 a92-123-250-65.deploy.static.akamaitechnologies.com Linux 3.X server
388194.102.51.111 Linux 2.6.X server
388294.102.51.112 no-reverse-dns-configured.com Linux 2.6.X server
3883104.244.73.40 Unknown device
3884104.244.76.231 Linux 3.X server
3885104.244.77.188 Linux 3.X server
3886104.244.79.89 Linux 3.X server
3887107.180.28.114 ip-107-180-28-114.ip.secureserver.net Unknown device
3888111.90.145.39 web16.support-emilid.com Linux 2.6.X server
3889143.95.110.248 ip-143-95-110-248.iplocal Linux 3.X server
3890146.83.222.104 callecalle5.uach.cl Unknown device
3891149.126.72.220 149.126.72.220.ip.incapdns.net Linux 3.X server
3892151.106.38.107 ns3152160.ip-151-106-38.eu embedded device
3893158.69.13.254 ip254.ip-158-69-13.net 2-Series 2.6.X device
3894162.244.35.13 xnlog.com FreeBSD 7.X device
3895163.247.48.46 Unknown device
3896163.247.127.20 Unknown device
3897163.247.130.114 embedded device
3898163.247.175.176 Unknown device
3899165.22.143.229 Linux 2.6.X server
3900165.227.99.239 Linux 3.X server
3901169.239.218.20 cp10.domains.co.za Linux 2.6.X server
3902170.239.85.227 gesaguas.cl Unknown device
3903173.214.244.169 173.214.244.169.serverel.net Unknown device
3904174.142.53.51 mail.marineland.ca Linux 3.X server
3905186.64.118.40 mail.blue127.dnsmisitio.net embedded device
3906190.98.209.37 static.190.98.209.37.gtdinternet.com Unknown device
3907190.107.177.35 srv25.cpanelhost.cl Linux 2.6.X server
3908190.110.121.175 todofutbol.hn.cl Unknown device
3909190.153.209.187 static.190.153.209.187.gtdinternet.com Unknown device
3910190.153.219.254 mail.evopoli.cl Linux 3.X server
3911192.185.134.58 ns36.accountservergroup.com Linux 3.X server
3912199.38.245.243 embedded device
3913200.2.249.28 Linux 3.X server
3914200.10.251.82 homer.sii.cl Unknown device
3915200.12.19.101 embedded device
3916200.29.0.33 cp33.puntoweb.cl Unknown device
3917200.54.92.108 Linux 9.0 server
3918200.54.230.247 plesk.tdata.cloud Linux 3.X server
3919200.55.198.228 Linux 2.4.X server
3920200.68.30.227 mail.gorecoquimbo.cl Unknown device
3921200.68.34.99 Unknown device
3922200.73.54.34 mail.maxtel.cl Linux 2.6.X server
3923200.91.40.252 200-91-40-252.avz.cl Unknown device
3924200.91.41.5 cruzblanca.cl Unknown device
3925200.126.100.83 toqui.gorearaucania.cl Unknown device
3926201.159.170.136 soloweb.sinc.cl Unknown device
3927204.93.193.141 suzuka.mochahost.com Unknown device
3928206.48.140.40 Unknown device
3929207.246.147.189 2-Series device
3930207.246.147.190 Linux 4.X server
3931207.246.147.247 Linux 4.X server
3932207.246.147.248 Linux 4.X server
3933211.13.196.135 sv3.isle.ne.jp Linux 2.6.X server
3934212.174.0.150 Windows 2012 server
3935216.172.184.117 Linux 3.X server
3936218.45.5.97 www.town.koya.wakayama.jp Linux 2.6.X server
3937#################################################################################################################################
3938Services
3939========
3940
3941host port proto name state info
3942---- ---- ----- ---- ----- ----
39433.83.211.23 53 tcp domain filtered
39443.83.211.23 53 udp domain unknown
39453.83.211.23 67 tcp dhcps filtered
39463.83.211.23 67 udp dhcps unknown
39473.83.211.23 68 tcp dhcpc filtered
39483.83.211.23 68 udp dhcpc unknown
39493.83.211.23 69 tcp tftp filtered
39503.83.211.23 69 udp tftp unknown
39513.83.211.23 80 tcp http open Microsoft IIS httpd 10.0
39523.83.211.23 88 tcp kerberos-sec filtered
39533.83.211.23 88 udp kerberos-sec unknown
39543.83.211.23 123 tcp ntp filtered
39553.83.211.23 123 udp ntp unknown
39563.83.211.23 137 tcp netbios-ns filtered
39573.83.211.23 137 udp netbios-ns unknown
39583.83.211.23 138 tcp netbios-dgm filtered
39593.83.211.23 138 udp netbios-dgm unknown
39603.83.211.23 139 tcp netbios-ssn filtered
39613.83.211.23 139 udp netbios-ssn unknown
39623.83.211.23 161 tcp snmp filtered
39633.83.211.23 161 udp snmp unknown
39643.83.211.23 162 tcp snmptrap filtered
39653.83.211.23 162 udp snmptrap unknown
39663.83.211.23 389 tcp ldap filtered
39673.83.211.23 389 udp ldap unknown
39683.83.211.23 443 tcp ssl/http open Microsoft IIS httpd 10.0
39693.83.211.23 520 tcp efs filtered
39703.83.211.23 520 udp route unknown
39713.83.211.23 2049 tcp nfs filtered
39723.83.211.23 2049 udp nfs unknown
39733.216.98.236 53 tcp domain filtered
39743.216.98.236 53 udp domain unknown
39753.216.98.236 67 tcp dhcps filtered
39763.216.98.236 67 udp dhcps unknown
39773.216.98.236 68 tcp dhcpc filtered
39783.216.98.236 68 udp dhcpc unknown
39793.216.98.236 69 tcp tftp filtered
39803.216.98.236 69 udp tftp unknown
39813.216.98.236 80 tcp http open Microsoft IIS httpd 10.0
39823.216.98.236 88 tcp kerberos-sec filtered
39833.216.98.236 88 udp kerberos-sec unknown
39843.216.98.236 123 tcp ntp filtered
39853.216.98.236 123 udp ntp unknown
39863.216.98.236 137 tcp netbios-ns filtered
39873.216.98.236 137 udp netbios-ns unknown
39883.216.98.236 138 tcp netbios-dgm filtered
39893.216.98.236 138 udp netbios-dgm unknown
39903.216.98.236 139 tcp netbios-ssn filtered
39913.216.98.236 139 udp netbios-ssn unknown
39923.216.98.236 161 tcp snmp filtered
39933.216.98.236 161 udp snmp unknown
39943.216.98.236 162 tcp snmptrap filtered
39953.216.98.236 162 udp snmptrap unknown
39963.216.98.236 389 tcp ldap filtered
39973.216.98.236 389 udp ldap unknown
39983.216.98.236 443 tcp ssl/http open Microsoft IIS httpd 10.0
39993.216.98.236 520 tcp efs filtered
40003.216.98.236 520 udp route unknown
40013.216.98.236 2049 tcp nfs filtered
40023.216.98.236 2049 udp nfs unknown
40035.45.67.166 22 tcp ssh open SSH-2.0-OpenSSH_7.4
40045.45.67.166 53 tcp domain closed
40055.45.67.166 53 udp domain closed
40065.45.67.166 67 tcp dhcps closed
40075.45.67.166 67 udp dhcps closed
40085.45.67.166 68 tcp dhcpc closed
40095.45.67.166 68 udp dhcpc closed
40105.45.67.166 69 tcp tftp closed
40115.45.67.166 69 udp tftp closed
40125.45.67.166 88 tcp kerberos-sec closed
40135.45.67.166 88 udp kerberos-sec unknown
40145.45.67.166 123 tcp ntp closed
40155.45.67.166 123 udp ntp unknown
40165.45.67.166 137 tcp netbios-ns filtered
40175.45.67.166 137 udp netbios-ns unknown
40185.45.67.166 138 tcp netbios-dgm filtered
40195.45.67.166 138 udp netbios-dgm unknown
40205.45.67.166 139 tcp netbios-ssn filtered
40215.45.67.166 139 udp netbios-ssn closed
40225.45.67.166 161 tcp snmp closed
40235.45.67.166 161 udp snmp unknown
40245.45.67.166 162 tcp snmptrap closed
40255.45.67.166 162 udp snmptrap unknown
40265.45.67.166 389 tcp ldap closed
40275.45.67.166 389 udp ldap unknown
40285.45.67.166 520 tcp efs closed
40295.45.67.166 520 udp route closed
40305.45.67.166 2049 tcp nfs closed
40315.45.67.166 2049 udp nfs closed
403223.229.234.138 21 tcp ftp open Pure-FTPd
403323.229.234.138 22 tcp ssh open OpenSSH 5.3 protocol 2.0
403423.229.234.138 25 tcp smtp open
403523.229.234.138 53 udp domain unknown
403623.229.234.138 67 udp dhcps unknown
403723.229.234.138 68 udp dhcpc unknown
403823.229.234.138 69 udp tftp unknown
403923.229.234.138 80 tcp http open Apache httpd PHP 5.6.40
404023.229.234.138 88 udp kerberos-sec unknown
404123.229.234.138 110 tcp pop3 open Dovecot pop3d
404223.229.234.138 123 udp ntp unknown
404323.229.234.138 137 udp netbios-ns unknown
404423.229.234.138 138 udp netbios-dgm unknown
404523.229.234.138 139 udp netbios-ssn unknown
404623.229.234.138 143 tcp imap open Dovecot imapd
404723.229.234.138 161 udp snmp unknown
404823.229.234.138 162 udp snmptrap unknown
404923.229.234.138 389 udp ldap unknown
405023.229.234.138 443 tcp ssl/http open Apache httpd PHP 5.6.40
405123.229.234.138 465 tcp ssl/smtp open Exim smtpd 4.92
405223.229.234.138 520 udp route unknown
405323.229.234.138 587 tcp smtp open Exim smtpd 4.92
405423.229.234.138 993 tcp ssl/imaps open
405523.229.234.138 995 tcp ssl/pop3s open
405623.229.234.138 2049 udp nfs unknown
405723.229.234.138 3306 tcp mysql open MySQL 5.6.44-cll-lve
405834.224.171.238 53 tcp domain filtered
405934.224.171.238 53 udp domain unknown
406034.224.171.238 67 tcp dhcps filtered
406134.224.171.238 67 udp dhcps unknown
406234.224.171.238 68 tcp dhcpc filtered
406334.224.171.238 68 udp dhcpc unknown
406434.224.171.238 69 tcp tftp filtered
406534.224.171.238 69 udp tftp unknown
406634.224.171.238 80 tcp http open Apache httpd 2.4.29 (Ubuntu)
406734.224.171.238 88 tcp kerberos-sec filtered
406834.224.171.238 88 udp kerberos-sec unknown
406934.224.171.238 123 tcp ntp filtered
407034.224.171.238 123 udp ntp unknown
407134.224.171.238 137 tcp netbios-ns filtered
407234.224.171.238 137 udp netbios-ns unknown
407334.224.171.238 138 tcp netbios-dgm filtered
407434.224.171.238 138 udp netbios-dgm unknown
407534.224.171.238 139 tcp netbios-ssn filtered
407634.224.171.238 139 udp netbios-ssn unknown
407734.224.171.238 161 tcp snmp filtered
407834.224.171.238 161 udp snmp unknown
407934.224.171.238 162 tcp snmptrap filtered
408034.224.171.238 162 udp snmptrap unknown
408134.224.171.238 389 tcp ldap filtered
408234.224.171.238 389 udp ldap unknown
408334.224.171.238 443 tcp ssl/http open Apache httpd 2.4.29 (Ubuntu)
408434.224.171.238 520 tcp efs filtered
408534.224.171.238 520 udp route unknown
408634.224.171.238 2049 tcp nfs filtered
408734.224.171.238 2049 udp nfs unknown
408834.236.0.217 53 tcp domain filtered
408934.236.0.217 53 udp domain unknown
409034.236.0.217 67 tcp dhcps filtered
409134.236.0.217 67 udp dhcps unknown
409234.236.0.217 68 tcp dhcpc filtered
409334.236.0.217 68 udp dhcpc unknown
409434.236.0.217 69 tcp tftp filtered
409534.236.0.217 69 udp tftp unknown
409634.236.0.217 80 tcp http open nginx
409734.236.0.217 88 tcp kerberos-sec filtered
409834.236.0.217 88 udp kerberos-sec unknown
409934.236.0.217 123 tcp ntp filtered
410034.236.0.217 123 udp ntp unknown
410134.236.0.217 137 tcp netbios-ns filtered
410234.236.0.217 137 udp netbios-ns unknown
410334.236.0.217 138 tcp netbios-dgm filtered
410434.236.0.217 138 udp netbios-dgm unknown
410534.236.0.217 139 tcp netbios-ssn filtered
410634.236.0.217 139 udp netbios-ssn unknown
410734.236.0.217 161 tcp snmp filtered
410834.236.0.217 161 udp snmp unknown
410934.236.0.217 162 tcp snmptrap filtered
411034.236.0.217 162 udp snmptrap unknown
411134.236.0.217 389 tcp ldap filtered
411234.236.0.217 389 udp ldap unknown
411334.236.0.217 443 tcp ssl/http open nginx
411434.236.0.217 520 tcp efs filtered
411534.236.0.217 520 udp route unknown
411634.236.0.217 2049 tcp nfs filtered
411734.236.0.217 2049 udp nfs unknown
411834.253.89.155 53 tcp domain closed
411934.253.89.155 53 udp domain unknown
412034.253.89.155 67 tcp dhcps closed
412134.253.89.155 67 udp dhcps unknown
412234.253.89.155 68 tcp dhcpc closed
412334.253.89.155 68 udp dhcpc unknown
412434.253.89.155 69 tcp tftp closed
412534.253.89.155 69 udp tftp unknown
412634.253.89.155 80 tcp http open nginx
412734.253.89.155 88 tcp kerberos-sec closed
412834.253.89.155 88 udp kerberos-sec unknown
412934.253.89.155 123 tcp ntp closed
413034.253.89.155 123 udp ntp unknown
413134.253.89.155 137 tcp netbios-ns closed
413234.253.89.155 137 udp netbios-ns unknown
413334.253.89.155 138 tcp netbios-dgm closed
413434.253.89.155 138 udp netbios-dgm unknown
413534.253.89.155 139 tcp netbios-ssn closed
413634.253.89.155 139 udp netbios-ssn unknown
413734.253.89.155 161 tcp snmp closed
413834.253.89.155 161 udp snmp unknown
413934.253.89.155 162 tcp snmptrap closed
414034.253.89.155 162 udp snmptrap unknown
414134.253.89.155 389 tcp ldap closed
414234.253.89.155 389 udp ldap unknown
414334.253.89.155 443 tcp ssl/http open nginx
414434.253.89.155 520 tcp efs closed
414534.253.89.155 520 udp route unknown
414634.253.89.155 2049 tcp nfs closed
414734.253.89.155 2049 udp nfs unknown
414837.1.207.121 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
414937.1.207.121 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
415037.1.207.121 67 tcp dhcps filtered
415137.1.207.121 67 udp dhcps unknown
415237.1.207.121 68 tcp dhcpc filtered
415337.1.207.121 68 udp dhcpc filtered
415437.1.207.121 69 tcp tftp filtered
415537.1.207.121 69 udp tftp unknown
415637.1.207.121 88 tcp kerberos-sec filtered
415737.1.207.121 88 udp kerberos-sec filtered
415837.1.207.121 123 tcp ntp filtered
415937.1.207.121 123 udp ntp unknown
416037.1.207.121 137 tcp netbios-ns filtered
416137.1.207.121 137 udp netbios-ns unknown
416237.1.207.121 138 tcp netbios-dgm filtered
416337.1.207.121 138 udp netbios-dgm unknown
416437.1.207.121 139 tcp netbios-ssn filtered
416537.1.207.121 139 udp netbios-ssn unknown
416637.1.207.121 161 tcp snmp filtered
416737.1.207.121 161 udp snmp unknown
416837.1.207.121 162 tcp snmptrap filtered
416937.1.207.121 162 udp snmptrap unknown
417037.1.207.121 389 tcp ldap filtered
417137.1.207.121 389 udp ldap unknown
417237.1.207.121 520 tcp efs filtered
417337.1.207.121 520 udp route unknown
417437.1.207.121 2049 tcp nfs filtered
417537.1.207.121 2049 udp nfs filtered
417643.245.223.4 80 tcp http open nginx
417743.245.223.4 443 tcp ssl/http open nginx
417843.245.223.4 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
417945.60.47.218 25 tcp http open Incapsula CDN httpd
418045.60.47.218 53 tcp domain open
418145.60.47.218 53 udp domain open
418245.60.47.218 67 udp dhcps unknown
418345.60.47.218 68 udp dhcpc unknown
418445.60.47.218 69 udp tftp unknown
418545.60.47.218 80 tcp http open Incapsula CDN httpd
418645.60.47.218 81 tcp http open Incapsula CDN httpd
418745.60.47.218 85 tcp http open Incapsula CDN httpd
418845.60.47.218 88 tcp http open Incapsula CDN httpd
418945.60.47.218 88 udp kerberos-sec unknown
419045.60.47.218 123 udp ntp unknown
419145.60.47.218 137 udp netbios-ns unknown
419245.60.47.218 138 udp netbios-dgm unknown
419345.60.47.218 139 udp netbios-ssn unknown
419445.60.47.218 161 udp snmp unknown
419545.60.47.218 162 udp snmptrap unknown
419645.60.47.218 389 tcp ssl/http open Incapsula CDN httpd
419745.60.47.218 389 udp ldap unknown
419845.60.47.218 443 tcp ssl/http open Incapsula CDN httpd
419945.60.47.218 444 tcp ssl/http open Incapsula CDN httpd
420045.60.47.218 445 tcp ssl/http open Incapsula CDN httpd
420145.60.47.218 446 tcp http open Incapsula CDN httpd
420245.60.47.218 520 udp route unknown
420345.60.47.218 587 tcp http open Incapsula CDN httpd
420445.60.47.218 631 tcp http open Incapsula CDN httpd
420545.60.47.218 888 tcp http open Incapsula CDN httpd
420645.60.47.218 995 tcp ssl/http open Incapsula CDN httpd
420745.60.47.218 998 tcp ssl/http open Incapsula CDN httpd
420845.60.47.218 999 tcp http open Incapsula CDN httpd
420945.60.47.218 1000 tcp http open Incapsula CDN httpd
421045.60.47.218 1024 tcp http open Incapsula CDN httpd
421145.60.47.218 1103 tcp http open Incapsula CDN httpd
421245.60.47.218 1234 tcp http open Incapsula CDN httpd
421345.60.47.218 1433 tcp http open Incapsula CDN httpd
421445.60.47.218 1494 tcp http open Incapsula CDN httpd
421545.60.47.218 2000 tcp ssl/http open Incapsula CDN httpd
421645.60.47.218 2001 tcp http open Incapsula CDN httpd
421745.60.47.218 2049 tcp http open Incapsula CDN httpd
421845.60.47.218 2049 udp nfs unknown
421945.60.47.218 2067 tcp http open Incapsula CDN httpd
422045.60.47.218 2100 tcp ssl/http open Incapsula CDN httpd
422145.60.47.218 2222 tcp http open Incapsula CDN httpd
422245.60.47.218 2598 tcp http open Incapsula CDN httpd
422345.60.47.218 3000 tcp http open Incapsula CDN httpd
422445.60.47.218 3050 tcp http open Incapsula CDN httpd
422545.60.47.218 3057 tcp http open Incapsula CDN httpd
422645.60.47.218 3299 tcp http open Incapsula CDN httpd
422745.60.47.218 3306 tcp ssl/http open Incapsula CDN httpd
422845.60.47.218 3333 tcp http open Incapsula CDN httpd
422945.60.47.218 3389 tcp ssl/http open Incapsula CDN httpd
423045.60.47.218 3500 tcp http open Incapsula CDN httpd
423145.60.47.218 3790 tcp http open Incapsula CDN httpd
423245.60.47.218 4000 tcp http open Incapsula CDN httpd
423345.60.47.218 4444 tcp ssl/http open Incapsula CDN httpd
423445.60.47.218 4445 tcp ssl/http open Incapsula CDN httpd
423545.60.47.218 4848 tcp http open Incapsula CDN httpd
423645.60.47.218 5000 tcp http open Incapsula CDN httpd
423745.60.47.218 5009 tcp http open Incapsula CDN httpd
423845.60.47.218 5051 tcp ssl/http open Incapsula CDN httpd
423945.60.47.218 5060 tcp ssl/http open Incapsula CDN httpd
424045.60.47.218 5061 tcp ssl/http open Incapsula CDN httpd
424145.60.47.218 5227 tcp ssl/http open Incapsula CDN httpd
424245.60.47.218 5247 tcp ssl/http open Incapsula CDN httpd
424345.60.47.218 5250 tcp ssl/http open Incapsula CDN httpd
424445.60.47.218 5555 tcp http open Incapsula CDN httpd
424545.60.47.218 5900 tcp http open Incapsula CDN httpd
424645.60.47.218 5901 tcp ssl/http open Incapsula CDN httpd
424745.60.47.218 5902 tcp ssl/http open Incapsula CDN httpd
424845.60.47.218 5903 tcp ssl/http open Incapsula CDN httpd
424945.60.47.218 5904 tcp ssl/http open Incapsula CDN httpd
425045.60.47.218 5905 tcp ssl/http open Incapsula CDN httpd
425145.60.47.218 5906 tcp ssl/http open Incapsula CDN httpd
425245.60.47.218 5907 tcp ssl/http open Incapsula CDN httpd
425345.60.47.218 5908 tcp ssl/http open Incapsula CDN httpd
425445.60.47.218 5909 tcp ssl/http open Incapsula CDN httpd
425545.60.47.218 5910 tcp ssl/http open Incapsula CDN httpd
425645.60.47.218 5920 tcp ssl/http open Incapsula CDN httpd
425745.60.47.218 5984 tcp ssl/http open Incapsula CDN httpd
425845.60.47.218 5985 tcp http open Incapsula CDN httpd
425945.60.47.218 5986 tcp ssl/http open Incapsula CDN httpd
426045.60.47.218 5999 tcp ssl/http open Incapsula CDN httpd
426145.60.47.218 6000 tcp http open Incapsula CDN httpd
426245.60.47.218 6060 tcp http open Incapsula CDN httpd
426345.60.47.218 6161 tcp http open Incapsula CDN httpd
426445.60.47.218 6379 tcp http open Incapsula CDN httpd
426545.60.47.218 6661 tcp ssl/http open Incapsula CDN httpd
426645.60.47.218 6789 tcp http open Incapsula CDN httpd
426745.60.47.218 7000 tcp ssl/http open Incapsula CDN httpd
426845.60.47.218 7001 tcp http open Incapsula CDN httpd
426945.60.47.218 7021 tcp http open Incapsula CDN httpd
427045.60.47.218 7071 tcp ssl/http open Incapsula CDN httpd
427145.60.47.218 7080 tcp http open Incapsula CDN httpd
427245.60.47.218 7272 tcp ssl/http open Incapsula CDN httpd
427345.60.47.218 7443 tcp ssl/http open Incapsula CDN httpd
427445.60.47.218 7700 tcp http open Incapsula CDN httpd
427545.60.47.218 7777 tcp http open Incapsula CDN httpd
427645.60.47.218 7778 tcp http open Incapsula CDN httpd
427745.60.47.218 8000 tcp http open Incapsula CDN httpd
427845.60.47.218 8001 tcp http open Incapsula CDN httpd
427945.60.47.218 8008 tcp http open Incapsula CDN httpd
428045.60.47.218 8014 tcp http open Incapsula CDN httpd
428145.60.47.218 8020 tcp http open Incapsula CDN httpd
428245.60.47.218 8023 tcp http open Incapsula CDN httpd
428345.60.47.218 8028 tcp http open Incapsula CDN httpd
428445.60.47.218 8030 tcp http open Incapsula CDN httpd
428545.60.47.218 8050 tcp http open Incapsula CDN httpd
428645.60.47.218 8051 tcp http open Incapsula CDN httpd
428745.60.47.218 8080 tcp http open Incapsula CDN httpd
428845.60.47.218 8081 tcp http open Incapsula CDN httpd
428945.60.47.218 8082 tcp http open Incapsula CDN httpd
429045.60.47.218 8085 tcp http open Incapsula CDN httpd
429145.60.47.218 8086 tcp http open Incapsula CDN httpd
429245.60.47.218 8087 tcp http open Incapsula CDN httpd
429345.60.47.218 8088 tcp http open Incapsula CDN httpd
429445.60.47.218 8090 tcp http open Incapsula CDN httpd
429545.60.47.218 8091 tcp http open Incapsula CDN httpd
429645.60.47.218 8095 tcp http open Incapsula CDN httpd
429745.60.47.218 8101 tcp http open Incapsula CDN httpd
429845.60.47.218 8161 tcp http open Incapsula CDN httpd
429945.60.47.218 8180 tcp http open Incapsula CDN httpd
430045.60.47.218 8222 tcp http open Incapsula CDN httpd
430145.60.47.218 8333 tcp http open Incapsula CDN httpd
430245.60.47.218 8443 tcp ssl/http open Incapsula CDN httpd
430345.60.47.218 8444 tcp http open Incapsula CDN httpd
430445.60.47.218 8445 tcp http open Incapsula CDN httpd
430545.60.47.218 8503 tcp ssl/http open Incapsula CDN httpd
430645.60.47.218 8686 tcp http open Incapsula CDN httpd
430745.60.47.218 8701 tcp ssl/http open Incapsula CDN httpd
430845.60.47.218 8787 tcp http open Incapsula CDN httpd
430945.60.47.218 8800 tcp http open Incapsula CDN httpd
431045.60.47.218 8812 tcp http open Incapsula CDN httpd
431145.60.47.218 8834 tcp http open Incapsula CDN httpd
431245.60.47.218 8880 tcp http open Incapsula CDN httpd
431345.60.47.218 8888 tcp http open Incapsula CDN httpd
431445.60.47.218 8889 tcp http open Incapsula CDN httpd
431545.60.47.218 8890 tcp http open Incapsula CDN httpd
431645.60.47.218 8899 tcp http open Incapsula CDN httpd
431745.60.47.218 8901 tcp http open Incapsula CDN httpd
431845.60.47.218 8902 tcp http open Incapsula CDN httpd
431945.60.47.218 8999 tcp http open Incapsula CDN httpd
432045.60.47.218 9000 tcp http open Incapsula CDN httpd
432145.60.47.218 9001 tcp http open Incapsula CDN httpd
432245.60.47.218 9002 tcp http open Incapsula CDN httpd
432345.60.47.218 9003 tcp http open Incapsula CDN httpd
432445.60.47.218 9004 tcp http open Incapsula CDN httpd
432545.60.47.218 9005 tcp http open Incapsula CDN httpd
432645.60.47.218 9010 tcp http open Incapsula CDN httpd
432745.60.47.218 9050 tcp http open Incapsula CDN httpd
432845.60.47.218 9080 tcp http open Incapsula CDN httpd
432945.60.47.218 9081 tcp ssl/http open Incapsula CDN httpd
433045.60.47.218 9084 tcp http open Incapsula CDN httpd
433145.60.47.218 9090 tcp http open Incapsula CDN httpd
433245.60.47.218 9099 tcp http open Incapsula CDN httpd
433345.60.47.218 9100 tcp jetdirect open
433445.60.47.218 9111 tcp http open Incapsula CDN httpd
433545.60.47.218 9200 tcp http open Incapsula CDN httpd
433645.60.47.218 9300 tcp http open Incapsula CDN httpd
433745.60.47.218 9500 tcp http open Incapsula CDN httpd
433845.60.47.218 9711 tcp ssl/http open Incapsula CDN httpd
433945.60.47.218 9991 tcp http open Incapsula CDN httpd
434045.60.47.218 9999 tcp http open Incapsula CDN httpd
434145.60.47.218 10000 tcp http open Incapsula CDN httpd
434245.60.47.218 10001 tcp http open Incapsula CDN httpd
434345.60.47.218 10008 tcp http open Incapsula CDN httpd
434445.60.47.218 10443 tcp ssl/http open Incapsula CDN httpd
434545.60.47.218 11001 tcp ssl/http open Incapsula CDN httpd
434645.60.47.218 12174 tcp http open Incapsula CDN httpd
434745.60.47.218 12203 tcp http open Incapsula CDN httpd
434845.60.47.218 12221 tcp http open Incapsula CDN httpd
434945.60.47.218 12345 tcp http open Incapsula CDN httpd
435045.60.47.218 12397 tcp http open Incapsula CDN httpd
435145.60.47.218 12401 tcp http open Incapsula CDN httpd
435245.60.47.218 14330 tcp http open Incapsula CDN httpd
435345.60.47.218 16000 tcp http open Incapsula CDN httpd
435445.60.47.218 20000 tcp http open Incapsula CDN httpd
435545.60.47.218 20010 tcp ssl/http open Incapsula CDN httpd
435645.60.47.218 25000 tcp ssl/http open Incapsula CDN httpd
435745.60.47.218 30000 tcp http open Incapsula CDN httpd
435845.60.47.218 44334 tcp ssl/http open Incapsula CDN httpd
435945.60.47.218 50000 tcp http open Incapsula CDN httpd
436045.60.47.218 50001 tcp ssl/http open Incapsula CDN httpd
436145.60.47.218 50050 tcp ssl/http open Incapsula CDN httpd
436245.88.202.111 22 tcp ssh open OpenSSH 7.9p1 Debian 10+deb10u1 protocol 2.0
436345.88.202.111 53 tcp domain open PowerDNS Authoritative Server 4.2.0-rc3
436445.88.202.111 53 udp domain open PowerDNS Authoritative Server 4.2.0-rc3
436545.88.202.111 67 tcp dhcps closed
436645.88.202.111 67 udp dhcps unknown
436745.88.202.111 68 tcp dhcpc closed
436845.88.202.111 68 udp dhcpc unknown
436945.88.202.111 69 tcp tftp closed
437045.88.202.111 69 udp tftp closed
437145.88.202.111 80 tcp http open nginx
437245.88.202.111 88 tcp kerberos-sec closed
437345.88.202.111 88 udp kerberos-sec unknown
437445.88.202.111 123 tcp ntp closed
437545.88.202.111 123 udp ntp closed
437645.88.202.111 137 tcp netbios-ns closed
437745.88.202.111 137 udp netbios-ns filtered
437845.88.202.111 138 tcp netbios-dgm closed
437945.88.202.111 138 udp netbios-dgm filtered
438045.88.202.111 139 tcp netbios-ssn closed
438145.88.202.111 139 udp netbios-ssn closed
438245.88.202.111 161 tcp snmp closed
438345.88.202.111 161 udp snmp closed
438445.88.202.111 162 tcp snmptrap closed
438545.88.202.111 162 udp snmptrap closed
438645.88.202.111 179 tcp bgp filtered
438745.88.202.111 389 tcp ldap closed
438845.88.202.111 389 udp ldap unknown
438945.88.202.111 443 tcp ssl/http open nginx
439045.88.202.111 520 tcp efs closed
439145.88.202.111 520 udp route unknown
439245.88.202.111 2049 tcp nfs closed
439345.88.202.111 2049 udp nfs closed
439445.88.202.111 10050 tcp tcpwrapped open
439545.239.108.252 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
439645.239.108.252 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
439745.239.108.252 67 tcp dhcps filtered
439845.239.108.252 67 udp dhcps unknown
439945.239.108.252 68 tcp dhcpc filtered
440045.239.108.252 68 udp dhcpc unknown
440145.239.108.252 69 tcp tftp filtered
440245.239.108.252 69 udp tftp unknown
440345.239.108.252 88 tcp kerberos-sec filtered
440445.239.108.252 88 udp kerberos-sec unknown
440545.239.108.252 123 tcp ntp filtered
440645.239.108.252 123 udp ntp unknown
440745.239.108.252 137 tcp netbios-ns filtered
440845.239.108.252 137 udp netbios-ns unknown
440945.239.108.252 138 tcp netbios-dgm filtered
441045.239.108.252 138 udp netbios-dgm unknown
441145.239.108.252 139 tcp netbios-ssn filtered
441245.239.108.252 139 udp netbios-ssn unknown
441345.239.108.252 161 tcp snmp filtered
441445.239.108.252 161 udp snmp unknown
441545.239.108.252 162 tcp snmptrap filtered
441645.239.108.252 162 udp snmptrap unknown
441745.239.108.252 389 tcp ldap filtered
441845.239.108.252 389 udp ldap unknown
441945.239.108.252 520 tcp efs filtered
442045.239.108.252 520 udp route unknown
442145.239.108.252 2049 tcp nfs filtered
442245.239.108.252 2049 udp nfs unknown
442352.1.2.24 53 tcp domain filtered
442452.1.2.24 53 udp domain unknown
442552.1.2.24 67 tcp dhcps filtered
442652.1.2.24 67 udp dhcps unknown
442752.1.2.24 68 tcp dhcpc filtered
442852.1.2.24 68 udp dhcpc unknown
442952.1.2.24 69 tcp tftp filtered
443052.1.2.24 69 udp tftp unknown
443152.1.2.24 80 tcp http open Apache httpd 2.4.29 (Ubuntu)
443252.1.2.24 88 tcp kerberos-sec filtered
443352.1.2.24 88 udp kerberos-sec unknown
443452.1.2.24 123 tcp ntp filtered
443552.1.2.24 123 udp ntp unknown
443652.1.2.24 137 tcp netbios-ns filtered
443752.1.2.24 137 udp netbios-ns unknown
443852.1.2.24 138 tcp netbios-dgm filtered
443952.1.2.24 138 udp netbios-dgm unknown
444052.1.2.24 139 tcp netbios-ssn filtered
444152.1.2.24 139 udp netbios-ssn unknown
444252.1.2.24 161 tcp snmp filtered
444352.1.2.24 161 udp snmp unknown
444452.1.2.24 162 tcp snmptrap filtered
444552.1.2.24 162 udp snmptrap unknown
444652.1.2.24 389 tcp ldap filtered
444752.1.2.24 389 udp ldap unknown
444852.1.2.24 443 tcp ssl/http open Apache httpd 2.4.29 (Ubuntu)
444952.1.2.24 520 tcp efs filtered
445052.1.2.24 520 udp route unknown
445152.1.2.24 2049 tcp nfs filtered
445252.1.2.24 2049 udp nfs unknown
445352.1.174.10 53 tcp domain filtered
445452.1.174.10 53 udp domain unknown
445552.1.174.10 67 tcp dhcps filtered
445652.1.174.10 67 udp dhcps unknown
445752.1.174.10 68 tcp dhcpc filtered
445852.1.174.10 68 udp dhcpc unknown
445952.1.174.10 69 tcp tftp filtered
446052.1.174.10 69 udp tftp unknown
446152.1.174.10 80 tcp http open nginx
446252.1.174.10 88 tcp kerberos-sec filtered
446352.1.174.10 88 udp kerberos-sec unknown
446452.1.174.10 123 tcp ntp filtered
446552.1.174.10 123 udp ntp unknown
446652.1.174.10 137 tcp netbios-ns filtered
446752.1.174.10 137 udp netbios-ns unknown
446852.1.174.10 138 tcp netbios-dgm filtered
446952.1.174.10 138 udp netbios-dgm unknown
447052.1.174.10 139 tcp netbios-ssn filtered
447152.1.174.10 139 udp netbios-ssn unknown
447252.1.174.10 161 tcp snmp filtered
447352.1.174.10 161 udp snmp unknown
447452.1.174.10 162 tcp snmptrap filtered
447552.1.174.10 162 udp snmptrap unknown
447652.1.174.10 389 tcp ldap filtered
447752.1.174.10 389 udp ldap unknown
447852.1.174.10 443 tcp ssl/http open nginx
447952.1.174.10 520 tcp efs filtered
448052.1.174.10 520 udp route unknown
448152.1.174.10 2049 tcp nfs filtered
448252.1.174.10 2049 udp nfs unknown
448352.30.54.73 53 tcp domain closed
448452.30.54.73 53 udp domain unknown
448552.30.54.73 67 tcp dhcps closed
448652.30.54.73 67 udp dhcps unknown
448752.30.54.73 68 tcp dhcpc closed
448852.30.54.73 68 udp dhcpc unknown
448952.30.54.73 69 tcp tftp closed
449052.30.54.73 69 udp tftp unknown
449152.30.54.73 80 tcp http open nginx
449252.30.54.73 88 tcp kerberos-sec closed
449352.30.54.73 88 udp kerberos-sec unknown
449452.30.54.73 123 tcp ntp closed
449552.30.54.73 123 udp ntp unknown
449652.30.54.73 137 tcp netbios-ns closed
449752.30.54.73 137 udp netbios-ns unknown
449852.30.54.73 138 tcp netbios-dgm closed
449952.30.54.73 138 udp netbios-dgm unknown
450052.30.54.73 139 tcp netbios-ssn closed
450152.30.54.73 139 udp netbios-ssn unknown
450252.30.54.73 161 tcp snmp closed
450352.30.54.73 161 udp snmp unknown
450452.30.54.73 162 tcp snmptrap closed
450552.30.54.73 162 udp snmptrap unknown
450652.30.54.73 389 tcp ldap closed
450752.30.54.73 389 udp ldap unknown
450852.30.54.73 443 tcp ssl/http open nginx
450952.30.54.73 520 tcp efs closed
451052.30.54.73 520 udp route unknown
451152.30.54.73 2049 tcp nfs closed
451252.30.54.73 2049 udp nfs unknown
451352.52.234.222 53 tcp domain filtered
451452.52.234.222 53 udp domain unknown
451552.52.234.222 67 tcp dhcps filtered
451652.52.234.222 67 udp dhcps unknown
451752.52.234.222 68 tcp dhcpc filtered
451852.52.234.222 68 udp dhcpc unknown
451952.52.234.222 69 tcp tftp filtered
452052.52.234.222 69 udp tftp unknown
452152.52.234.222 88 tcp kerberos-sec filtered
452252.52.234.222 88 udp kerberos-sec unknown
452352.52.234.222 123 tcp ntp filtered
452452.52.234.222 123 udp ntp unknown
452552.52.234.222 137 tcp netbios-ns filtered
452652.52.234.222 137 udp netbios-ns unknown
452752.52.234.222 138 tcp netbios-dgm filtered
452852.52.234.222 138 udp netbios-dgm unknown
452952.52.234.222 139 tcp netbios-ssn filtered
453052.52.234.222 139 udp netbios-ssn unknown
453152.52.234.222 161 tcp snmp filtered
453252.52.234.222 161 udp snmp unknown
453352.52.234.222 162 tcp snmptrap filtered
453452.52.234.222 162 udp snmptrap unknown
453552.52.234.222 389 tcp ldap filtered
453652.52.234.222 389 udp ldap unknown
453752.52.234.222 520 tcp efs filtered
453852.52.234.222 520 udp route unknown
453952.52.234.222 2049 tcp nfs filtered
454052.52.234.222 2049 udp nfs unknown
454154.36.158.42 22 tcp ssh open OpenSSH 7.4 protocol 2.0
454254.36.158.42 53 udp domain unknown
454354.36.158.42 67 udp dhcps unknown
454454.36.158.42 68 udp dhcpc unknown
454554.36.158.42 80 tcp http-proxy open HAProxy http proxy 1.3.1 or later
454654.36.158.42 137 udp netbios-ns unknown
454754.36.158.42 139 udp netbios-ssn unknown
454854.36.158.42 443 tcp ssl/http-proxy open HAProxy http proxy 1.3.1 or later
454954.36.158.42 2049 udp nfs unknown
455054.36.158.42 5000 tcp http open Apache httpd
455154.36.158.42 8088 tcp radan-http open
455254.36.158.42 22222 tcp ssh open OpenSSH 7.4 protocol 2.0
455354.72.57.25 53 tcp domain closed
455454.72.57.25 53 udp domain unknown
455554.72.57.25 67 tcp dhcps closed
455654.72.57.25 67 udp dhcps unknown
455754.72.57.25 68 tcp dhcpc closed
455854.72.57.25 68 udp dhcpc unknown
455954.72.57.25 69 tcp tftp closed
456054.72.57.25 69 udp tftp unknown
456154.72.57.25 80 tcp http open nginx
456254.72.57.25 88 tcp kerberos-sec closed
456354.72.57.25 88 udp kerberos-sec unknown
456454.72.57.25 123 tcp ntp closed
456554.72.57.25 123 udp ntp unknown
456654.72.57.25 137 tcp netbios-ns closed
456754.72.57.25 137 udp netbios-ns unknown
456854.72.57.25 138 tcp netbios-dgm closed
456954.72.57.25 138 udp netbios-dgm unknown
457054.72.57.25 139 tcp netbios-ssn closed
457154.72.57.25 139 udp netbios-ssn unknown
457254.72.57.25 161 tcp snmp closed
457354.72.57.25 161 udp snmp unknown
457454.72.57.25 162 tcp snmptrap closed
457554.72.57.25 162 udp snmptrap unknown
457654.72.57.25 389 tcp ldap closed
457754.72.57.25 389 udp ldap unknown
457854.72.57.25 443 tcp ssl/http open nginx
457954.72.57.25 520 tcp efs closed
458054.72.57.25 520 udp route unknown
458154.72.57.25 2049 tcp nfs closed
458254.72.57.25 2049 udp nfs unknown
458354.85.59.109 53 tcp domain filtered
458454.85.59.109 53 udp domain unknown
458554.85.59.109 67 tcp dhcps filtered
458654.85.59.109 67 udp dhcps unknown
458754.85.59.109 68 tcp dhcpc filtered
458854.85.59.109 68 udp dhcpc unknown
458954.85.59.109 69 tcp tftp filtered
459054.85.59.109 69 udp tftp unknown
459154.85.59.109 80 tcp http open nginx
459254.85.59.109 88 tcp kerberos-sec filtered
459354.85.59.109 88 udp kerberos-sec unknown
459454.85.59.109 123 tcp ntp filtered
459554.85.59.109 123 udp ntp unknown
459654.85.59.109 137 tcp netbios-ns filtered
459754.85.59.109 137 udp netbios-ns unknown
459854.85.59.109 138 tcp netbios-dgm filtered
459954.85.59.109 138 udp netbios-dgm unknown
460054.85.59.109 139 tcp netbios-ssn filtered
460154.85.59.109 139 udp netbios-ssn unknown
460254.85.59.109 161 tcp snmp filtered
460354.85.59.109 161 udp snmp unknown
460454.85.59.109 162 tcp snmptrap filtered
460554.85.59.109 162 udp snmptrap unknown
460654.85.59.109 389 tcp ldap filtered
460754.85.59.109 389 udp ldap unknown
460854.85.59.109 443 tcp ssl/http open nginx
460954.85.59.109 520 tcp efs filtered
461054.85.59.109 520 udp route unknown
461154.85.59.109 2049 tcp nfs filtered
461254.85.59.109 2049 udp nfs unknown
461354.194.134.190 53 tcp domain closed
461454.194.134.190 53 udp domain unknown
461554.194.134.190 67 tcp dhcps closed
461654.194.134.190 67 udp dhcps unknown
461754.194.134.190 68 tcp dhcpc closed
461854.194.134.190 68 udp dhcpc unknown
461954.194.134.190 69 tcp tftp closed
462054.194.134.190 69 udp tftp unknown
462154.194.134.190 80 tcp http open nginx
462254.194.134.190 88 tcp kerberos-sec closed
462354.194.134.190 88 udp kerberos-sec unknown
462454.194.134.190 123 tcp ntp closed
462554.194.134.190 123 udp ntp unknown
462654.194.134.190 137 tcp netbios-ns closed
462754.194.134.190 137 udp netbios-ns unknown
462854.194.134.190 138 tcp netbios-dgm closed
462954.194.134.190 138 udp netbios-dgm unknown
463054.194.134.190 139 tcp netbios-ssn closed
463154.194.134.190 139 udp netbios-ssn unknown
463254.194.134.190 161 tcp snmp closed
463354.194.134.190 161 udp snmp unknown
463454.194.134.190 162 tcp snmptrap closed
463554.194.134.190 162 udp snmptrap unknown
463654.194.134.190 389 tcp ldap closed
463754.194.134.190 389 udp ldap unknown
463854.194.134.190 443 tcp ssl/http open nginx
463954.194.134.190 520 tcp efs closed
464054.194.134.190 520 udp route unknown
464154.194.134.190 2049 tcp nfs closed
464254.194.134.190 2049 udp nfs unknown
464364.69.94.253 53 tcp domain filtered
464464.69.94.253 53 udp domain unknown
464564.69.94.253 67 tcp dhcps filtered
464664.69.94.253 67 udp dhcps unknown
464764.69.94.253 68 tcp dhcpc filtered
464864.69.94.253 68 udp dhcpc unknown
464964.69.94.253 69 tcp tftp filtered
465064.69.94.253 69 udp tftp unknown
465164.69.94.253 88 tcp kerberos-sec filtered
465264.69.94.253 88 udp kerberos-sec unknown
465364.69.94.253 123 tcp ntp filtered
465464.69.94.253 123 udp ntp unknown
465564.69.94.253 137 tcp netbios-ns filtered
465664.69.94.253 137 udp netbios-ns unknown
465764.69.94.253 138 tcp netbios-dgm filtered
465864.69.94.253 138 udp netbios-dgm unknown
465964.69.94.253 139 tcp netbios-ssn filtered
466064.69.94.253 139 udp netbios-ssn unknown
466164.69.94.253 161 tcp snmp filtered
466264.69.94.253 161 udp snmp unknown
466364.69.94.253 162 tcp snmptrap filtered
466464.69.94.253 162 udp snmptrap unknown
466564.69.94.253 389 tcp ldap filtered
466664.69.94.253 389 udp ldap unknown
466764.69.94.253 520 tcp efs filtered
466864.69.94.253 520 udp route unknown
466964.69.94.253 2049 tcp nfs filtered
467064.69.94.253 2049 udp nfs unknown
467169.163.233.4 21 tcp ftp open 220 DreamHost FTP Server\x0d\x0a
467269.163.233.4 22 tcp ssh open SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.13
467369.163.233.4 25 tcp open
467469.163.233.4 53 tcp domain closed
467569.163.233.4 53 udp domain unknown
467669.163.233.4 67 tcp dhcps closed
467769.163.233.4 67 udp dhcps closed
467869.163.233.4 68 tcp dhcpc closed
467969.163.233.4 68 udp dhcpc unknown
468069.163.233.4 69 tcp tftp closed
468169.163.233.4 69 udp tftp closed
468269.163.233.4 88 tcp kerberos-sec closed
468369.163.233.4 88 udp kerberos-sec unknown
468469.163.233.4 123 tcp ntp closed
468569.163.233.4 123 udp ntp unknown
468669.163.233.4 137 tcp netbios-ns closed
468769.163.233.4 137 udp netbios-ns closed
468869.163.233.4 138 tcp netbios-dgm closed
468969.163.233.4 138 udp netbios-dgm closed
469069.163.233.4 139 tcp netbios-ssn closed
469169.163.233.4 139 udp netbios-ssn unknown
469269.163.233.4 161 tcp snmp closed
469369.163.233.4 161 udp snmp closed
469469.163.233.4 162 tcp snmptrap closed
469569.163.233.4 162 udp snmptrap closed
469669.163.233.4 389 tcp ldap closed
469769.163.233.4 389 udp ldap unknown
469869.163.233.4 520 tcp efs closed
469969.163.233.4 520 udp route closed
470069.163.233.4 2049 tcp nfs closed
470169.163.233.4 2049 udp nfs unknown
470274.117.180.192 21 tcp ftp filtered 220 Hello.\x0d\x0a
470374.117.180.192 22 tcp ssh filtered
470474.117.180.192 25 tcp smtp filtered
470574.117.180.192 53 tcp domain closed
470674.117.180.192 53 udp domain unknown
470774.117.180.192 67 tcp dhcps closed
470874.117.180.192 67 udp dhcps unknown
470974.117.180.192 68 tcp dhcpc closed
471074.117.180.192 68 udp dhcpc closed
471174.117.180.192 69 tcp tftp closed
471274.117.180.192 69 udp tftp closed
471374.117.180.192 80 tcp http filtered
471474.117.180.192 88 tcp kerberos-sec closed
471574.117.180.192 88 udp kerberos-sec closed
471674.117.180.192 110 tcp pop3 filtered
471774.117.180.192 111 tcp rpcbind filtered
471874.117.180.192 123 tcp ntp closed
471974.117.180.192 123 udp ntp unknown
472074.117.180.192 137 tcp netbios-ns closed
472174.117.180.192 137 udp netbios-ns closed
472274.117.180.192 138 tcp netbios-dgm closed
472374.117.180.192 138 udp netbios-dgm unknown
472474.117.180.192 139 tcp netbios-ssn closed
472574.117.180.192 139 udp netbios-ssn unknown
472674.117.180.192 143 tcp imap filtered
472774.117.180.192 161 tcp snmp closed
472874.117.180.192 161 udp snmp closed
472974.117.180.192 162 tcp snmptrap closed
473074.117.180.192 162 udp snmptrap unknown
473174.117.180.192 323 tcp rpki-rtr filtered
473274.117.180.192 389 tcp ldap closed
473374.117.180.192 389 udp ldap closed
473474.117.180.192 443 tcp https filtered
473574.117.180.192 465 tcp ssl/smtp open Exim smtpd 4.92.3
473674.117.180.192 520 tcp efs closed
473774.117.180.192 520 udp route unknown
473874.117.180.192 587 tcp submission filtered
473974.117.180.192 873 tcp rsync filtered
474074.117.180.192 993 tcp imaps filtered
474174.117.180.192 995 tcp pop3s filtered
474274.117.180.192 2049 tcp nfs closed
474374.117.180.192 2049 udp nfs closed
474474.117.180.192 2525 tcp smtp open Exim smtpd
474574.117.180.192 3306 tcp mysql filtered
474674.117.180.192 4949 tcp tcpwrapped open
474774.117.180.192 5666 tcp tcpwrapped open
474874.117.180.192 6380 tcp filtered
474974.117.180.192 9306 tcp sphinx-search open Sphinx Search daemon 2.1.5-id64-release
475074.117.180.192 11211 tcp memcache filtered
475182.94.222.131 53 udp domain unknown
475282.94.222.131 67 udp dhcps unknown
475382.94.222.131 68 udp dhcpc unknown
475482.94.222.131 69 udp tftp unknown
475582.94.222.131 88 udp kerberos-sec unknown
475682.94.222.131 123 udp ntp unknown
475782.94.222.131 137 udp netbios-ns unknown
475882.94.222.131 138 udp netbios-dgm unknown
475982.94.222.131 139 udp netbios-ssn unknown
476082.94.222.131 161 udp snmp unknown
476182.94.222.131 162 udp snmptrap unknown
476282.94.222.131 389 udp ldap unknown
476382.94.222.131 520 udp route unknown
476482.94.222.131 2049 udp nfs unknown
476592.123.250.35 53 tcp domain closed
476692.123.250.35 53 udp domain closed
476792.123.250.35 67 tcp dhcps filtered
476892.123.250.35 67 udp dhcps unknown
476992.123.250.35 68 tcp dhcpc filtered
477092.123.250.35 68 udp dhcpc unknown
477192.123.250.35 69 tcp tftp filtered
477292.123.250.35 69 udp tftp unknown
477392.123.250.35 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
477492.123.250.35 88 tcp kerberos-sec filtered
477592.123.250.35 88 udp kerberos-sec unknown
477692.123.250.35 123 tcp ntp filtered
477792.123.250.35 123 udp ntp unknown
477892.123.250.35 137 tcp netbios-ns filtered
477992.123.250.35 137 udp netbios-ns unknown
478092.123.250.35 138 tcp netbios-dgm filtered
478192.123.250.35 138 udp netbios-dgm unknown
478292.123.250.35 139 tcp netbios-ssn filtered
478392.123.250.35 139 udp netbios-ssn unknown
478492.123.250.35 161 tcp snmp filtered
478592.123.250.35 161 udp snmp unknown
478692.123.250.35 162 tcp snmptrap filtered
478792.123.250.35 162 udp snmptrap unknown
478892.123.250.35 389 tcp ldap filtered
478992.123.250.35 389 udp ldap unknown
479092.123.250.35 443 tcp ssl/https open
479192.123.250.35 520 tcp efs filtered
479292.123.250.35 520 udp route unknown
479392.123.250.35 2049 tcp nfs filtered
479492.123.250.35 2049 udp nfs unknown
479592.123.250.35 8883 tcp secure-mqtt open
479692.123.250.65 53 tcp domain filtered
479792.123.250.65 53 udp domain unknown
479892.123.250.65 67 tcp dhcps filtered
479992.123.250.65 67 udp dhcps unknown
480092.123.250.65 68 tcp dhcpc filtered
480192.123.250.65 68 udp dhcpc unknown
480292.123.250.65 69 tcp tftp filtered
480392.123.250.65 69 udp tftp unknown
480492.123.250.65 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
480592.123.250.65 88 tcp kerberos-sec filtered
480692.123.250.65 88 udp kerberos-sec unknown
480792.123.250.65 123 tcp ntp filtered
480892.123.250.65 123 udp ntp unknown
480992.123.250.65 137 tcp netbios-ns filtered
481092.123.250.65 137 udp netbios-ns unknown
481192.123.250.65 138 tcp netbios-dgm filtered
481292.123.250.65 138 udp netbios-dgm unknown
481392.123.250.65 139 tcp netbios-ssn filtered
481492.123.250.65 139 udp netbios-ssn unknown
481592.123.250.65 161 tcp snmp filtered
481692.123.250.65 161 udp snmp unknown
481792.123.250.65 162 tcp snmptrap filtered
481892.123.250.65 162 udp snmptrap unknown
481992.123.250.65 389 tcp ldap filtered
482092.123.250.65 389 udp ldap unknown
482192.123.250.65 443 tcp ssl/https open
482292.123.250.65 520 tcp efs filtered
482392.123.250.65 520 udp route unknown
482492.123.250.65 2049 tcp nfs filtered
482592.123.250.65 2049 udp nfs unknown
482692.123.250.65 8883 tcp secure-mqtt open
482794.102.51.111 22 tcp ssh open
482894.102.51.111 25 tcp smtp open Exim smtpd 4.89
482994.102.51.111 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
483094.102.51.111 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
483194.102.51.111 67 tcp dhcps filtered
483294.102.51.111 67 udp dhcps unknown
483394.102.51.111 68 tcp dhcpc filtered
483494.102.51.111 68 udp dhcpc unknown
483594.102.51.111 69 tcp tftp filtered
483694.102.51.111 69 udp tftp unknown
483794.102.51.111 80 tcp http open nginx
483894.102.51.111 88 tcp kerberos-sec filtered
483994.102.51.111 88 udp kerberos-sec unknown
484094.102.51.111 110 tcp pop3 open Dovecot pop3d
484194.102.51.111 123 tcp ntp filtered
484294.102.51.111 123 udp ntp unknown
484394.102.51.111 137 tcp netbios-ns filtered
484494.102.51.111 137 udp netbios-ns unknown
484594.102.51.111 138 tcp netbios-dgm filtered
484694.102.51.111 138 udp netbios-dgm unknown
484794.102.51.111 139 tcp netbios-ssn filtered
484894.102.51.111 139 udp netbios-ssn unknown
484994.102.51.111 143 tcp imap open Dovecot imapd
485094.102.51.111 161 tcp snmp filtered
485194.102.51.111 161 udp snmp unknown
485294.102.51.111 162 tcp snmptrap filtered
485394.102.51.111 162 udp snmptrap unknown
485494.102.51.111 389 tcp ldap filtered
485594.102.51.111 389 udp ldap unknown
485694.102.51.111 465 tcp ssl/smtp open Exim smtpd 4.89
485794.102.51.111 520 tcp efs filtered
485894.102.51.111 520 udp route unknown
485994.102.51.111 993 tcp ssl/imaps open
486094.102.51.111 995 tcp ssl/pop3s open
486194.102.51.111 2049 tcp nfs filtered
486294.102.51.111 2049 udp nfs unknown
486394.102.51.112 22 tcp ssh open
486494.102.51.112 25 tcp smtp open Exim smtpd 4.89
486594.102.51.112 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
486694.102.51.112 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
486794.102.51.112 67 tcp dhcps filtered
486894.102.51.112 67 udp dhcps unknown
486994.102.51.112 68 tcp dhcpc filtered
487094.102.51.112 68 udp dhcpc unknown
487194.102.51.112 69 tcp tftp filtered
487294.102.51.112 69 udp tftp unknown
487394.102.51.112 80 tcp http open nginx
487494.102.51.112 88 tcp kerberos-sec filtered
487594.102.51.112 88 udp kerberos-sec unknown
487694.102.51.112 110 tcp pop3 open Dovecot pop3d
487794.102.51.112 123 tcp ntp filtered
487894.102.51.112 123 udp ntp unknown
487994.102.51.112 137 tcp netbios-ns filtered
488094.102.51.112 137 udp netbios-ns unknown
488194.102.51.112 138 tcp netbios-dgm filtered
488294.102.51.112 138 udp netbios-dgm unknown
488394.102.51.112 139 tcp netbios-ssn filtered
488494.102.51.112 139 udp netbios-ssn unknown
488594.102.51.112 143 tcp imap open Dovecot imapd
488694.102.51.112 161 tcp snmp filtered
488794.102.51.112 161 udp snmp unknown
488894.102.51.112 162 tcp snmptrap filtered
488994.102.51.112 162 udp snmptrap unknown
489094.102.51.112 389 tcp ldap filtered
489194.102.51.112 389 udp ldap unknown
489294.102.51.112 465 tcp ssl/smtp open Exim smtpd 4.89
489394.102.51.112 520 tcp efs filtered
489494.102.51.112 520 udp route unknown
489594.102.51.112 993 tcp ssl/imaps open
489694.102.51.112 995 tcp ssl/pop3s open
489794.102.51.112 2049 tcp nfs filtered
489894.102.51.112 2049 udp nfs unknown
4899104.244.73.40 53 udp domain unknown
4900104.244.73.40 67 udp dhcps unknown
4901104.244.73.40 68 udp dhcpc unknown
4902104.244.73.40 69 udp tftp unknown
4903104.244.73.40 88 udp kerberos-sec unknown
4904104.244.73.40 123 udp ntp unknown
4905104.244.73.40 137 udp netbios-ns unknown
4906104.244.73.40 138 udp netbios-dgm unknown
4907104.244.73.40 139 udp netbios-ssn unknown
4908104.244.73.40 161 udp snmp unknown
4909104.244.73.40 162 udp snmptrap unknown
4910104.244.73.40 389 udp ldap unknown
4911104.244.73.40 520 udp route unknown
4912104.244.73.40 2049 udp nfs unknown
4913104.244.76.231 53 tcp domain filtered
4914104.244.76.231 53 udp domain unknown
4915104.244.76.231 67 tcp dhcps filtered
4916104.244.76.231 67 udp dhcps unknown
4917104.244.76.231 68 tcp dhcpc filtered
4918104.244.76.231 68 udp dhcpc unknown
4919104.244.76.231 69 tcp tftp filtered
4920104.244.76.231 69 udp tftp unknown
4921104.244.76.231 80 tcp http open nginx
4922104.244.76.231 88 tcp kerberos-sec filtered
4923104.244.76.231 88 udp kerberos-sec unknown
4924104.244.76.231 123 tcp ntp filtered
4925104.244.76.231 123 udp ntp unknown
4926104.244.76.231 137 tcp netbios-ns filtered
4927104.244.76.231 137 udp netbios-ns unknown
4928104.244.76.231 138 tcp netbios-dgm filtered
4929104.244.76.231 138 udp netbios-dgm unknown
4930104.244.76.231 139 tcp netbios-ssn filtered
4931104.244.76.231 139 udp netbios-ssn unknown
4932104.244.76.231 161 tcp snmp filtered
4933104.244.76.231 161 udp snmp unknown
4934104.244.76.231 162 tcp snmptrap filtered
4935104.244.76.231 162 udp snmptrap unknown
4936104.244.76.231 389 tcp ldap filtered
4937104.244.76.231 389 udp ldap unknown
4938104.244.76.231 443 tcp ssl/http open nginx
4939104.244.76.231 520 tcp efs filtered
4940104.244.76.231 520 udp route unknown
4941104.244.76.231 2049 tcp nfs filtered
4942104.244.76.231 2049 udp nfs unknown
4943104.244.76.231 5040 tcp unknown closed
4944104.244.76.231 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
4945104.244.76.231 16221 tcp closed
4946104.244.76.231 23022 tcp closed
4947104.244.76.231 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
4948104.244.77.188 53 tcp domain filtered
4949104.244.77.188 53 udp domain unknown
4950104.244.77.188 67 tcp dhcps filtered
4951104.244.77.188 67 udp dhcps unknown
4952104.244.77.188 68 tcp dhcpc filtered
4953104.244.77.188 68 udp dhcpc unknown
4954104.244.77.188 69 tcp tftp filtered
4955104.244.77.188 69 udp tftp unknown
4956104.244.77.188 80 tcp http open nginx
4957104.244.77.188 88 tcp kerberos-sec filtered
4958104.244.77.188 88 udp kerberos-sec unknown
4959104.244.77.188 123 tcp ntp filtered
4960104.244.77.188 123 udp ntp unknown
4961104.244.77.188 137 tcp netbios-ns filtered
4962104.244.77.188 137 udp netbios-ns unknown
4963104.244.77.188 138 tcp netbios-dgm filtered
4964104.244.77.188 138 udp netbios-dgm unknown
4965104.244.77.188 139 tcp netbios-ssn filtered
4966104.244.77.188 139 udp netbios-ssn unknown
4967104.244.77.188 161 tcp snmp filtered
4968104.244.77.188 161 udp snmp unknown
4969104.244.77.188 162 tcp snmptrap filtered
4970104.244.77.188 162 udp snmptrap unknown
4971104.244.77.188 389 tcp ldap filtered
4972104.244.77.188 389 udp ldap unknown
4973104.244.77.188 443 tcp ssl/http open nginx
4974104.244.77.188 520 tcp efs filtered
4975104.244.77.188 520 udp route unknown
4976104.244.77.188 2049 tcp nfs filtered
4977104.244.77.188 2049 udp nfs unknown
4978104.244.77.188 5040 tcp unknown closed
4979104.244.77.188 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
4980104.244.77.188 16221 tcp closed
4981104.244.77.188 23022 tcp closed
4982104.244.77.188 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
4983104.244.79.89 53 tcp domain filtered
4984104.244.79.89 53 udp domain unknown
4985104.244.79.89 67 tcp dhcps filtered
4986104.244.79.89 67 udp dhcps unknown
4987104.244.79.89 68 tcp dhcpc filtered
4988104.244.79.89 68 udp dhcpc unknown
4989104.244.79.89 69 tcp tftp filtered
4990104.244.79.89 69 udp tftp unknown
4991104.244.79.89 80 tcp http open nginx
4992104.244.79.89 88 tcp kerberos-sec filtered
4993104.244.79.89 88 udp kerberos-sec unknown
4994104.244.79.89 123 tcp ntp filtered
4995104.244.79.89 123 udp ntp unknown
4996104.244.79.89 137 tcp netbios-ns filtered
4997104.244.79.89 137 udp netbios-ns unknown
4998104.244.79.89 138 tcp netbios-dgm filtered
4999104.244.79.89 138 udp netbios-dgm unknown
5000104.244.79.89 139 tcp netbios-ssn filtered
5001104.244.79.89 139 udp netbios-ssn unknown
5002104.244.79.89 161 tcp snmp filtered
5003104.244.79.89 161 udp snmp unknown
5004104.244.79.89 162 tcp snmptrap filtered
5005104.244.79.89 162 udp snmptrap unknown
5006104.244.79.89 389 tcp ldap filtered
5007104.244.79.89 389 udp ldap unknown
5008104.244.79.89 443 tcp ssl/http open nginx
5009104.244.79.89 520 tcp efs filtered
5010104.244.79.89 520 udp route unknown
5011104.244.79.89 2049 tcp nfs filtered
5012104.244.79.89 2049 udp nfs unknown
5013104.244.79.89 7910 tcp ssl/http open nginx
5014104.244.79.89 7920 tcp unknown closed
5015104.244.79.89 7930 tcp closed
5016104.244.79.89 16001 tcp http open MiniServ 1.930 Webmin httpd
5017104.244.79.89 16010 tcp ssl/http open nginx
5018104.244.79.89 16221 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
5019104.244.79.89 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
5020107.180.28.114 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 3 of 500 allowed.\x0d\x0a220-Local time is now 05:54. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
5021107.180.28.114 22 tcp ssh open SSH-2.0-OpenSSH_5.3
5022107.180.28.114 53 tcp domain filtered
5023107.180.28.114 53 udp domain unknown
5024107.180.28.114 67 tcp dhcps filtered
5025107.180.28.114 67 udp dhcps unknown
5026107.180.28.114 68 tcp dhcpc filtered
5027107.180.28.114 68 udp dhcpc unknown
5028107.180.28.114 69 tcp tftp filtered
5029107.180.28.114 69 udp tftp unknown
5030107.180.28.114 88 tcp kerberos-sec filtered
5031107.180.28.114 88 udp kerberos-sec unknown
5032107.180.28.114 123 tcp ntp filtered
5033107.180.28.114 123 udp ntp unknown
5034107.180.28.114 137 tcp netbios-ns filtered
5035107.180.28.114 137 udp netbios-ns unknown
5036107.180.28.114 138 tcp netbios-dgm filtered
5037107.180.28.114 138 udp netbios-dgm unknown
5038107.180.28.114 139 tcp netbios-ssn filtered
5039107.180.28.114 139 udp netbios-ssn unknown
5040107.180.28.114 161 tcp snmp filtered
5041107.180.28.114 161 udp snmp unknown
5042107.180.28.114 162 tcp snmptrap filtered
5043107.180.28.114 162 udp snmptrap unknown
5044107.180.28.114 389 tcp ldap filtered
5045107.180.28.114 389 udp ldap unknown
5046107.180.28.114 520 tcp efs filtered
5047107.180.28.114 520 udp route unknown
5048107.180.28.114 2049 tcp nfs filtered
5049107.180.28.114 2049 udp nfs unknown
5050111.90.145.39 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 15:04. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
5051111.90.145.39 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5052111.90.145.39 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5053111.90.145.39 67 tcp dhcps closed
5054111.90.145.39 67 udp dhcps closed
5055111.90.145.39 68 tcp dhcpc closed
5056111.90.145.39 68 udp dhcpc unknown
5057111.90.145.39 69 tcp tftp closed
5058111.90.145.39 69 udp tftp unknown
5059111.90.145.39 88 tcp kerberos-sec closed
5060111.90.145.39 88 udp kerberos-sec unknown
5061111.90.145.39 123 tcp ntp closed
5062111.90.145.39 123 udp ntp closed
5063111.90.145.39 137 tcp netbios-ns closed
5064111.90.145.39 137 udp netbios-ns unknown
5065111.90.145.39 138 tcp netbios-dgm closed
5066111.90.145.39 138 udp netbios-dgm unknown
5067111.90.145.39 139 tcp netbios-ssn filtered
5068111.90.145.39 139 udp netbios-ssn closed
5069111.90.145.39 161 tcp snmp closed
5070111.90.145.39 161 udp snmp unknown
5071111.90.145.39 162 tcp snmptrap closed
5072111.90.145.39 162 udp snmptrap closed
5073111.90.145.39 389 tcp ldap closed
5074111.90.145.39 389 udp ldap unknown
5075111.90.145.39 520 tcp efs closed
5076111.90.145.39 520 udp route closed
5077111.90.145.39 2049 tcp nfs closed
5078111.90.145.39 2049 udp nfs closed
5079143.95.110.248 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 150 allowed.\x0d\x0a220-Local time is now 05:55. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
5080143.95.110.248 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5081143.95.110.248 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5082143.95.110.248 67 tcp dhcps closed
5083143.95.110.248 67 udp dhcps unknown
5084143.95.110.248 68 tcp dhcpc closed
5085143.95.110.248 68 udp dhcpc unknown
5086143.95.110.248 69 tcp tftp closed
5087143.95.110.248 69 udp tftp unknown
5088143.95.110.248 88 tcp kerberos-sec closed
5089143.95.110.248 88 udp kerberos-sec unknown
5090143.95.110.248 123 tcp ntp closed
5091143.95.110.248 123 udp ntp unknown
5092143.95.110.248 137 tcp netbios-ns closed
5093143.95.110.248 137 udp netbios-ns unknown
5094143.95.110.248 138 tcp netbios-dgm closed
5095143.95.110.248 138 udp netbios-dgm closed
5096143.95.110.248 139 tcp netbios-ssn closed
5097143.95.110.248 139 udp netbios-ssn unknown
5098143.95.110.248 161 tcp snmp closed
5099143.95.110.248 161 udp snmp closed
5100143.95.110.248 162 tcp snmptrap closed
5101143.95.110.248 162 udp snmptrap unknown
5102143.95.110.248 389 tcp ldap closed
5103143.95.110.248 389 udp ldap closed
5104143.95.110.248 520 tcp efs closed
5105143.95.110.248 520 udp route unknown
5106143.95.110.248 2049 tcp nfs closed
5107143.95.110.248 2049 udp nfs unknown
5108146.83.222.104 53 tcp domain filtered
5109146.83.222.104 53 udp domain unknown
5110146.83.222.104 67 tcp dhcps filtered
5111146.83.222.104 67 udp dhcps unknown
5112146.83.222.104 68 tcp dhcpc filtered
5113146.83.222.104 68 udp dhcpc unknown
5114146.83.222.104 69 tcp tftp filtered
5115146.83.222.104 69 udp tftp filtered
5116146.83.222.104 88 tcp kerberos-sec filtered
5117146.83.222.104 88 udp kerberos-sec unknown
5118146.83.222.104 123 tcp ntp filtered
5119146.83.222.104 123 udp ntp unknown
5120146.83.222.104 137 tcp netbios-ns filtered
5121146.83.222.104 137 udp netbios-ns unknown
5122146.83.222.104 138 tcp netbios-dgm filtered
5123146.83.222.104 138 udp netbios-dgm unknown
5124146.83.222.104 139 tcp netbios-ssn filtered
5125146.83.222.104 139 udp netbios-ssn unknown
5126146.83.222.104 161 tcp snmp filtered
5127146.83.222.104 161 udp snmp unknown
5128146.83.222.104 162 tcp snmptrap filtered
5129146.83.222.104 162 udp snmptrap unknown
5130146.83.222.104 389 tcp ldap filtered
5131146.83.222.104 389 udp ldap unknown
5132146.83.222.104 520 tcp efs filtered
5133146.83.222.104 520 udp route unknown
5134146.83.222.104 2049 tcp nfs filtered
5135146.83.222.104 2049 udp nfs unknown
5136149.126.72.220 25 tcp smtp closed
5137149.126.72.220 51 tcp tcpwrapped open
5138149.126.72.220 53 tcp domain open
5139149.126.72.220 53 udp domain open
5140149.126.72.220 65 tcp tcpwrapped open
5141149.126.72.220 66 tcp tcpwrapped open
5142149.126.72.220 67 tcp dhcps filtered
5143149.126.72.220 67 udp dhcps unknown
5144149.126.72.220 68 tcp dhcpc filtered
5145149.126.72.220 68 udp dhcpc unknown
5146149.126.72.220 69 tcp tftp filtered
5147149.126.72.220 69 udp tftp unknown
5148149.126.72.220 80 tcp tcpwrapped open
5149149.126.72.220 81 tcp tcpwrapped open
5150149.126.72.220 82 tcp tcpwrapped open
5151149.126.72.220 83 tcp tcpwrapped open
5152149.126.72.220 84 tcp tcpwrapped open
5153149.126.72.220 85 tcp tcpwrapped open
5154149.126.72.220 86 tcp tcpwrapped open
5155149.126.72.220 88 tcp http open Incapsula CDN httpd
5156149.126.72.220 88 udp kerberos-sec unknown
5157149.126.72.220 89 tcp tcpwrapped open
5158149.126.72.220 90 tcp tcpwrapped open
5159149.126.72.220 91 tcp tcpwrapped open
5160149.126.72.220 92 tcp tcpwrapped open
5161149.126.72.220 98 tcp tcpwrapped open
5162149.126.72.220 99 tcp tcpwrapped open
5163149.126.72.220 123 tcp ntp filtered
5164149.126.72.220 123 udp ntp unknown
5165149.126.72.220 137 tcp netbios-ns filtered
5166149.126.72.220 137 udp netbios-ns filtered
5167149.126.72.220 138 tcp netbios-dgm filtered
5168149.126.72.220 138 udp netbios-dgm filtered
5169149.126.72.220 139 tcp netbios-ssn closed
5170149.126.72.220 139 udp netbios-ssn unknown
5171149.126.72.220 160 tcp sgmp-traps closed
5172149.126.72.220 161 tcp snmp filtered
5173149.126.72.220 161 udp snmp unknown
5174149.126.72.220 162 tcp snmptrap filtered
5175149.126.72.220 162 udp snmptrap unknown
5176149.126.72.220 189 tcp tcpwrapped open
5177149.126.72.220 190 tcp tcpwrapped open
5178149.126.72.220 192 tcp tcpwrapped open
5179149.126.72.220 243 tcp tcpwrapped open
5180149.126.72.220 285 tcp tcpwrapped open
5181149.126.72.220 314 tcp tcpwrapped open
5182149.126.72.220 343 tcp tcpwrapped open
5183149.126.72.220 347 tcp tcpwrapped open
5184149.126.72.220 385 tcp tcpwrapped open
5185149.126.72.220 389 tcp ssl/http open Incapsula CDN httpd
5186149.126.72.220 389 udp ldap unknown
5187149.126.72.220 400 tcp tcpwrapped open
5188149.126.72.220 440 tcp tcpwrapped open
5189149.126.72.220 441 tcp tcpwrapped open
5190149.126.72.220 442 tcp tcpwrapped open
5191149.126.72.220 443 tcp ssl/tcpwrapped open
5192149.126.72.220 444 tcp tcpwrapped open
5193149.126.72.220 445 tcp microsoft-ds closed
5194149.126.72.220 446 tcp tcpwrapped open
5195149.126.72.220 447 tcp tcpwrapped open
5196149.126.72.220 448 tcp tcpwrapped open
5197149.126.72.220 449 tcp tcpwrapped open
5198149.126.72.220 452 tcp tcpwrapped open
5199149.126.72.220 461 tcp tcpwrapped open
5200149.126.72.220 462 tcp tcpwrapped open
5201149.126.72.220 480 tcp tcpwrapped open
5202149.126.72.220 485 tcp tcpwrapped open
5203149.126.72.220 487 tcp tcpwrapped open
5204149.126.72.220 488 tcp tcpwrapped open
5205149.126.72.220 491 tcp tcpwrapped open
5206149.126.72.220 520 tcp efs filtered
5207149.126.72.220 520 udp route unknown
5208149.126.72.220 555 tcp tcpwrapped open
5209149.126.72.220 556 tcp tcpwrapped open
5210149.126.72.220 587 tcp tcpwrapped open
5211149.126.72.220 631 tcp tcpwrapped open
5212149.126.72.220 632 tcp tcpwrapped open
5213149.126.72.220 636 tcp tcpwrapped open
5214149.126.72.220 743 tcp tcpwrapped open
5215149.126.72.220 772 tcp tcpwrapped open
5216149.126.72.220 777 tcp tcpwrapped open
5217149.126.72.220 782 tcp tcpwrapped open
5218149.126.72.220 785 tcp tcpwrapped open
5219149.126.72.220 800 tcp tcpwrapped open
5220149.126.72.220 801 tcp tcpwrapped open
5221149.126.72.220 805 tcp tcpwrapped open
5222149.126.72.220 806 tcp tcpwrapped open
5223149.126.72.220 809 tcp tcpwrapped open
5224149.126.72.220 843 tcp tcpwrapped open
5225149.126.72.220 853 tcp tcpwrapped open
5226149.126.72.220 885 tcp tcpwrapped open
5227149.126.72.220 886 tcp tcpwrapped open
5228149.126.72.220 887 tcp tcpwrapped open
5229149.126.72.220 888 tcp tcpwrapped open
5230149.126.72.220 943 tcp tcpwrapped open
5231149.126.72.220 947 tcp tcpwrapped open
5232149.126.72.220 953 tcp tcpwrapped open
5233149.126.72.220 990 tcp tcpwrapped open
5234149.126.72.220 995 tcp tcpwrapped open
5235149.126.72.220 998 tcp tcpwrapped open
5236149.126.72.220 999 tcp tcpwrapped open
5237149.126.72.220 1000 tcp tcpwrapped open
5238149.126.72.220 1002 tcp tcpwrapped open
5239149.126.72.220 1024 tcp tcpwrapped open
5240149.126.72.220 1025 tcp tcpwrapped open
5241149.126.72.220 1028 tcp tcpwrapped open
5242149.126.72.220 1080 tcp tcpwrapped open
5243149.126.72.220 1103 tcp tcpwrapped open
5244149.126.72.220 1111 tcp tcpwrapped open
5245149.126.72.220 1180 tcp tcpwrapped open
5246149.126.72.220 1181 tcp tcpwrapped open
5247149.126.72.220 1207 tcp tcpwrapped open
5248149.126.72.220 1234 tcp tcpwrapped open
5249149.126.72.220 1250 tcp tcpwrapped open
5250149.126.72.220 1283 tcp tcpwrapped open
5251149.126.72.220 1291 tcp tcpwrapped open
5252149.126.72.220 1292 tcp tcpwrapped open
5253149.126.72.220 1293 tcp tcpwrapped open
5254149.126.72.220 1337 tcp tcpwrapped open
5255149.126.72.220 1344 tcp tcpwrapped open
5256149.126.72.220 1355 tcp tcpwrapped open
5257149.126.72.220 1364 tcp tcpwrapped open
5258149.126.72.220 1366 tcp tcpwrapped open
5259149.126.72.220 1377 tcp tcpwrapped open
5260149.126.72.220 1387 tcp tcpwrapped open
5261149.126.72.220 1388 tcp tcpwrapped open
5262149.126.72.220 1433 tcp tcpwrapped open
5263149.126.72.220 1443 tcp tcpwrapped open
5264149.126.72.220 1447 tcp tcpwrapped open
5265149.126.72.220 1450 tcp tcpwrapped open
5266149.126.72.220 1451 tcp tcpwrapped open
5267149.126.72.220 1452 tcp tcpwrapped open
5268149.126.72.220 1453 tcp tcpwrapped open
5269149.126.72.220 1454 tcp tcpwrapped open
5270149.126.72.220 1455 tcp tcpwrapped open
5271149.126.72.220 1456 tcp tcpwrapped open
5272149.126.72.220 1457 tcp tcpwrapped open
5273149.126.72.220 1458 tcp tcpwrapped open
5274149.126.72.220 1459 tcp tcpwrapped open
5275149.126.72.220 1460 tcp tcpwrapped open
5276149.126.72.220 1494 tcp tcpwrapped open
5277149.126.72.220 1935 tcp tcpwrapped open
5278149.126.72.220 1950 tcp tcpwrapped open
5279149.126.72.220 1951 tcp tcpwrapped open
5280149.126.72.220 1952 tcp tcpwrapped open
5281149.126.72.220 1953 tcp tcpwrapped open
5282149.126.72.220 1954 tcp tcpwrapped open
5283149.126.72.220 1955 tcp tcpwrapped open
5284149.126.72.220 1956 tcp tcpwrapped open
5285149.126.72.220 1957 tcp tcpwrapped open
5286149.126.72.220 1958 tcp tcpwrapped open
5287149.126.72.220 1959 tcp tcpwrapped open
5288149.126.72.220 1960 tcp tcpwrapped open
5289149.126.72.220 1964 tcp tcpwrapped open
5290149.126.72.220 1965 tcp tcpwrapped open
5291149.126.72.220 1966 tcp tcpwrapped open
5292149.126.72.220 1967 tcp tcpwrapped open
5293149.126.72.220 1968 tcp tcpwrapped open
5294149.126.72.220 1969 tcp tcpwrapped open
5295149.126.72.220 1970 tcp tcpwrapped open
5296149.126.72.220 1971 tcp tcpwrapped open
5297149.126.72.220 1972 tcp tcpwrapped open
5298149.126.72.220 1973 tcp tcpwrapped open
5299149.126.72.220 1974 tcp tcpwrapped open
5300149.126.72.220 1975 tcp tcpwrapped open
5301149.126.72.220 1976 tcp tcpwrapped open
5302149.126.72.220 1977 tcp tcpwrapped open
5303149.126.72.220 1978 tcp tcpwrapped open
5304149.126.72.220 1979 tcp tcpwrapped open
5305149.126.72.220 1980 tcp tcpwrapped open
5306149.126.72.220 1981 tcp tcpwrapped open
5307149.126.72.220 1982 tcp tcpwrapped open
5308149.126.72.220 1983 tcp tcpwrapped open
5309149.126.72.220 1984 tcp tcpwrapped open
5310149.126.72.220 1985 tcp tcpwrapped open
5311149.126.72.220 1986 tcp tcpwrapped open
5312149.126.72.220 1987 tcp tcpwrapped open
5313149.126.72.220 1988 tcp tcpwrapped open
5314149.126.72.220 1989 tcp tcpwrapped open
5315149.126.72.220 2000 tcp tcpwrapped open
5316149.126.72.220 2001 tcp tcpwrapped open
5317149.126.72.220 2006 tcp tcpwrapped open
5318149.126.72.220 2012 tcp tcpwrapped open
5319149.126.72.220 2020 tcp tcpwrapped open
5320149.126.72.220 2048 tcp tcpwrapped open
5321149.126.72.220 2049 tcp http open Incapsula CDN httpd
5322149.126.72.220 2049 udp nfs unknown
5323149.126.72.220 2050 tcp tcpwrapped open
5324149.126.72.220 2051 tcp tcpwrapped open
5325149.126.72.220 2052 tcp tcpwrapped open
5326149.126.72.220 2053 tcp tcpwrapped open
5327149.126.72.220 2054 tcp tcpwrapped open
5328149.126.72.220 2055 tcp tcpwrapped open
5329149.126.72.220 2056 tcp tcpwrapped open
5330149.126.72.220 2057 tcp tcpwrapped open
5331149.126.72.220 2058 tcp tcpwrapped open
5332149.126.72.220 2059 tcp tcpwrapped open
5333149.126.72.220 2060 tcp tcpwrapped open
5334149.126.72.220 2061 tcp tcpwrapped open
5335149.126.72.220 2062 tcp tcpwrapped open
5336149.126.72.220 2063 tcp tcpwrapped open
5337149.126.72.220 2064 tcp tcpwrapped open
5338149.126.72.220 2065 tcp tcpwrapped open
5339149.126.72.220 2066 tcp tcpwrapped open
5340149.126.72.220 2067 tcp tcpwrapped open
5341149.126.72.220 2068 tcp tcpwrapped open
5342149.126.72.220 2069 tcp tcpwrapped open
5343149.126.72.220 2070 tcp tcpwrapped open
5344149.126.72.220 2072 tcp tcpwrapped open
5345149.126.72.220 2082 tcp tcpwrapped open
5346149.126.72.220 2083 tcp tcpwrapped open
5347149.126.72.220 2087 tcp tcpwrapped open
5348149.126.72.220 2096 tcp tcpwrapped open
5349149.126.72.220 2100 tcp tcpwrapped open
5350149.126.72.220 2108 tcp tcpwrapped open
5351149.126.72.220 2200 tcp tcpwrapped open
5352149.126.72.220 2209 tcp tcpwrapped open
5353149.126.72.220 2222 tcp tcpwrapped open
5354149.126.72.220 2226 tcp tcpwrapped open
5355149.126.72.220 2248 tcp tcpwrapped open
5356149.126.72.220 2344 tcp tcpwrapped open
5357149.126.72.220 2345 tcp tcpwrapped open
5358149.126.72.220 2353 tcp tcpwrapped open
5359149.126.72.220 2363 tcp tcpwrapped open
5360149.126.72.220 2423 tcp tcpwrapped open
5361149.126.72.220 2433 tcp tcpwrapped open
5362149.126.72.220 2435 tcp tcpwrapped open
5363149.126.72.220 2443 tcp tcpwrapped open
5364149.126.72.220 2453 tcp tcpwrapped open
5365149.126.72.220 2480 tcp tcpwrapped open
5366149.126.72.220 2548 tcp tcpwrapped open
5367149.126.72.220 2549 tcp tcpwrapped open
5368149.126.72.220 2550 tcp tcpwrapped open
5369149.126.72.220 2551 tcp tcpwrapped open
5370149.126.72.220 2552 tcp tcpwrapped open
5371149.126.72.220 2553 tcp tcpwrapped open
5372149.126.72.220 2554 tcp tcpwrapped open
5373149.126.72.220 2555 tcp tcpwrapped open
5374149.126.72.220 2556 tcp tcpwrapped open
5375149.126.72.220 2557 tcp tcpwrapped open
5376149.126.72.220 2558 tcp tcpwrapped open
5377149.126.72.220 2559 tcp tcpwrapped open
5378149.126.72.220 2560 tcp tcpwrapped open
5379149.126.72.220 2561 tcp tcpwrapped open
5380149.126.72.220 2562 tcp tcpwrapped open
5381149.126.72.220 2563 tcp tcpwrapped open
5382149.126.72.220 2566 tcp tcpwrapped open
5383149.126.72.220 2567 tcp tcpwrapped open
5384149.126.72.220 2568 tcp tcpwrapped open
5385149.126.72.220 2569 tcp tcpwrapped open
5386149.126.72.220 2570 tcp tcpwrapped open
5387149.126.72.220 2572 tcp tcpwrapped open
5388149.126.72.220 2598 tcp tcpwrapped open
5389149.126.72.220 2599 tcp tcpwrapped open
5390149.126.72.220 2850 tcp tcpwrapped open
5391149.126.72.220 2985 tcp tcpwrapped open
5392149.126.72.220 2995 tcp tcpwrapped open
5393149.126.72.220 3000 tcp tcpwrapped open
5394149.126.72.220 3001 tcp tcpwrapped open
5395149.126.72.220 3002 tcp tcpwrapped open
5396149.126.72.220 3003 tcp tcpwrapped open
5397149.126.72.220 3004 tcp tcpwrapped open
5398149.126.72.220 3005 tcp tcpwrapped open
5399149.126.72.220 3006 tcp tcpwrapped open
5400149.126.72.220 3007 tcp tcpwrapped open
5401149.126.72.220 3008 tcp tcpwrapped open
5402149.126.72.220 3009 tcp tcpwrapped open
5403149.126.72.220 3010 tcp tcpwrapped open
5404149.126.72.220 3011 tcp tcpwrapped open
5405149.126.72.220 3012 tcp tcpwrapped open
5406149.126.72.220 3013 tcp tcpwrapped open
5407149.126.72.220 3014 tcp tcpwrapped open
5408149.126.72.220 3015 tcp tcpwrapped open
5409149.126.72.220 3016 tcp tcpwrapped open
5410149.126.72.220 3017 tcp tcpwrapped open
5411149.126.72.220 3018 tcp tcpwrapped open
5412149.126.72.220 3019 tcp tcpwrapped open
5413149.126.72.220 3020 tcp tcpwrapped open
5414149.126.72.220 3021 tcp tcpwrapped open
5415149.126.72.220 3022 tcp tcpwrapped open
5416149.126.72.220 3030 tcp tcpwrapped open
5417149.126.72.220 3047 tcp tcpwrapped open
5418149.126.72.220 3048 tcp tcpwrapped open
5419149.126.72.220 3049 tcp tcpwrapped open
5420149.126.72.220 3050 tcp tcpwrapped open
5421149.126.72.220 3051 tcp tcpwrapped open
5422149.126.72.220 3052 tcp tcpwrapped open
5423149.126.72.220 3053 tcp tcpwrapped open
5424149.126.72.220 3054 tcp tcpwrapped open
5425149.126.72.220 3055 tcp tcpwrapped open
5426149.126.72.220 3056 tcp tcpwrapped open
5427149.126.72.220 3057 tcp tcpwrapped open
5428149.126.72.220 3058 tcp tcpwrapped open
5429149.126.72.220 3059 tcp tcpwrapped open
5430149.126.72.220 3060 tcp tcpwrapped open
5431149.126.72.220 3061 tcp tcpwrapped open
5432149.126.72.220 3062 tcp tcpwrapped open
5433149.126.72.220 3063 tcp tcpwrapped open
5434149.126.72.220 3064 tcp tcpwrapped open
5435149.126.72.220 3065 tcp tcpwrapped open
5436149.126.72.220 3066 tcp tcpwrapped open
5437149.126.72.220 3067 tcp tcpwrapped open
5438149.126.72.220 3068 tcp tcpwrapped open
5439149.126.72.220 3069 tcp tcpwrapped open
5440149.126.72.220 3070 tcp tcpwrapped open
5441149.126.72.220 3071 tcp tcpwrapped open
5442149.126.72.220 3072 tcp tcpwrapped open
5443149.126.72.220 3073 tcp tcpwrapped open
5444149.126.72.220 3074 tcp tcpwrapped open
5445149.126.72.220 3075 tcp tcpwrapped open
5446149.126.72.220 3076 tcp tcpwrapped open
5447149.126.72.220 3077 tcp tcpwrapped open
5448149.126.72.220 3078 tcp tcpwrapped open
5449149.126.72.220 3079 tcp tcpwrapped open
5450149.126.72.220 3080 tcp tcpwrapped open
5451149.126.72.220 3081 tcp tcpwrapped open
5452149.126.72.220 3082 tcp tcpwrapped open
5453149.126.72.220 3083 tcp tcpwrapped open
5454149.126.72.220 3084 tcp tcpwrapped open
5455149.126.72.220 3085 tcp tcpwrapped open
5456149.126.72.220 3086 tcp tcpwrapped open
5457149.126.72.220 3087 tcp tcpwrapped open
5458149.126.72.220 3088 tcp tcpwrapped open
5459149.126.72.220 3089 tcp tcpwrapped open
5460149.126.72.220 3090 tcp tcpwrapped open
5461149.126.72.220 3091 tcp tcpwrapped open
5462149.126.72.220 3092 tcp tcpwrapped open
5463149.126.72.220 3093 tcp tcpwrapped open
5464149.126.72.220 3094 tcp tcpwrapped open
5465149.126.72.220 3095 tcp tcpwrapped open
5466149.126.72.220 3096 tcp tcpwrapped open
5467149.126.72.220 3097 tcp tcpwrapped open
5468149.126.72.220 3098 tcp tcpwrapped open
5469149.126.72.220 3099 tcp tcpwrapped open
5470149.126.72.220 3100 tcp tcpwrapped open
5471149.126.72.220 3101 tcp tcpwrapped open
5472149.126.72.220 3102 tcp tcpwrapped open
5473149.126.72.220 3103 tcp tcpwrapped open
5474149.126.72.220 3104 tcp tcpwrapped open
5475149.126.72.220 3105 tcp tcpwrapped open
5476149.126.72.220 3106 tcp tcpwrapped open
5477149.126.72.220 3107 tcp tcpwrapped open
5478149.126.72.220 3108 tcp tcpwrapped open
5479149.126.72.220 3109 tcp tcpwrapped open
5480149.126.72.220 3110 tcp tcpwrapped open
5481149.126.72.220 3111 tcp tcpwrapped open
5482149.126.72.220 3112 tcp tcpwrapped open
5483149.126.72.220 3113 tcp tcpwrapped open
5484149.126.72.220 3114 tcp tcpwrapped open
5485149.126.72.220 3115 tcp tcpwrapped open
5486149.126.72.220 3116 tcp tcpwrapped open
5487149.126.72.220 3117 tcp tcpwrapped open
5488149.126.72.220 3118 tcp tcpwrapped open
5489149.126.72.220 3119 tcp tcpwrapped open
5490149.126.72.220 3120 tcp tcpwrapped open
5491149.126.72.220 3121 tcp tcpwrapped open
5492149.126.72.220 3150 tcp tcpwrapped open
5493149.126.72.220 3155 tcp tcpwrapped open
5494149.126.72.220 3160 tcp tcpwrapped open
5495149.126.72.220 3165 tcp tcpwrapped open
5496149.126.72.220 3270 tcp tcpwrapped open
5497149.126.72.220 3299 tcp tcpwrapped open
5498149.126.72.220 3306 tcp tcpwrapped open
5499149.126.72.220 3333 tcp tcpwrapped open
5500149.126.72.220 3389 tcp tcpwrapped open
5501149.126.72.220 3391 tcp tcpwrapped open
5502149.126.72.220 3400 tcp tcpwrapped open
5503149.126.72.220 3401 tcp tcpwrapped open
5504149.126.72.220 3402 tcp tcpwrapped open
5505149.126.72.220 3403 tcp tcpwrapped open
5506149.126.72.220 3404 tcp tcpwrapped open
5507149.126.72.220 3405 tcp tcpwrapped open
5508149.126.72.220 3406 tcp tcpwrapped open
5509149.126.72.220 3407 tcp tcpwrapped open
5510149.126.72.220 3408 tcp tcpwrapped open
5511149.126.72.220 3409 tcp tcpwrapped open
5512149.126.72.220 3410 tcp tcpwrapped open
5513149.126.72.220 3412 tcp tcpwrapped open
5514149.126.72.220 3443 tcp tcpwrapped open
5515149.126.72.220 3500 tcp tcpwrapped open
5516149.126.72.220 3510 tcp tcpwrapped open
5517149.126.72.220 3521 tcp tcpwrapped open
5518149.126.72.220 3522 tcp tcpwrapped open
5519149.126.72.220 3523 tcp tcpwrapped open
5520149.126.72.220 3524 tcp tcpwrapped open
5521149.126.72.220 3530 tcp tcpwrapped open
5522149.126.72.220 3531 tcp tcpwrapped open
5523149.126.72.220 3540 tcp tcpwrapped open
5524149.126.72.220 3548 tcp tcpwrapped open
5525149.126.72.220 3549 tcp tcpwrapped open
5526149.126.72.220 3550 tcp tcpwrapped open
5527149.126.72.220 3551 tcp tcpwrapped open
5528149.126.72.220 3552 tcp tcpwrapped open
5529149.126.72.220 3553 tcp tcpwrapped open
5530149.126.72.220 3554 tcp tcpwrapped open
5531149.126.72.220 3555 tcp tcpwrapped open
5532149.126.72.220 3556 tcp tcpwrapped open
5533149.126.72.220 3557 tcp tcpwrapped open
5534149.126.72.220 3558 tcp tcpwrapped open
5535149.126.72.220 3559 tcp tcpwrapped open
5536149.126.72.220 3560 tcp tcpwrapped open
5537149.126.72.220 3561 tcp tcpwrapped open
5538149.126.72.220 3562 tcp tcpwrapped open
5539149.126.72.220 3563 tcp tcpwrapped open
5540149.126.72.220 3566 tcp tcpwrapped open
5541149.126.72.220 3567 tcp tcpwrapped open
5542149.126.72.220 3568 tcp tcpwrapped open
5543149.126.72.220 3569 tcp tcpwrapped open
5544149.126.72.220 3570 tcp tcpwrapped open
5545149.126.72.220 3572 tcp tcpwrapped open
5546149.126.72.220 3580 tcp tcpwrapped open
5547149.126.72.220 3590 tcp tcpwrapped open
5548149.126.72.220 3790 tcp tcpwrapped open
5549149.126.72.220 3791 tcp tcpwrapped open
5550149.126.72.220 3792 tcp tcpwrapped open
5551149.126.72.220 3793 tcp tcpwrapped open
5552149.126.72.220 3794 tcp tcpwrapped open
5553149.126.72.220 3838 tcp tcpwrapped open
5554149.126.72.220 3841 tcp tcpwrapped open
5555149.126.72.220 3842 tcp tcpwrapped open
5556149.126.72.220 3950 tcp tcpwrapped open
5557149.126.72.220 3951 tcp tcpwrapped open
5558149.126.72.220 3952 tcp tcpwrapped open
5559149.126.72.220 3953 tcp tcpwrapped open
5560149.126.72.220 3954 tcp adrep open
5561149.126.72.220 4000 tcp tcpwrapped open
5562149.126.72.220 4001 tcp newoak open
5563149.126.72.220 4002 tcp mlchat-proxy open
5564149.126.72.220 4021 tcp nexus-portal open
5565149.126.72.220 4022 tcp dnox open
5566149.126.72.220 4023 tcp esnm-zoning open
5567149.126.72.220 4043 tcp nirp open
5568149.126.72.220 4072 tcp zieto-sock open
5569149.126.72.220 4080 tcp lorica-in open
5570149.126.72.220 4085 tcp ezmessagesrv open
5571149.126.72.220 4120 tcp minirem open
5572149.126.72.220 4147 tcp vrxpservman open
5573149.126.72.220 4148 tcp hhb-handheld open
5574149.126.72.220 4150 tcp poweralert-nsa open
5575149.126.72.220 4155 tcp bzr open
5576149.126.72.220 4160 tcp jini-discovery open
5577149.126.72.220 4165 tcp altcp open
5578149.126.72.220 4172 tcp pcoip open
5579149.126.72.220 4243 tcp vrml-multi-use open
5580149.126.72.220 4244 tcp vrml-multi-use open
5581149.126.72.220 4250 tcp vrml-multi-use open
5582149.126.72.220 4300 tcp corelccam open
5583149.126.72.220 4333 tcp msql open
5584149.126.72.220 4343 tcp unicall open
5585149.126.72.220 4344 tcp vinainstall open
5586149.126.72.220 4400 tcp ds-srv open
5587149.126.72.220 4401 tcp tcpwrapped open
5588149.126.72.220 4402 tcp tcpwrapped open
5589149.126.72.220 4430 tcp tcpwrapped open
5590149.126.72.220 4431 tcp tcpwrapped open
5591149.126.72.220 4432 tcp tcpwrapped open
5592149.126.72.220 4434 tcp tcpwrapped open
5593149.126.72.220 4435 tcp tcpwrapped open
5594149.126.72.220 4436 tcp tcpwrapped open
5595149.126.72.220 4437 tcp tcpwrapped open
5596149.126.72.220 4439 tcp tcpwrapped open
5597149.126.72.220 4440 tcp tcpwrapped open
5598149.126.72.220 4443 tcp tcpwrapped open
5599149.126.72.220 4444 tcp tcpwrapped open
5600149.126.72.220 4445 tcp tcpwrapped open
5601149.126.72.220 4451 tcp tcpwrapped open
5602149.126.72.220 4455 tcp tcpwrapped open
5603149.126.72.220 4457 tcp tcpwrapped open
5604149.126.72.220 4459 tcp tcpwrapped open
5605149.126.72.220 4461 tcp tcpwrapped open
5606149.126.72.220 4463 tcp tcpwrapped open
5607149.126.72.220 4477 tcp tcpwrapped open
5608149.126.72.220 4482 tcp tcpwrapped open
5609149.126.72.220 4500 tcp tcpwrapped open
5610149.126.72.220 4502 tcp tcpwrapped open
5611149.126.72.220 4505 tcp tcpwrapped open
5612149.126.72.220 4572 tcp tcpwrapped open
5613149.126.72.220 4602 tcp tcpwrapped open
5614149.126.72.220 4620 tcp tcpwrapped open
5615149.126.72.220 4643 tcp tcpwrapped open
5616149.126.72.220 4848 tcp tcpwrapped open
5617149.126.72.220 4933 tcp tcpwrapped open
5618149.126.72.220 4993 tcp tcpwrapped open
5619149.126.72.220 5000 tcp tcpwrapped open
5620149.126.72.220 5001 tcp tcpwrapped open
5621149.126.72.220 5002 tcp tcpwrapped open
5622149.126.72.220 5003 tcp tcpwrapped open
5623149.126.72.220 5004 tcp tcpwrapped open
5624149.126.72.220 5005 tcp tcpwrapped open
5625149.126.72.220 5006 tcp tcpwrapped open
5626149.126.72.220 5007 tcp tcpwrapped open
5627149.126.72.220 5008 tcp tcpwrapped open
5628149.126.72.220 5009 tcp tcpwrapped open
5629149.126.72.220 5010 tcp tcpwrapped open
5630149.126.72.220 5011 tcp tcpwrapped open
5631149.126.72.220 5022 tcp tcpwrapped open
5632149.126.72.220 5050 tcp tcpwrapped open
5633149.126.72.220 5053 tcp tcpwrapped open
5634149.126.72.220 5060 tcp tcpwrapped open
5635149.126.72.220 5061 tcp tcpwrapped open
5636149.126.72.220 5080 tcp tcpwrapped open
5637149.126.72.220 5083 tcp tcpwrapped open
5638149.126.72.220 5089 tcp tcpwrapped open
5639149.126.72.220 5090 tcp tcpwrapped open
5640149.126.72.220 5100 tcp tcpwrapped open
5641149.126.72.220 5105 tcp tcpwrapped open
5642149.126.72.220 5119 tcp tcpwrapped open
5643149.126.72.220 5120 tcp tcpwrapped open
5644149.126.72.220 5130 tcp tcpwrapped open
5645149.126.72.220 5140 tcp tcpwrapped open
5646149.126.72.220 5150 tcp tcpwrapped open
5647149.126.72.220 5160 tcp tcpwrapped open
5648149.126.72.220 5180 tcp tcpwrapped open
5649149.126.72.220 5201 tcp tcpwrapped open
5650149.126.72.220 5222 tcp tcpwrapped open
5651149.126.72.220 5223 tcp tcpwrapped open
5652149.126.72.220 5224 tcp tcpwrapped open
5653149.126.72.220 5225 tcp tcpwrapped open
5654149.126.72.220 5226 tcp tcpwrapped open
5655149.126.72.220 5227 tcp tcpwrapped open
5656149.126.72.220 5228 tcp tcpwrapped open
5657149.126.72.220 5229 tcp tcpwrapped open
5658149.126.72.220 5230 tcp tcpwrapped open
5659149.126.72.220 5231 tcp tcpwrapped open
5660149.126.72.220 5232 tcp tcpwrapped open
5661149.126.72.220 5233 tcp tcpwrapped open
5662149.126.72.220 5234 tcp tcpwrapped open
5663149.126.72.220 5235 tcp tcpwrapped open
5664149.126.72.220 5236 tcp tcpwrapped open
5665149.126.72.220 5237 tcp tcpwrapped open
5666149.126.72.220 5238 tcp tcpwrapped open
5667149.126.72.220 5239 tcp tcpwrapped open
5668149.126.72.220 5240 tcp tcpwrapped open
5669149.126.72.220 5241 tcp tcpwrapped open
5670149.126.72.220 5242 tcp tcpwrapped open
5671149.126.72.220 5243 tcp tcpwrapped open
5672149.126.72.220 5244 tcp tcpwrapped open
5673149.126.72.220 5245 tcp tcpwrapped open
5674149.126.72.220 5246 tcp tcpwrapped open
5675149.126.72.220 5247 tcp tcpwrapped open
5676149.126.72.220 5248 tcp tcpwrapped open
5677149.126.72.220 5249 tcp tcpwrapped open
5678149.126.72.220 5250 tcp tcpwrapped open
5679149.126.72.220 5251 tcp tcpwrapped open
5680149.126.72.220 5252 tcp tcpwrapped open
5681149.126.72.220 5253 tcp tcpwrapped open
5682149.126.72.220 5254 tcp tcpwrapped open
5683149.126.72.220 5255 tcp tcpwrapped open
5684149.126.72.220 5256 tcp tcpwrapped open
5685149.126.72.220 5257 tcp tcpwrapped open
5686149.126.72.220 5258 tcp tcpwrapped open
5687149.126.72.220 5259 tcp tcpwrapped open
5688149.126.72.220 5260 tcp tcpwrapped open
5689149.126.72.220 5261 tcp tcpwrapped open
5690149.126.72.220 5262 tcp tcpwrapped open
5691149.126.72.220 5263 tcp tcpwrapped open
5692149.126.72.220 5264 tcp tcpwrapped open
5693149.126.72.220 5265 tcp tcpwrapped open
5694149.126.72.220 5266 tcp tcpwrapped open
5695149.126.72.220 5267 tcp tcpwrapped open
5696149.126.72.220 5268 tcp tcpwrapped open
5697149.126.72.220 5269 tcp tcpwrapped open
5698149.126.72.220 5270 tcp tcpwrapped open
5699149.126.72.220 5271 tcp tcpwrapped open
5700149.126.72.220 5272 tcp tcpwrapped open
5701149.126.72.220 5273 tcp tcpwrapped open
5702149.126.72.220 5274 tcp tcpwrapped open
5703149.126.72.220 5275 tcp tcpwrapped open
5704149.126.72.220 5276 tcp tcpwrapped open
5705149.126.72.220 5277 tcp tcpwrapped open
5706149.126.72.220 5278 tcp tcpwrapped open
5707149.126.72.220 5279 tcp tcpwrapped open
5708149.126.72.220 5280 tcp tcpwrapped open
5709149.126.72.220 5440 tcp tcpwrapped open
5710149.126.72.220 5443 tcp tcpwrapped open
5711149.126.72.220 5456 tcp tcpwrapped open
5712149.126.72.220 5494 tcp tcpwrapped open
5713149.126.72.220 5495 tcp tcpwrapped open
5714149.126.72.220 5500 tcp tcpwrapped open
5715149.126.72.220 5503 tcp tcpwrapped open
5716149.126.72.220 5552 tcp tcpwrapped open
5717149.126.72.220 5555 tcp tcpwrapped open
5718149.126.72.220 5556 tcp tcpwrapped open
5719149.126.72.220 5557 tcp tcpwrapped open
5720149.126.72.220 5567 tcp tcpwrapped open
5721149.126.72.220 5568 tcp tcpwrapped open
5722149.126.72.220 5569 tcp tcpwrapped open
5723149.126.72.220 5590 tcp tcpwrapped open
5724149.126.72.220 5591 tcp tcpwrapped open
5725149.126.72.220 5592 tcp tcpwrapped open
5726149.126.72.220 5593 tcp tcpwrapped open
5727149.126.72.220 5594 tcp tcpwrapped open
5728149.126.72.220 5595 tcp tcpwrapped open
5729149.126.72.220 5596 tcp tcpwrapped open
5730149.126.72.220 5597 tcp tcpwrapped open
5731149.126.72.220 5598 tcp tcpwrapped open
5732149.126.72.220 5599 tcp tcpwrapped open
5733149.126.72.220 5600 tcp tcpwrapped open
5734149.126.72.220 5601 tcp tcpwrapped open
5735149.126.72.220 5602 tcp tcpwrapped open
5736149.126.72.220 5603 tcp tcpwrapped open
5737149.126.72.220 5604 tcp tcpwrapped open
5738149.126.72.220 5605 tcp tcpwrapped open
5739149.126.72.220 5606 tcp tcpwrapped open
5740149.126.72.220 5607 tcp tcpwrapped open
5741149.126.72.220 5608 tcp tcpwrapped open
5742149.126.72.220 5609 tcp tcpwrapped open
5743149.126.72.220 5613 tcp tcpwrapped open
5744149.126.72.220 5614 tcp tcpwrapped open
5745149.126.72.220 5620 tcp tcpwrapped open
5746149.126.72.220 5630 tcp tcpwrapped open
5747149.126.72.220 5640 tcp tcpwrapped open
5748149.126.72.220 5650 tcp tcpwrapped open
5749149.126.72.220 5660 tcp tcpwrapped open
5750149.126.72.220 5671 tcp tcpwrapped open
5751149.126.72.220 5672 tcp tcpwrapped open
5752149.126.72.220 5673 tcp tcpwrapped open
5753149.126.72.220 5680 tcp tcpwrapped open
5754149.126.72.220 5696 tcp tcpwrapped open
5755149.126.72.220 5698 tcp tcpwrapped open
5756149.126.72.220 5701 tcp tcpwrapped open
5757149.126.72.220 5721 tcp tcpwrapped open
5758149.126.72.220 5900 tcp tcpwrapped open
5759149.126.72.220 5901 tcp tcpwrapped open
5760149.126.72.220 5902 tcp tcpwrapped open
5761149.126.72.220 5903 tcp tcpwrapped open
5762149.126.72.220 5904 tcp tcpwrapped open
5763149.126.72.220 5905 tcp tcpwrapped open
5764149.126.72.220 5906 tcp tcpwrapped open
5765149.126.72.220 5907 tcp tcpwrapped open
5766149.126.72.220 5908 tcp tcpwrapped open
5767149.126.72.220 5909 tcp tcpwrapped open
5768149.126.72.220 5910 tcp tcpwrapped open
5769149.126.72.220 5911 tcp tcpwrapped open
5770149.126.72.220 5912 tcp tcpwrapped open
5771149.126.72.220 5913 tcp tcpwrapped open
5772149.126.72.220 5914 tcp tcpwrapped open
5773149.126.72.220 5915 tcp tcpwrapped open
5774149.126.72.220 5916 tcp tcpwrapped open
5775149.126.72.220 5917 tcp tcpwrapped open
5776149.126.72.220 5918 tcp tcpwrapped open
5777149.126.72.220 5919 tcp tcpwrapped open
5778149.126.72.220 5920 tcp tcpwrapped open
5779149.126.72.220 5984 tcp tcpwrapped open
5780149.126.72.220 5985 tcp tcpwrapped open
5781149.126.72.220 5986 tcp tcpwrapped open
5782149.126.72.220 5987 tcp tcpwrapped open
5783149.126.72.220 5988 tcp tcpwrapped open
5784149.126.72.220 5989 tcp tcpwrapped open
5785149.126.72.220 5990 tcp tcpwrapped open
5786149.126.72.220 5991 tcp tcpwrapped open
5787149.126.72.220 5992 tcp tcpwrapped open
5788149.126.72.220 5993 tcp tcpwrapped open
5789149.126.72.220 5994 tcp tcpwrapped open
5790149.126.72.220 5995 tcp tcpwrapped open
5791149.126.72.220 5996 tcp tcpwrapped open
5792149.126.72.220 5997 tcp tcpwrapped open
5793149.126.72.220 5998 tcp tcpwrapped open
5794149.126.72.220 5999 tcp tcpwrapped open
5795149.126.72.220 6000 tcp tcpwrapped open
5796149.126.72.220 6001 tcp tcpwrapped open
5797149.126.72.220 6002 tcp tcpwrapped open
5798149.126.72.220 6003 tcp tcpwrapped open
5799149.126.72.220 6004 tcp tcpwrapped open
5800149.126.72.220 6005 tcp tcpwrapped open
5801149.126.72.220 6006 tcp tcpwrapped open
5802149.126.72.220 6007 tcp tcpwrapped open
5803149.126.72.220 6008 tcp tcpwrapped open
5804149.126.72.220 6009 tcp tcpwrapped open
5805149.126.72.220 6010 tcp tcpwrapped open
5806149.126.72.220 6011 tcp tcpwrapped open
5807149.126.72.220 6021 tcp tcpwrapped open
5808149.126.72.220 6060 tcp tcpwrapped open
5809149.126.72.220 6061 tcp tcpwrapped open
5810149.126.72.220 6081 tcp tcpwrapped open
5811149.126.72.220 6100 tcp tcpwrapped open
5812149.126.72.220 6102 tcp tcpwrapped open
5813149.126.72.220 6134 tcp tcpwrapped open
5814149.126.72.220 6161 tcp tcpwrapped open
5815149.126.72.220 6331 tcp tcpwrapped open
5816149.126.72.220 6348 tcp tcpwrapped open
5817149.126.72.220 6379 tcp tcpwrapped open
5818149.126.72.220 6380 tcp tcpwrapped open
5819149.126.72.220 6433 tcp tcpwrapped open
5820149.126.72.220 6440 tcp tcpwrapped open
5821149.126.72.220 6443 tcp tcpwrapped open
5822149.126.72.220 6488 tcp tcpwrapped open
5823149.126.72.220 6500 tcp tcpwrapped open
5824149.126.72.220 6505 tcp tcpwrapped open
5825149.126.72.220 6510 tcp tcpwrapped open
5826149.126.72.220 6511 tcp tcpwrapped open
5827149.126.72.220 6512 tcp tcpwrapped open
5828149.126.72.220 6514 tcp tcpwrapped open
5829149.126.72.220 6543 tcp tcpwrapped open
5830149.126.72.220 6544 tcp tcpwrapped open
5831149.126.72.220 6560 tcp tcpwrapped open
5832149.126.72.220 6561 tcp tcpwrapped open
5833149.126.72.220 6565 tcp tcpwrapped open
5834149.126.72.220 6580 tcp tcpwrapped open
5835149.126.72.220 6581 tcp tcpwrapped open
5836149.126.72.220 6590 tcp tcpwrapped open
5837149.126.72.220 6601 tcp tcpwrapped open
5838149.126.72.220 6603 tcp tcpwrapped open
5839149.126.72.220 6605 tcp tcpwrapped open
5840149.126.72.220 6661 tcp tcpwrapped open
5841149.126.72.220 6662 tcp tcpwrapped open
5842149.126.72.220 6666 tcp tcpwrapped open
5843149.126.72.220 6686 tcp tcpwrapped open
5844149.126.72.220 6688 tcp tcpwrapped open
5845149.126.72.220 6700 tcp tcpwrapped open
5846149.126.72.220 6755 tcp tcpwrapped open
5847149.126.72.220 6775 tcp tcpwrapped open
5848149.126.72.220 6779 tcp tcpwrapped open
5849149.126.72.220 6789 tcp tcpwrapped open
5850149.126.72.220 6799 tcp tcpwrapped open
5851149.126.72.220 7000 tcp tcpwrapped open
5852149.126.72.220 7001 tcp tcpwrapped open
5853149.126.72.220 7002 tcp tcpwrapped open
5854149.126.72.220 7003 tcp tcpwrapped open
5855149.126.72.220 7004 tcp tcpwrapped open
5856149.126.72.220 7005 tcp tcpwrapped open
5857149.126.72.220 7007 tcp tcpwrapped open
5858149.126.72.220 7010 tcp tcpwrapped open
5859149.126.72.220 7011 tcp tcpwrapped open
5860149.126.72.220 7021 tcp tcpwrapped open
5861149.126.72.220 7070 tcp tcpwrapped open
5862149.126.72.220 7071 tcp tcpwrapped open
5863149.126.72.220 7079 tcp tcpwrapped open
5864149.126.72.220 7080 tcp tcpwrapped open
5865149.126.72.220 7081 tcp tcpwrapped open
5866149.126.72.220 7082 tcp tcpwrapped open
5867149.126.72.220 7083 tcp tcpwrapped open
5868149.126.72.220 7084 tcp tcpwrapped open
5869149.126.72.220 7085 tcp tcpwrapped open
5870149.126.72.220 7086 tcp tcpwrapped open
5871149.126.72.220 7087 tcp tcpwrapped open
5872149.126.72.220 7088 tcp tcpwrapped open
5873149.126.72.220 7090 tcp tcpwrapped open
5874149.126.72.220 7171 tcp tcpwrapped open
5875149.126.72.220 7172 tcp tcpwrapped open
5876149.126.72.220 7272 tcp tcpwrapped open
5877149.126.72.220 7348 tcp tcpwrapped open
5878149.126.72.220 7403 tcp tcpwrapped open
5879149.126.72.220 7433 tcp tcpwrapped open
5880149.126.72.220 7441 tcp tcpwrapped open
5881149.126.72.220 7443 tcp tcpwrapped open
5882149.126.72.220 7444 tcp tcpwrapped open
5883149.126.72.220 7445 tcp tcpwrapped open
5884149.126.72.220 7473 tcp tcpwrapped open
5885149.126.72.220 7500 tcp tcpwrapped open
5886149.126.72.220 7537 tcp tcpwrapped open
5887149.126.72.220 7687 tcp tcpwrapped open
5888149.126.72.220 7700 tcp tcpwrapped open
5889149.126.72.220 7771 tcp tcpwrapped open
5890149.126.72.220 7773 tcp tcpwrapped open
5891149.126.72.220 7774 tcp tcpwrapped open
5892149.126.72.220 7775 tcp tcpwrapped open
5893149.126.72.220 7776 tcp tcpwrapped open
5894149.126.72.220 7777 tcp tcpwrapped open
5895149.126.72.220 7778 tcp tcpwrapped open
5896149.126.72.220 7779 tcp tcpwrapped open
5897149.126.72.220 7788 tcp tcpwrapped open
5898149.126.72.220 7799 tcp tcpwrapped open
5899149.126.72.220 7998 tcp tcpwrapped open
5900149.126.72.220 7999 tcp tcpwrapped open
5901149.126.72.220 8000 tcp tcpwrapped open
5902149.126.72.220 8001 tcp tcpwrapped open
5903149.126.72.220 8002 tcp tcpwrapped open
5904149.126.72.220 8003 tcp tcpwrapped open
5905149.126.72.220 8004 tcp tcpwrapped open
5906149.126.72.220 8005 tcp tcpwrapped open
5907149.126.72.220 8006 tcp tcpwrapped open
5908149.126.72.220 8007 tcp tcpwrapped open
5909149.126.72.220 8008 tcp tcpwrapped open
5910149.126.72.220 8009 tcp tcpwrapped open
5911149.126.72.220 8010 tcp tcpwrapped open
5912149.126.72.220 8011 tcp tcpwrapped open
5913149.126.72.220 8012 tcp tcpwrapped open
5914149.126.72.220 8013 tcp tcpwrapped open
5915149.126.72.220 8014 tcp tcpwrapped open
5916149.126.72.220 8015 tcp tcpwrapped open
5917149.126.72.220 8016 tcp tcpwrapped open
5918149.126.72.220 8017 tcp tcpwrapped open
5919149.126.72.220 8018 tcp tcpwrapped open
5920149.126.72.220 8019 tcp tcpwrapped open
5921149.126.72.220 8020 tcp tcpwrapped open
5922149.126.72.220 8021 tcp tcpwrapped open
5923149.126.72.220 8022 tcp tcpwrapped open
5924149.126.72.220 8023 tcp tcpwrapped open
5925149.126.72.220 8024 tcp tcpwrapped open
5926149.126.72.220 8025 tcp tcpwrapped open
5927149.126.72.220 8026 tcp tcpwrapped open
5928149.126.72.220 8027 tcp tcpwrapped open
5929149.126.72.220 8028 tcp tcpwrapped open
5930149.126.72.220 8029 tcp tcpwrapped open
5931149.126.72.220 8030 tcp tcpwrapped open
5932149.126.72.220 8031 tcp tcpwrapped open
5933149.126.72.220 8032 tcp tcpwrapped open
5934149.126.72.220 8033 tcp tcpwrapped open
5935149.126.72.220 8034 tcp tcpwrapped open
5936149.126.72.220 8035 tcp tcpwrapped open
5937149.126.72.220 8036 tcp tcpwrapped open
5938149.126.72.220 8037 tcp tcpwrapped open
5939149.126.72.220 8038 tcp tcpwrapped open
5940149.126.72.220 8039 tcp tcpwrapped open
5941149.126.72.220 8040 tcp tcpwrapped open
5942149.126.72.220 8041 tcp tcpwrapped open
5943149.126.72.220 8042 tcp tcpwrapped open
5944149.126.72.220 8043 tcp tcpwrapped open
5945149.126.72.220 8044 tcp tcpwrapped open
5946149.126.72.220 8045 tcp tcpwrapped open
5947149.126.72.220 8046 tcp tcpwrapped open
5948149.126.72.220 8047 tcp tcpwrapped open
5949149.126.72.220 8048 tcp tcpwrapped open
5950149.126.72.220 8049 tcp tcpwrapped open
5951149.126.72.220 8050 tcp tcpwrapped open
5952149.126.72.220 8051 tcp tcpwrapped open
5953149.126.72.220 8052 tcp tcpwrapped open
5954149.126.72.220 8053 tcp tcpwrapped open
5955149.126.72.220 8054 tcp tcpwrapped open
5956149.126.72.220 8055 tcp tcpwrapped open
5957149.126.72.220 8056 tcp tcpwrapped open
5958149.126.72.220 8057 tcp tcpwrapped open
5959149.126.72.220 8058 tcp tcpwrapped open
5960149.126.72.220 8060 tcp tcpwrapped open
5961149.126.72.220 8064 tcp tcpwrapped open
5962149.126.72.220 8065 tcp tcpwrapped open
5963149.126.72.220 8069 tcp tcpwrapped open
5964149.126.72.220 8070 tcp tcpwrapped open
5965149.126.72.220 8071 tcp tcpwrapped open
5966149.126.72.220 8072 tcp tcpwrapped open
5967149.126.72.220 8074 tcp tcpwrapped open
5968149.126.72.220 8079 tcp tcpwrapped open
5969149.126.72.220 8080 tcp tcpwrapped open
5970149.126.72.220 8081 tcp tcpwrapped open
5971149.126.72.220 8082 tcp tcpwrapped open
5972149.126.72.220 8083 tcp tcpwrapped open
5973149.126.72.220 8084 tcp tcpwrapped open
5974149.126.72.220 8085 tcp tcpwrapped open
5975149.126.72.220 8086 tcp tcpwrapped open
5976149.126.72.220 8087 tcp tcpwrapped open
5977149.126.72.220 8088 tcp tcpwrapped open
5978149.126.72.220 8089 tcp tcpwrapped open
5979149.126.72.220 8090 tcp tcpwrapped open
5980149.126.72.220 8091 tcp tcpwrapped open
5981149.126.72.220 8092 tcp tcpwrapped open
5982149.126.72.220 8093 tcp tcpwrapped open
5983149.126.72.220 8094 tcp tcpwrapped open
5984149.126.72.220 8095 tcp tcpwrapped open
5985149.126.72.220 8096 tcp tcpwrapped open
5986149.126.72.220 8097 tcp tcpwrapped open
5987149.126.72.220 8098 tcp tcpwrapped open
5988149.126.72.220 8099 tcp tcpwrapped open
5989149.126.72.220 8100 tcp tcpwrapped open
5990149.126.72.220 8101 tcp tcpwrapped open
5991149.126.72.220 8102 tcp tcpwrapped open
5992149.126.72.220 8103 tcp tcpwrapped open
5993149.126.72.220 8104 tcp tcpwrapped open
5994149.126.72.220 8105 tcp tcpwrapped open
5995149.126.72.220 8106 tcp tcpwrapped open
5996149.126.72.220 8107 tcp tcpwrapped open
5997149.126.72.220 8108 tcp tcpwrapped open
5998149.126.72.220 8109 tcp tcpwrapped open
5999149.126.72.220 8110 tcp tcpwrapped open
6000149.126.72.220 8113 tcp tcpwrapped open
6001149.126.72.220 8114 tcp tcpwrapped open
6002149.126.72.220 8115 tcp tcpwrapped open
6003149.126.72.220 8118 tcp tcpwrapped open
6004149.126.72.220 8119 tcp tcpwrapped open
6005149.126.72.220 8120 tcp tcpwrapped open
6006149.126.72.220 8121 tcp tcpwrapped open
6007149.126.72.220 8123 tcp tcpwrapped open
6008149.126.72.220 8125 tcp tcpwrapped open
6009149.126.72.220 8126 tcp tcpwrapped open
6010149.126.72.220 8128 tcp tcpwrapped open
6011149.126.72.220 8129 tcp tcpwrapped open
6012149.126.72.220 8130 tcp tcpwrapped open
6013149.126.72.220 8131 tcp tcpwrapped open
6014149.126.72.220 8132 tcp tcpwrapped open
6015149.126.72.220 8133 tcp tcpwrapped open
6016149.126.72.220 8136 tcp tcpwrapped open
6017149.126.72.220 8140 tcp tcpwrapped open
6018149.126.72.220 8142 tcp tcpwrapped open
6019149.126.72.220 8143 tcp tcpwrapped open
6020149.126.72.220 8144 tcp tcpwrapped open
6021149.126.72.220 8147 tcp tcpwrapped open
6022149.126.72.220 8148 tcp tcpwrapped open
6023149.126.72.220 8149 tcp tcpwrapped open
6024149.126.72.220 8150 tcp tcpwrapped open
6025149.126.72.220 8154 tcp tcpwrapped open
6026149.126.72.220 8156 tcp tcpwrapped open
6027149.126.72.220 8157 tcp tcpwrapped open
6028149.126.72.220 8158 tcp tcpwrapped open
6029149.126.72.220 8160 tcp tcpwrapped open
6030149.126.72.220 8161 tcp tcpwrapped open
6031149.126.72.220 8162 tcp tcpwrapped open
6032149.126.72.220 8163 tcp tcpwrapped open
6033149.126.72.220 8164 tcp tcpwrapped open
6034149.126.72.220 8165 tcp tcpwrapped open
6035149.126.72.220 8166 tcp tcpwrapped open
6036149.126.72.220 8167 tcp tcpwrapped open
6037149.126.72.220 8168 tcp tcpwrapped open
6038149.126.72.220 8169 tcp tcpwrapped open
6039149.126.72.220 8170 tcp tcpwrapped open
6040149.126.72.220 8171 tcp tcpwrapped open
6041149.126.72.220 8172 tcp tcpwrapped open
6042149.126.72.220 8173 tcp tcpwrapped open
6043149.126.72.220 8175 tcp tcpwrapped open
6044149.126.72.220 8176 tcp tcpwrapped open
6045149.126.72.220 8178 tcp tcpwrapped open
6046149.126.72.220 8179 tcp tcpwrapped open
6047149.126.72.220 8180 tcp tcpwrapped open
6048149.126.72.220 8181 tcp tcpwrapped open
6049149.126.72.220 8182 tcp tcpwrapped open
6050149.126.72.220 8183 tcp tcpwrapped open
6051149.126.72.220 8184 tcp tcpwrapped open
6052149.126.72.220 8185 tcp tcpwrapped open
6053149.126.72.220 8186 tcp tcpwrapped open
6054149.126.72.220 8187 tcp tcpwrapped open
6055149.126.72.220 8188 tcp tcpwrapped open
6056149.126.72.220 8189 tcp tcpwrapped open
6057149.126.72.220 8190 tcp tcpwrapped open
6058149.126.72.220 8191 tcp tcpwrapped open
6059149.126.72.220 8192 tcp tcpwrapped open
6060149.126.72.220 8193 tcp tcpwrapped open
6061149.126.72.220 8194 tcp tcpwrapped open
6062149.126.72.220 8195 tcp tcpwrapped open
6063149.126.72.220 8198 tcp tcpwrapped open
6064149.126.72.220 8199 tcp tcpwrapped open
6065149.126.72.220 8200 tcp tcpwrapped open
6066149.126.72.220 8203 tcp tcpwrapped open
6067149.126.72.220 8222 tcp tcpwrapped open
6068149.126.72.220 8230 tcp tcpwrapped open
6069149.126.72.220 8236 tcp tcpwrapped open
6070149.126.72.220 8237 tcp tcpwrapped open
6071149.126.72.220 8238 tcp tcpwrapped open
6072149.126.72.220 8239 tcp tcpwrapped open
6073149.126.72.220 8241 tcp tcpwrapped open
6074149.126.72.220 8243 tcp tcpwrapped open
6075149.126.72.220 8248 tcp tcpwrapped open
6076149.126.72.220 8249 tcp tcpwrapped open
6077149.126.72.220 8250 tcp tcpwrapped open
6078149.126.72.220 8251 tcp tcpwrapped open
6079149.126.72.220 8252 tcp tcpwrapped open
6080149.126.72.220 8280 tcp tcpwrapped open
6081149.126.72.220 8282 tcp tcpwrapped open
6082149.126.72.220 8333 tcp tcpwrapped open
6083149.126.72.220 8340 tcp tcpwrapped open
6084149.126.72.220 8343 tcp tcpwrapped open
6085149.126.72.220 8350 tcp tcpwrapped open
6086149.126.72.220 8381 tcp tcpwrapped open
6087149.126.72.220 8382 tcp tcpwrapped open
6088149.126.72.220 8383 tcp tcpwrapped open
6089149.126.72.220 8384 tcp tcpwrapped open
6090149.126.72.220 8385 tcp tcpwrapped open
6091149.126.72.220 8388 tcp tcpwrapped open
6092149.126.72.220 8393 tcp tcpwrapped open
6093149.126.72.220 8401 tcp tcpwrapped open
6094149.126.72.220 8402 tcp tcpwrapped open
6095149.126.72.220 8403 tcp tcpwrapped open
6096149.126.72.220 8404 tcp tcpwrapped open
6097149.126.72.220 8405 tcp tcpwrapped open
6098149.126.72.220 8406 tcp tcpwrapped open
6099149.126.72.220 8407 tcp tcpwrapped open
6100149.126.72.220 8408 tcp tcpwrapped open
6101149.126.72.220 8409 tcp tcpwrapped open
6102149.126.72.220 8410 tcp tcpwrapped open
6103149.126.72.220 8411 tcp tcpwrapped open
6104149.126.72.220 8412 tcp tcpwrapped open
6105149.126.72.220 8413 tcp tcpwrapped open
6106149.126.72.220 8414 tcp tcpwrapped open
6107149.126.72.220 8415 tcp tcpwrapped open
6108149.126.72.220 8416 tcp tcpwrapped open
6109149.126.72.220 8417 tcp tcpwrapped open
6110149.126.72.220 8418 tcp tcpwrapped open
6111149.126.72.220 8419 tcp tcpwrapped open
6112149.126.72.220 8420 tcp tcpwrapped open
6113149.126.72.220 8421 tcp tcpwrapped open
6114149.126.72.220 8422 tcp tcpwrapped open
6115149.126.72.220 8423 tcp tcpwrapped open
6116149.126.72.220 8424 tcp tcpwrapped open
6117149.126.72.220 8425 tcp tcpwrapped open
6118149.126.72.220 8426 tcp tcpwrapped open
6119149.126.72.220 8427 tcp tcpwrapped open
6120149.126.72.220 8428 tcp tcpwrapped open
6121149.126.72.220 8429 tcp tcpwrapped open
6122149.126.72.220 8430 tcp tcpwrapped open
6123149.126.72.220 8431 tcp tcpwrapped open
6124149.126.72.220 8432 tcp tcpwrapped open
6125149.126.72.220 8433 tcp tcpwrapped open
6126149.126.72.220 8435 tcp tcpwrapped open
6127149.126.72.220 8440 tcp tcpwrapped open
6128149.126.72.220 8441 tcp tcpwrapped open
6129149.126.72.220 8442 tcp tcpwrapped open
6130149.126.72.220 8443 tcp tcpwrapped open
6131149.126.72.220 8444 tcp tcpwrapped open
6132149.126.72.220 8445 tcp tcpwrapped open
6133149.126.72.220 8446 tcp tcpwrapped open
6134149.126.72.220 8447 tcp tcpwrapped open
6135149.126.72.220 8448 tcp tcpwrapped open
6136149.126.72.220 8449 tcp tcpwrapped open
6137149.126.72.220 8450 tcp tcpwrapped open
6138149.126.72.220 8451 tcp tcpwrapped open
6139149.126.72.220 8452 tcp tcpwrapped open
6140149.126.72.220 8453 tcp tcpwrapped open
6141149.126.72.220 8454 tcp tcpwrapped open
6142149.126.72.220 8455 tcp tcpwrapped open
6143149.126.72.220 8456 tcp tcpwrapped open
6144149.126.72.220 8457 tcp tcpwrapped open
6145149.126.72.220 8458 tcp tcpwrapped open
6146149.126.72.220 8459 tcp tcpwrapped open
6147149.126.72.220 8460 tcp tcpwrapped open
6148149.126.72.220 8461 tcp tcpwrapped open
6149149.126.72.220 8462 tcp tcpwrapped open
6150149.126.72.220 8463 tcp tcpwrapped open
6151149.126.72.220 8464 tcp tcpwrapped open
6152149.126.72.220 8465 tcp tcpwrapped open
6153149.126.72.220 8466 tcp tcpwrapped open
6154149.126.72.220 8467 tcp tcpwrapped open
6155149.126.72.220 8470 tcp tcpwrapped open
6156149.126.72.220 8472 tcp tcpwrapped open
6157149.126.72.220 8473 tcp tcpwrapped open
6158149.126.72.220 8475 tcp tcpwrapped open
6159149.126.72.220 8480 tcp tcpwrapped open
6160149.126.72.220 8481 tcp tcpwrapped open
6161149.126.72.220 8482 tcp tcpwrapped open
6162149.126.72.220 8484 tcp tcpwrapped open
6163149.126.72.220 8485 tcp tcpwrapped open
6164149.126.72.220 8488 tcp tcpwrapped open
6165149.126.72.220 8493 tcp tcpwrapped open
6166149.126.72.220 8494 tcp tcpwrapped open
6167149.126.72.220 8500 tcp tcpwrapped open
6168149.126.72.220 8502 tcp tcpwrapped open
6169149.126.72.220 8503 tcp tcpwrapped open
6170149.126.72.220 8504 tcp tcpwrapped open
6171149.126.72.220 8505 tcp tcpwrapped open
6172149.126.72.220 8506 tcp tcpwrapped open
6173149.126.72.220 8510 tcp tcpwrapped open
6174149.126.72.220 8513 tcp tcpwrapped open
6175149.126.72.220 8514 tcp tcpwrapped open
6176149.126.72.220 8515 tcp tcpwrapped open
6177149.126.72.220 8519 tcp tcpwrapped open
6178149.126.72.220 8520 tcp tcpwrapped open
6179149.126.72.220 8521 tcp tcpwrapped open
6180149.126.72.220 8523 tcp tcpwrapped open
6181149.126.72.220 8524 tcp tcpwrapped open
6182149.126.72.220 8525 tcp tcpwrapped open
6183149.126.72.220 8526 tcp tcpwrapped open
6184149.126.72.220 8528 tcp tcpwrapped open
6185149.126.72.220 8529 tcp tcpwrapped open
6186149.126.72.220 8530 tcp tcpwrapped open
6187149.126.72.220 8531 tcp tcpwrapped open
6188149.126.72.220 8532 tcp tcpwrapped open
6189149.126.72.220 8533 tcp tcpwrapped open
6190149.126.72.220 8536 tcp tcpwrapped open
6191149.126.72.220 8540 tcp tcpwrapped open
6192149.126.72.220 8543 tcp tcpwrapped open
6193149.126.72.220 8544 tcp tcpwrapped open
6194149.126.72.220 8548 tcp tcpwrapped open
6195149.126.72.220 8549 tcp tcpwrapped open
6196149.126.72.220 8550 tcp tcpwrapped open
6197149.126.72.220 8551 tcp tcpwrapped open
6198149.126.72.220 8553 tcp tcpwrapped open
6199149.126.72.220 8556 tcp tcpwrapped open
6200149.126.72.220 8557 tcp tcpwrapped open
6201149.126.72.220 8558 tcp tcpwrapped open
6202149.126.72.220 8560 tcp tcpwrapped open
6203149.126.72.220 8561 tcp tcpwrapped open
6204149.126.72.220 8562 tcp tcpwrapped open
6205149.126.72.220 8563 tcp tcpwrapped open
6206149.126.72.220 8564 tcp tcpwrapped open
6207149.126.72.220 8565 tcp tcpwrapped open
6208149.126.72.220 8566 tcp tcpwrapped open
6209149.126.72.220 8567 tcp tcpwrapped open
6210149.126.72.220 8568 tcp tcpwrapped open
6211149.126.72.220 8569 tcp tcpwrapped open
6212149.126.72.220 8570 tcp tcpwrapped open
6213149.126.72.220 8571 tcp tcpwrapped open
6214149.126.72.220 8573 tcp tcpwrapped open
6215149.126.72.220 8574 tcp tcpwrapped open
6216149.126.72.220 8575 tcp tcpwrapped open
6217149.126.72.220 8576 tcp tcpwrapped open
6218149.126.72.220 8577 tcp tcpwrapped open
6219149.126.72.220 8578 tcp tcpwrapped open
6220149.126.72.220 8579 tcp tcpwrapped open
6221149.126.72.220 8580 tcp tcpwrapped open
6222149.126.72.220 8581 tcp tcpwrapped open
6223149.126.72.220 8582 tcp tcpwrapped open
6224149.126.72.220 8583 tcp tcpwrapped open
6225149.126.72.220 8585 tcp tcpwrapped open
6226149.126.72.220 8586 tcp tcpwrapped open
6227149.126.72.220 8588 tcp tcpwrapped open
6228149.126.72.220 8589 tcp tcpwrapped open
6229149.126.72.220 8590 tcp tcpwrapped open
6230149.126.72.220 8591 tcp tcpwrapped open
6231149.126.72.220 8592 tcp tcpwrapped open
6232149.126.72.220 8593 tcp tcpwrapped open
6233149.126.72.220 8594 tcp tcpwrapped open
6234149.126.72.220 8595 tcp tcpwrapped open
6235149.126.72.220 8596 tcp tcpwrapped open
6236149.126.72.220 8597 tcp tcpwrapped open
6237149.126.72.220 8598 tcp tcpwrapped open
6238149.126.72.220 8599 tcp tcpwrapped open
6239149.126.72.220 8600 tcp tcpwrapped open
6240149.126.72.220 8601 tcp tcpwrapped open
6241149.126.72.220 8605 tcp tcpwrapped open
6242149.126.72.220 8606 tcp tcpwrapped open
6243149.126.72.220 8630 tcp tcpwrapped open
6244149.126.72.220 8640 tcp tcpwrapped open
6245149.126.72.220 8641 tcp tcpwrapped open
6246149.126.72.220 8643 tcp tcpwrapped open
6247149.126.72.220 8663 tcp tcpwrapped open
6248149.126.72.220 8666 tcp tcpwrapped open
6249149.126.72.220 8686 tcp tcpwrapped open
6250149.126.72.220 8688 tcp tcpwrapped open
6251149.126.72.220 8700 tcp tcpwrapped open
6252149.126.72.220 8701 tcp tcpwrapped open
6253149.126.72.220 8702 tcp tcpwrapped open
6254149.126.72.220 8703 tcp tcpwrapped open
6255149.126.72.220 8704 tcp tcpwrapped open
6256149.126.72.220 8705 tcp tcpwrapped open
6257149.126.72.220 8706 tcp tcpwrapped open
6258149.126.72.220 8707 tcp tcpwrapped open
6259149.126.72.220 8708 tcp tcpwrapped open
6260149.126.72.220 8709 tcp tcpwrapped open
6261149.126.72.220 8723 tcp tcpwrapped open
6262149.126.72.220 8724 tcp tcpwrapped open
6263149.126.72.220 8731 tcp tcpwrapped open
6264149.126.72.220 8732 tcp tcpwrapped open
6265149.126.72.220 8764 tcp tcpwrapped open
6266149.126.72.220 8765 tcp tcpwrapped open
6267149.126.72.220 8766 tcp tcpwrapped open
6268149.126.72.220 8767 tcp tcpwrapped open
6269149.126.72.220 8771 tcp tcpwrapped open
6270149.126.72.220 8787 tcp tcpwrapped open
6271149.126.72.220 8788 tcp tcpwrapped open
6272149.126.72.220 8789 tcp tcpwrapped open
6273149.126.72.220 8790 tcp tcpwrapped open
6274149.126.72.220 8791 tcp tcpwrapped open
6275149.126.72.220 8800 tcp tcpwrapped open
6276149.126.72.220 8801 tcp tcpwrapped open
6277149.126.72.220 8802 tcp tcpwrapped open
6278149.126.72.220 8803 tcp tcpwrapped open
6279149.126.72.220 8804 tcp tcpwrapped open
6280149.126.72.220 8805 tcp tcpwrapped open
6281149.126.72.220 8806 tcp tcpwrapped open
6282149.126.72.220 8807 tcp tcpwrapped open
6283149.126.72.220 8808 tcp tcpwrapped open
6284149.126.72.220 8809 tcp tcpwrapped open
6285149.126.72.220 8810 tcp tcpwrapped open
6286149.126.72.220 8811 tcp tcpwrapped open
6287149.126.72.220 8812 tcp tcpwrapped open
6288149.126.72.220 8813 tcp tcpwrapped open
6289149.126.72.220 8814 tcp tcpwrapped open
6290149.126.72.220 8815 tcp tcpwrapped open
6291149.126.72.220 8816 tcp tcpwrapped open
6292149.126.72.220 8817 tcp tcpwrapped open
6293149.126.72.220 8818 tcp tcpwrapped open
6294149.126.72.220 8819 tcp tcpwrapped open
6295149.126.72.220 8820 tcp tcpwrapped open
6296149.126.72.220 8821 tcp tcpwrapped open
6297149.126.72.220 8822 tcp tcpwrapped open
6298149.126.72.220 8823 tcp tcpwrapped open
6299149.126.72.220 8824 tcp tcpwrapped open
6300149.126.72.220 8825 tcp tcpwrapped open
6301149.126.72.220 8826 tcp tcpwrapped open
6302149.126.72.220 8827 tcp tcpwrapped open
6303149.126.72.220 8828 tcp tcpwrapped open
6304149.126.72.220 8829 tcp tcpwrapped open
6305149.126.72.220 8830 tcp tcpwrapped open
6306149.126.72.220 8831 tcp tcpwrapped open
6307149.126.72.220 8832 tcp tcpwrapped open
6308149.126.72.220 8833 tcp tcpwrapped open
6309149.126.72.220 8834 tcp tcpwrapped open
6310149.126.72.220 8835 tcp tcpwrapped open
6311149.126.72.220 8836 tcp tcpwrapped open
6312149.126.72.220 8837 tcp tcpwrapped open
6313149.126.72.220 8838 tcp tcpwrapped open
6314149.126.72.220 8839 tcp tcpwrapped open
6315149.126.72.220 8840 tcp tcpwrapped open
6316149.126.72.220 8841 tcp tcpwrapped open
6317149.126.72.220 8842 tcp tcpwrapped open
6318149.126.72.220 8843 tcp tcpwrapped open
6319149.126.72.220 8844 tcp tcpwrapped open
6320149.126.72.220 8845 tcp tcpwrapped open
6321149.126.72.220 8846 tcp tcpwrapped open
6322149.126.72.220 8847 tcp tcpwrapped open
6323149.126.72.220 8848 tcp tcpwrapped open
6324149.126.72.220 8849 tcp tcpwrapped open
6325149.126.72.220 8850 tcp tcpwrapped open
6326149.126.72.220 8851 tcp tcpwrapped open
6327149.126.72.220 8852 tcp tcpwrapped open
6328149.126.72.220 8853 tcp tcpwrapped open
6329149.126.72.220 8854 tcp tcpwrapped open
6330149.126.72.220 8855 tcp tcpwrapped open
6331149.126.72.220 8856 tcp tcpwrapped open
6332149.126.72.220 8857 tcp tcpwrapped open
6333149.126.72.220 8858 tcp tcpwrapped open
6334149.126.72.220 8859 tcp tcpwrapped open
6335149.126.72.220 8860 tcp tcpwrapped open
6336149.126.72.220 8861 tcp tcpwrapped open
6337149.126.72.220 8862 tcp tcpwrapped open
6338149.126.72.220 8863 tcp tcpwrapped open
6339149.126.72.220 8864 tcp tcpwrapped open
6340149.126.72.220 8865 tcp tcpwrapped open
6341149.126.72.220 8866 tcp tcpwrapped open
6342149.126.72.220 8867 tcp tcpwrapped open
6343149.126.72.220 8868 tcp tcpwrapped open
6344149.126.72.220 8869 tcp tcpwrapped open
6345149.126.72.220 8870 tcp tcpwrapped open
6346149.126.72.220 8871 tcp tcpwrapped open
6347149.126.72.220 8872 tcp tcpwrapped open
6348149.126.72.220 8873 tcp tcpwrapped open
6349149.126.72.220 8874 tcp tcpwrapped open
6350149.126.72.220 8875 tcp tcpwrapped open
6351149.126.72.220 8876 tcp tcpwrapped open
6352149.126.72.220 8877 tcp tcpwrapped open
6353149.126.72.220 8878 tcp tcpwrapped open
6354149.126.72.220 8879 tcp tcpwrapped open
6355149.126.72.220 8880 tcp tcpwrapped open
6356149.126.72.220 8881 tcp tcpwrapped open
6357149.126.72.220 8882 tcp tcpwrapped open
6358149.126.72.220 8883 tcp tcpwrapped open
6359149.126.72.220 8884 tcp tcpwrapped open
6360149.126.72.220 8885 tcp tcpwrapped open
6361149.126.72.220 8887 tcp tcpwrapped open
6362149.126.72.220 8888 tcp tcpwrapped open
6363149.126.72.220 8889 tcp tcpwrapped open
6364149.126.72.220 8890 tcp tcpwrapped open
6365149.126.72.220 8891 tcp tcpwrapped open
6366149.126.72.220 8899 tcp tcpwrapped open
6367149.126.72.220 8900 tcp tcpwrapped open
6368149.126.72.220 8901 tcp tcpwrapped open
6369149.126.72.220 8902 tcp tcpwrapped open
6370149.126.72.220 8905 tcp tcpwrapped open
6371149.126.72.220 8906 tcp tcpwrapped open
6372149.126.72.220 8907 tcp tcpwrapped open
6373149.126.72.220 8908 tcp tcpwrapped open
6374149.126.72.220 8910 tcp tcpwrapped open
6375149.126.72.220 8911 tcp tcpwrapped open
6376149.126.72.220 8912 tcp tcpwrapped open
6377149.126.72.220 8913 tcp tcpwrapped open
6378149.126.72.220 8915 tcp tcpwrapped open
6379149.126.72.220 8916 tcp tcpwrapped open
6380149.126.72.220 8935 tcp tcpwrapped open
6381149.126.72.220 8943 tcp tcpwrapped open
6382149.126.72.220 8969 tcp tcpwrapped open
6383149.126.72.220 8988 tcp tcpwrapped open
6384149.126.72.220 8989 tcp tcpwrapped open
6385149.126.72.220 8999 tcp tcpwrapped open
6386149.126.72.220 9000 tcp tcpwrapped open
6387149.126.72.220 9001 tcp tcpwrapped open
6388149.126.72.220 9002 tcp tcpwrapped open
6389149.126.72.220 9003 tcp tcpwrapped open
6390149.126.72.220 9004 tcp tcpwrapped open
6391149.126.72.220 9005 tcp tcpwrapped open
6392149.126.72.220 9006 tcp tcpwrapped open
6393149.126.72.220 9007 tcp tcpwrapped open
6394149.126.72.220 9008 tcp tcpwrapped open
6395149.126.72.220 9009 tcp tcpwrapped open
6396149.126.72.220 9010 tcp tcpwrapped open
6397149.126.72.220 9011 tcp tcpwrapped open
6398149.126.72.220 9012 tcp tcpwrapped open
6399149.126.72.220 9013 tcp tcpwrapped open
6400149.126.72.220 9014 tcp tcpwrapped open
6401149.126.72.220 9015 tcp tcpwrapped open
6402149.126.72.220 9016 tcp tcpwrapped open
6403149.126.72.220 9017 tcp tcpwrapped open
6404149.126.72.220 9018 tcp tcpwrapped open
6405149.126.72.220 9019 tcp tcpwrapped open
6406149.126.72.220 9020 tcp tcpwrapped open
6407149.126.72.220 9021 tcp tcpwrapped open
6408149.126.72.220 9022 tcp tcpwrapped open
6409149.126.72.220 9023 tcp tcpwrapped open
6410149.126.72.220 9024 tcp tcpwrapped open
6411149.126.72.220 9025 tcp tcpwrapped open
6412149.126.72.220 9026 tcp tcpwrapped open
6413149.126.72.220 9027 tcp tcpwrapped open
6414149.126.72.220 9028 tcp tcpwrapped open
6415149.126.72.220 9029 tcp tcpwrapped open
6416149.126.72.220 9030 tcp tcpwrapped open
6417149.126.72.220 9031 tcp tcpwrapped open
6418149.126.72.220 9032 tcp tcpwrapped open
6419149.126.72.220 9033 tcp tcpwrapped open
6420149.126.72.220 9034 tcp tcpwrapped open
6421149.126.72.220 9035 tcp tcpwrapped open
6422149.126.72.220 9036 tcp tcpwrapped open
6423149.126.72.220 9037 tcp tcpwrapped open
6424149.126.72.220 9038 tcp tcpwrapped open
6425149.126.72.220 9039 tcp tcpwrapped open
6426149.126.72.220 9040 tcp tcpwrapped open
6427149.126.72.220 9041 tcp tcpwrapped open
6428149.126.72.220 9042 tcp tcpwrapped open
6429149.126.72.220 9043 tcp tcpwrapped open
6430149.126.72.220 9044 tcp tcpwrapped open
6431149.126.72.220 9045 tcp tcpwrapped open
6432149.126.72.220 9046 tcp tcpwrapped open
6433149.126.72.220 9047 tcp tcpwrapped open
6434149.126.72.220 9048 tcp tcpwrapped open
6435149.126.72.220 9049 tcp tcpwrapped open
6436149.126.72.220 9050 tcp tcpwrapped open
6437149.126.72.220 9051 tcp tcpwrapped open
6438149.126.72.220 9052 tcp tcpwrapped open
6439149.126.72.220 9058 tcp tcpwrapped open
6440149.126.72.220 9060 tcp tcpwrapped open
6441149.126.72.220 9061 tcp tcpwrapped open
6442149.126.72.220 9070 tcp tcpwrapped open
6443149.126.72.220 9080 tcp tcpwrapped open
6444149.126.72.220 9081 tcp tcpwrapped open
6445149.126.72.220 9082 tcp tcpwrapped open
6446149.126.72.220 9084 tcp tcpwrapped open
6447149.126.72.220 9085 tcp tcpwrapped open
6448149.126.72.220 9086 tcp tcpwrapped open
6449149.126.72.220 9088 tcp tcpwrapped open
6450149.126.72.220 9089 tcp tcpwrapped open
6451149.126.72.220 9090 tcp tcpwrapped open
6452149.126.72.220 9091 tcp tcpwrapped open
6453149.126.72.220 9092 tcp tcpwrapped open
6454149.126.72.220 9093 tcp tcpwrapped open
6455149.126.72.220 9094 tcp tcpwrapped open
6456149.126.72.220 9095 tcp tcpwrapped open
6457149.126.72.220 9096 tcp tcpwrapped open
6458149.126.72.220 9097 tcp tcpwrapped open
6459149.126.72.220 9098 tcp tcpwrapped open
6460149.126.72.220 9099 tcp tcpwrapped open
6461149.126.72.220 9100 tcp jetdirect open
6462149.126.72.220 9101 tcp jetdirect open
6463149.126.72.220 9102 tcp jetdirect open
6464149.126.72.220 9103 tcp jetdirect open
6465149.126.72.220 9104 tcp jetdirect open
6466149.126.72.220 9105 tcp jetdirect open
6467149.126.72.220 9106 tcp jetdirect open
6468149.126.72.220 9107 tcp jetdirect open
6469149.126.72.220 9108 tcp tcpwrapped open
6470149.126.72.220 9109 tcp tcpwrapped open
6471149.126.72.220 9110 tcp tcpwrapped open
6472149.126.72.220 9111 tcp tcpwrapped open
6473149.126.72.220 9136 tcp tcpwrapped open
6474149.126.72.220 9143 tcp tcpwrapped open
6475149.126.72.220 9189 tcp tcpwrapped open
6476149.126.72.220 9199 tcp tcpwrapped open
6477149.126.72.220 9200 tcp tcpwrapped open
6478149.126.72.220 9201 tcp tcpwrapped open
6479149.126.72.220 9202 tcp tcpwrapped open
6480149.126.72.220 9203 tcp tcpwrapped open
6481149.126.72.220 9204 tcp tcpwrapped open
6482149.126.72.220 9205 tcp tcpwrapped open
6483149.126.72.220 9206 tcp tcpwrapped open
6484149.126.72.220 9207 tcp tcpwrapped open
6485149.126.72.220 9208 tcp tcpwrapped open
6486149.126.72.220 9209 tcp tcpwrapped open
6487149.126.72.220 9210 tcp tcpwrapped open
6488149.126.72.220 9211 tcp tcpwrapped open
6489149.126.72.220 9212 tcp tcpwrapped open
6490149.126.72.220 9213 tcp tcpwrapped open
6491149.126.72.220 9214 tcp tcpwrapped open
6492149.126.72.220 9215 tcp tcpwrapped open
6493149.126.72.220 9216 tcp tcpwrapped open
6494149.126.72.220 9217 tcp tcpwrapped open
6495149.126.72.220 9218 tcp tcpwrapped open
6496149.126.72.220 9219 tcp tcpwrapped open
6497149.126.72.220 9220 tcp tcpwrapped open
6498149.126.72.220 9221 tcp tcpwrapped open
6499149.126.72.220 9236 tcp tcpwrapped open
6500149.126.72.220 9251 tcp tcpwrapped open
6501149.126.72.220 9289 tcp tcpwrapped open
6502149.126.72.220 9299 tcp tcpwrapped open
6503149.126.72.220 9300 tcp tcpwrapped open
6504149.126.72.220 9301 tcp tcpwrapped open
6505149.126.72.220 9302 tcp tcpwrapped open
6506149.126.72.220 9303 tcp tcpwrapped open
6507149.126.72.220 9304 tcp tcpwrapped open
6508149.126.72.220 9305 tcp tcpwrapped open
6509149.126.72.220 9306 tcp tcpwrapped open
6510149.126.72.220 9307 tcp tcpwrapped open
6511149.126.72.220 9308 tcp tcpwrapped open
6512149.126.72.220 9309 tcp tcpwrapped open
6513149.126.72.220 9310 tcp tcpwrapped open
6514149.126.72.220 9311 tcp tcpwrapped open
6515149.126.72.220 9350 tcp tcpwrapped open
6516149.126.72.220 9383 tcp tcpwrapped open
6517149.126.72.220 9387 tcp tcpwrapped open
6518149.126.72.220 9389 tcp tcpwrapped open
6519149.126.72.220 9433 tcp tcpwrapped open
6520149.126.72.220 9443 tcp tcpwrapped open
6521149.126.72.220 9444 tcp tcpwrapped open
6522149.126.72.220 9446 tcp tcpwrapped open
6523149.126.72.220 9447 tcp tcpwrapped open
6524149.126.72.220 9500 tcp tcpwrapped open
6525149.126.72.220 9510 tcp tcpwrapped open
6526149.126.72.220 9530 tcp tcpwrapped open
6527149.126.72.220 9550 tcp tcpwrapped open
6528149.126.72.220 9600 tcp tcpwrapped open
6529149.126.72.220 9663 tcp tcpwrapped open
6530149.126.72.220 9690 tcp tcpwrapped open
6531149.126.72.220 9704 tcp tcpwrapped open
6532149.126.72.220 9710 tcp tcpwrapped open
6533149.126.72.220 9711 tcp tcpwrapped open
6534149.126.72.220 9765 tcp tcpwrapped open
6535149.126.72.220 9773 tcp tcpwrapped open
6536149.126.72.220 9779 tcp tcpwrapped open
6537149.126.72.220 9800 tcp tcpwrapped open
6538149.126.72.220 9803 tcp tcpwrapped open
6539149.126.72.220 9804 tcp tcpwrapped open
6540149.126.72.220 9950 tcp tcpwrapped open
6541149.126.72.220 9991 tcp tcpwrapped open
6542149.126.72.220 9992 tcp tcpwrapped open
6543149.126.72.220 9993 tcp tcpwrapped open
6544149.126.72.220 9994 tcp tcpwrapped open
6545149.126.72.220 9997 tcp tcpwrapped open
6546149.126.72.220 9998 tcp tcpwrapped open
6547149.126.72.220 9999 tcp tcpwrapped open
6548149.126.72.220 10000 tcp tcpwrapped open
6549149.126.72.220 10001 tcp tcpwrapped open
6550149.126.72.220 10002 tcp tcpwrapped open
6551149.126.72.220 10003 tcp tcpwrapped open
6552149.126.72.220 10004 tcp tcpwrapped open
6553149.126.72.220 10005 tcp tcpwrapped open
6554149.126.72.220 10006 tcp tcpwrapped open
6555149.126.72.220 10007 tcp tcpwrapped open
6556149.126.72.220 10008 tcp tcpwrapped open
6557149.126.72.220 10009 tcp tcpwrapped open
6558149.126.72.220 10010 tcp tcpwrapped open
6559149.126.72.220 10011 tcp tcpwrapped open
6560149.126.72.220 10012 tcp tcpwrapped open
6561149.126.72.220 10013 tcp tcpwrapped open
6562149.126.72.220 10014 tcp tcpwrapped open
6563149.126.72.220 10015 tcp tcpwrapped open
6564149.126.72.220 10016 tcp tcpwrapped open
6565149.126.72.220 10017 tcp tcpwrapped open
6566149.126.72.220 10018 tcp tcpwrapped open
6567149.126.72.220 10019 tcp tcpwrapped open
6568149.126.72.220 10020 tcp tcpwrapped open
6569149.126.72.220 10021 tcp tcpwrapped open
6570149.126.72.220 10022 tcp tcpwrapped open
6571149.126.72.220 10023 tcp tcpwrapped open
6572149.126.72.220 10024 tcp tcpwrapped open
6573149.126.72.220 10025 tcp tcpwrapped open
6574149.126.72.220 10026 tcp tcpwrapped open
6575149.126.72.220 10027 tcp tcpwrapped open
6576149.126.72.220 10028 tcp tcpwrapped open
6577149.126.72.220 10029 tcp tcpwrapped open
6578149.126.72.220 10030 tcp tcpwrapped open
6579149.126.72.220 10031 tcp tcpwrapped open
6580149.126.72.220 10032 tcp tcpwrapped open
6581149.126.72.220 10033 tcp tcpwrapped open
6582149.126.72.220 10034 tcp tcpwrapped open
6583149.126.72.220 10035 tcp tcpwrapped open
6584149.126.72.220 10036 tcp tcpwrapped open
6585149.126.72.220 10037 tcp tcpwrapped open
6586149.126.72.220 10038 tcp tcpwrapped open
6587149.126.72.220 10039 tcp tcpwrapped open
6588149.126.72.220 10040 tcp tcpwrapped open
6589149.126.72.220 10041 tcp tcpwrapped open
6590149.126.72.220 10042 tcp tcpwrapped open
6591149.126.72.220 10043 tcp tcpwrapped open
6592149.126.72.220 10044 tcp tcpwrapped open
6593149.126.72.220 10045 tcp tcpwrapped open
6594149.126.72.220 10046 tcp tcpwrapped open
6595149.126.72.220 10047 tcp tcpwrapped open
6596149.126.72.220 10048 tcp tcpwrapped open
6597149.126.72.220 10049 tcp tcpwrapped open
6598149.126.72.220 10065 tcp tcpwrapped open
6599149.126.72.220 10071 tcp tcpwrapped open
6600149.126.72.220 10075 tcp tcpwrapped open
6601149.126.72.220 10082 tcp tcpwrapped open
6602149.126.72.220 10084 tcp tcpwrapped open
6603149.126.72.220 10100 tcp tcpwrapped open
6604149.126.72.220 10123 tcp tcpwrapped open
6605149.126.72.220 10200 tcp tcpwrapped open
6606149.126.72.220 10443 tcp tcpwrapped open
6607149.126.72.220 10444 tcp tcpwrapped open
6608149.126.72.220 10892 tcp tcpwrapped open
6609149.126.72.220 10894 tcp tcpwrapped open
6610149.126.72.220 11001 tcp tcpwrapped open
6611149.126.72.220 11002 tcp tcpwrapped open
6612149.126.72.220 11007 tcp tcpwrapped open
6613149.126.72.220 11027 tcp tcpwrapped open
6614149.126.72.220 11065 tcp tcpwrapped open
6615149.126.72.220 11075 tcp tcpwrapped open
6616149.126.72.220 11082 tcp tcpwrapped open
6617149.126.72.220 11084 tcp tcpwrapped open
6618149.126.72.220 11110 tcp tcpwrapped open
6619149.126.72.220 11182 tcp tcpwrapped open
6620149.126.72.220 11184 tcp tcpwrapped open
6621149.126.72.220 11443 tcp tcpwrapped open
6622149.126.72.220 12016 tcp tcpwrapped open
6623149.126.72.220 12082 tcp tcpwrapped open
6624149.126.72.220 12084 tcp tcpwrapped open
6625149.126.72.220 12103 tcp tcpwrapped open
6626149.126.72.220 12104 tcp tcpwrapped open
6627149.126.72.220 12105 tcp tcpwrapped open
6628149.126.72.220 12106 tcp tcpwrapped open
6629149.126.72.220 12107 tcp tcpwrapped open
6630149.126.72.220 12108 tcp tcpwrapped open
6631149.126.72.220 12109 tcp tcpwrapped open
6632149.126.72.220 12110 tcp tcpwrapped open
6633149.126.72.220 12111 tcp tcpwrapped open
6634149.126.72.220 12112 tcp tcpwrapped open
6635149.126.72.220 12113 tcp tcpwrapped open
6636149.126.72.220 12114 tcp tcpwrapped open
6637149.126.72.220 12115 tcp tcpwrapped open
6638149.126.72.220 12116 tcp tcpwrapped open
6639149.126.72.220 12117 tcp tcpwrapped open
6640149.126.72.220 12118 tcp tcpwrapped open
6641149.126.72.220 12119 tcp tcpwrapped open
6642149.126.72.220 12120 tcp tcpwrapped open
6643149.126.72.220 12121 tcp tcpwrapped open
6644149.126.72.220 12122 tcp tcpwrapped open
6645149.126.72.220 12123 tcp tcpwrapped open
6646149.126.72.220 12124 tcp tcpwrapped open
6647149.126.72.220 12125 tcp tcpwrapped open
6648149.126.72.220 12126 tcp tcpwrapped open
6649149.126.72.220 12127 tcp tcpwrapped open
6650149.126.72.220 12128 tcp tcpwrapped open
6651149.126.72.220 12129 tcp tcpwrapped open
6652149.126.72.220 12130 tcp tcpwrapped open
6653149.126.72.220 12131 tcp tcpwrapped open
6654149.126.72.220 12132 tcp tcpwrapped open
6655149.126.72.220 12133 tcp tcpwrapped open
6656149.126.72.220 12134 tcp tcpwrapped open
6657149.126.72.220 12135 tcp tcpwrapped open
6658149.126.72.220 12136 tcp tcpwrapped open
6659149.126.72.220 12137 tcp tcpwrapped open
6660149.126.72.220 12138 tcp tcpwrapped open
6661149.126.72.220 12139 tcp tcpwrapped open
6662149.126.72.220 12140 tcp tcpwrapped open
6663149.126.72.220 12141 tcp tcpwrapped open
6664149.126.72.220 12142 tcp tcpwrapped open
6665149.126.72.220 12143 tcp tcpwrapped open
6666149.126.72.220 12144 tcp tcpwrapped open
6667149.126.72.220 12145 tcp tcpwrapped open
6668149.126.72.220 12146 tcp tcpwrapped open
6669149.126.72.220 12147 tcp tcpwrapped open
6670149.126.72.220 12148 tcp tcpwrapped open
6671149.126.72.220 12149 tcp tcpwrapped open
6672149.126.72.220 12150 tcp tcpwrapped open
6673149.126.72.220 12151 tcp tcpwrapped open
6674149.126.72.220 12152 tcp tcpwrapped open
6675149.126.72.220 12153 tcp tcpwrapped open
6676149.126.72.220 12154 tcp tcpwrapped open
6677149.126.72.220 12155 tcp tcpwrapped open
6678149.126.72.220 12156 tcp tcpwrapped open
6679149.126.72.220 12157 tcp tcpwrapped open
6680149.126.72.220 12158 tcp tcpwrapped open
6681149.126.72.220 12159 tcp tcpwrapped open
6682149.126.72.220 12160 tcp tcpwrapped open
6683149.126.72.220 12161 tcp tcpwrapped open
6684149.126.72.220 12162 tcp tcpwrapped open
6685149.126.72.220 12163 tcp tcpwrapped open
6686149.126.72.220 12164 tcp tcpwrapped open
6687149.126.72.220 12165 tcp tcpwrapped open
6688149.126.72.220 12166 tcp tcpwrapped open
6689149.126.72.220 12167 tcp tcpwrapped open
6690149.126.72.220 12168 tcp tcpwrapped open
6691149.126.72.220 12169 tcp tcpwrapped open
6692149.126.72.220 12170 tcp tcpwrapped open
6693149.126.72.220 12171 tcp tcpwrapped open
6694149.126.72.220 12172 tcp tcpwrapped open
6695149.126.72.220 12173 tcp tcpwrapped open
6696149.126.72.220 12174 tcp tcpwrapped open
6697149.126.72.220 12175 tcp tcpwrapped open
6698149.126.72.220 12176 tcp tcpwrapped open
6699149.126.72.220 12177 tcp tcpwrapped open
6700149.126.72.220 12178 tcp tcpwrapped open
6701149.126.72.220 12179 tcp tcpwrapped open
6702149.126.72.220 12180 tcp tcpwrapped open
6703149.126.72.220 12181 tcp tcpwrapped open
6704149.126.72.220 12182 tcp tcpwrapped open
6705149.126.72.220 12183 tcp tcpwrapped open
6706149.126.72.220 12184 tcp tcpwrapped open
6707149.126.72.220 12185 tcp tcpwrapped open
6708149.126.72.220 12186 tcp tcpwrapped open
6709149.126.72.220 12187 tcp tcpwrapped open
6710149.126.72.220 12188 tcp tcpwrapped open
6711149.126.72.220 12189 tcp tcpwrapped open
6712149.126.72.220 12190 tcp tcpwrapped open
6713149.126.72.220 12191 tcp tcpwrapped open
6714149.126.72.220 12192 tcp tcpwrapped open
6715149.126.72.220 12193 tcp tcpwrapped open
6716149.126.72.220 12194 tcp tcpwrapped open
6717149.126.72.220 12195 tcp tcpwrapped open
6718149.126.72.220 12196 tcp tcpwrapped open
6719149.126.72.220 12197 tcp tcpwrapped open
6720149.126.72.220 12198 tcp tcpwrapped open
6721149.126.72.220 12199 tcp tcpwrapped open
6722149.126.72.220 12200 tcp tcpwrapped open
6723149.126.72.220 12201 tcp tcpwrapped open
6724149.126.72.220 12202 tcp tcpwrapped open
6725149.126.72.220 12203 tcp tcpwrapped open
6726149.126.72.220 12204 tcp tcpwrapped open
6727149.126.72.220 12205 tcp tcpwrapped open
6728149.126.72.220 12206 tcp tcpwrapped open
6729149.126.72.220 12207 tcp tcpwrapped open
6730149.126.72.220 12208 tcp tcpwrapped open
6731149.126.72.220 12209 tcp tcpwrapped open
6732149.126.72.220 12210 tcp tcpwrapped open
6733149.126.72.220 12211 tcp tcpwrapped open
6734149.126.72.220 12212 tcp tcpwrapped open
6735149.126.72.220 12213 tcp tcpwrapped open
6736149.126.72.220 12214 tcp tcpwrapped open
6737149.126.72.220 12215 tcp tcpwrapped open
6738149.126.72.220 12216 tcp tcpwrapped open
6739149.126.72.220 12217 tcp tcpwrapped open
6740149.126.72.220 12218 tcp tcpwrapped open
6741149.126.72.220 12219 tcp tcpwrapped open
6742149.126.72.220 12220 tcp tcpwrapped open
6743149.126.72.220 12221 tcp tcpwrapped open
6744149.126.72.220 12222 tcp tcpwrapped open
6745149.126.72.220 12223 tcp tcpwrapped open
6746149.126.72.220 12224 tcp tcpwrapped open
6747149.126.72.220 12225 tcp tcpwrapped open
6748149.126.72.220 12226 tcp tcpwrapped open
6749149.126.72.220 12227 tcp tcpwrapped open
6750149.126.72.220 12228 tcp tcpwrapped open
6751149.126.72.220 12229 tcp tcpwrapped open
6752149.126.72.220 12230 tcp tcpwrapped open
6753149.126.72.220 12231 tcp tcpwrapped open
6754149.126.72.220 12232 tcp tcpwrapped open
6755149.126.72.220 12233 tcp tcpwrapped open
6756149.126.72.220 12234 tcp tcpwrapped open
6757149.126.72.220 12235 tcp tcpwrapped open
6758149.126.72.220 12236 tcp tcpwrapped open
6759149.126.72.220 12237 tcp tcpwrapped open
6760149.126.72.220 12238 tcp tcpwrapped open
6761149.126.72.220 12239 tcp tcpwrapped open
6762149.126.72.220 12240 tcp tcpwrapped open
6763149.126.72.220 12241 tcp tcpwrapped open
6764149.126.72.220 12242 tcp tcpwrapped open
6765149.126.72.220 12243 tcp tcpwrapped open
6766149.126.72.220 12244 tcp tcpwrapped open
6767149.126.72.220 12245 tcp tcpwrapped open
6768149.126.72.220 12246 tcp tcpwrapped open
6769149.126.72.220 12247 tcp tcpwrapped open
6770149.126.72.220 12248 tcp tcpwrapped open
6771149.126.72.220 12249 tcp tcpwrapped open
6772149.126.72.220 12250 tcp tcpwrapped open
6773149.126.72.220 12251 tcp tcpwrapped open
6774149.126.72.220 12252 tcp tcpwrapped open
6775149.126.72.220 12253 tcp tcpwrapped open
6776149.126.72.220 12254 tcp tcpwrapped open
6777149.126.72.220 12255 tcp tcpwrapped open
6778149.126.72.220 12256 tcp tcpwrapped open
6779149.126.72.220 12257 tcp tcpwrapped open
6780149.126.72.220 12258 tcp tcpwrapped open
6781149.126.72.220 12259 tcp tcpwrapped open
6782149.126.72.220 12260 tcp tcpwrapped open
6783149.126.72.220 12261 tcp tcpwrapped open
6784149.126.72.220 12262 tcp tcpwrapped open
6785149.126.72.220 12263 tcp tcpwrapped open
6786149.126.72.220 12264 tcp tcpwrapped open
6787149.126.72.220 12265 tcp tcpwrapped open
6788149.126.72.220 12266 tcp tcpwrapped open
6789149.126.72.220 12267 tcp tcpwrapped open
6790149.126.72.220 12268 tcp tcpwrapped open
6791149.126.72.220 12269 tcp tcpwrapped open
6792149.126.72.220 12270 tcp tcpwrapped open
6793149.126.72.220 12271 tcp tcpwrapped open
6794149.126.72.220 12272 tcp tcpwrapped open
6795149.126.72.220 12273 tcp tcpwrapped open
6796149.126.72.220 12274 tcp tcpwrapped open
6797149.126.72.220 12275 tcp tcpwrapped open
6798149.126.72.220 12276 tcp tcpwrapped open
6799149.126.72.220 12277 tcp tcpwrapped open
6800149.126.72.220 12278 tcp tcpwrapped open
6801149.126.72.220 12279 tcp tcpwrapped open
6802149.126.72.220 12280 tcp tcpwrapped open
6803149.126.72.220 12281 tcp tcpwrapped open
6804149.126.72.220 12282 tcp tcpwrapped open
6805149.126.72.220 12283 tcp tcpwrapped open
6806149.126.72.220 12284 tcp tcpwrapped open
6807149.126.72.220 12285 tcp tcpwrapped open
6808149.126.72.220 12286 tcp tcpwrapped open
6809149.126.72.220 12287 tcp tcpwrapped open
6810149.126.72.220 12288 tcp tcpwrapped open
6811149.126.72.220 12289 tcp tcpwrapped open
6812149.126.72.220 12290 tcp tcpwrapped open
6813149.126.72.220 12291 tcp tcpwrapped open
6814149.126.72.220 12292 tcp tcpwrapped open
6815149.126.72.220 12293 tcp tcpwrapped open
6816149.126.72.220 12294 tcp tcpwrapped open
6817149.126.72.220 12295 tcp tcpwrapped open
6818149.126.72.220 12296 tcp tcpwrapped open
6819149.126.72.220 12297 tcp tcpwrapped open
6820149.126.72.220 12298 tcp tcpwrapped open
6821149.126.72.220 12299 tcp tcpwrapped open
6822149.126.72.220 12300 tcp tcpwrapped open
6823149.126.72.220 12301 tcp tcpwrapped open
6824149.126.72.220 12302 tcp tcpwrapped open
6825149.126.72.220 12303 tcp tcpwrapped open
6826149.126.72.220 12304 tcp tcpwrapped open
6827149.126.72.220 12305 tcp tcpwrapped open
6828149.126.72.220 12306 tcp tcpwrapped open
6829149.126.72.220 12307 tcp tcpwrapped open
6830149.126.72.220 12308 tcp tcpwrapped open
6831149.126.72.220 12309 tcp tcpwrapped open
6832149.126.72.220 12310 tcp tcpwrapped open
6833149.126.72.220 12311 tcp tcpwrapped open
6834149.126.72.220 12312 tcp tcpwrapped open
6835149.126.72.220 12313 tcp tcpwrapped open
6836149.126.72.220 12314 tcp tcpwrapped open
6837149.126.72.220 12315 tcp tcpwrapped open
6838149.126.72.220 12316 tcp tcpwrapped open
6839149.126.72.220 12317 tcp tcpwrapped open
6840149.126.72.220 12318 tcp tcpwrapped open
6841149.126.72.220 12319 tcp tcpwrapped open
6842149.126.72.220 12320 tcp tcpwrapped open
6843149.126.72.220 12321 tcp tcpwrapped open
6844149.126.72.220 12322 tcp tcpwrapped open
6845149.126.72.220 12323 tcp tcpwrapped open
6846149.126.72.220 12324 tcp tcpwrapped open
6847149.126.72.220 12325 tcp tcpwrapped open
6848149.126.72.220 12326 tcp tcpwrapped open
6849149.126.72.220 12327 tcp tcpwrapped open
6850149.126.72.220 12328 tcp tcpwrapped open
6851149.126.72.220 12329 tcp tcpwrapped open
6852149.126.72.220 12330 tcp tcpwrapped open
6853149.126.72.220 12331 tcp tcpwrapped open
6854149.126.72.220 12332 tcp tcpwrapped open
6855149.126.72.220 12333 tcp tcpwrapped open
6856149.126.72.220 12334 tcp tcpwrapped open
6857149.126.72.220 12335 tcp tcpwrapped open
6858149.126.72.220 12336 tcp tcpwrapped open
6859149.126.72.220 12337 tcp tcpwrapped open
6860149.126.72.220 12338 tcp tcpwrapped open
6861149.126.72.220 12339 tcp tcpwrapped open
6862149.126.72.220 12340 tcp tcpwrapped open
6863149.126.72.220 12341 tcp tcpwrapped open
6864149.126.72.220 12342 tcp tcpwrapped open
6865149.126.72.220 12343 tcp tcpwrapped open
6866149.126.72.220 12344 tcp tcpwrapped open
6867149.126.72.220 12345 tcp tcpwrapped open
6868149.126.72.220 12346 tcp tcpwrapped open
6869149.126.72.220 12347 tcp tcpwrapped open
6870149.126.72.220 12348 tcp tcpwrapped open
6871149.126.72.220 12349 tcp tcpwrapped open
6872149.126.72.220 12350 tcp tcpwrapped open
6873149.126.72.220 12351 tcp tcpwrapped open
6874149.126.72.220 12352 tcp tcpwrapped open
6875149.126.72.220 12353 tcp tcpwrapped open
6876149.126.72.220 12354 tcp tcpwrapped open
6877149.126.72.220 12355 tcp tcpwrapped open
6878149.126.72.220 12356 tcp tcpwrapped open
6879149.126.72.220 12357 tcp tcpwrapped open
6880149.126.72.220 12358 tcp tcpwrapped open
6881149.126.72.220 12359 tcp tcpwrapped open
6882149.126.72.220 12360 tcp tcpwrapped open
6883149.126.72.220 12361 tcp tcpwrapped open
6884149.126.72.220 12362 tcp tcpwrapped open
6885149.126.72.220 12363 tcp tcpwrapped open
6886149.126.72.220 12364 tcp tcpwrapped open
6887149.126.72.220 12365 tcp tcpwrapped open
6888149.126.72.220 12366 tcp tcpwrapped open
6889149.126.72.220 12367 tcp tcpwrapped open
6890149.126.72.220 12368 tcp tcpwrapped open
6891149.126.72.220 12369 tcp tcpwrapped open
6892149.126.72.220 12370 tcp tcpwrapped open
6893149.126.72.220 12371 tcp tcpwrapped open
6894149.126.72.220 12372 tcp tcpwrapped open
6895149.126.72.220 12373 tcp tcpwrapped open
6896149.126.72.220 12374 tcp tcpwrapped open
6897149.126.72.220 12375 tcp tcpwrapped open
6898149.126.72.220 12376 tcp tcpwrapped open
6899149.126.72.220 12377 tcp tcpwrapped open
6900149.126.72.220 12378 tcp tcpwrapped open
6901149.126.72.220 12379 tcp tcpwrapped open
6902149.126.72.220 12380 tcp tcpwrapped open
6903149.126.72.220 12381 tcp tcpwrapped open
6904149.126.72.220 12382 tcp tcpwrapped open
6905149.126.72.220 12383 tcp tcpwrapped open
6906149.126.72.220 12384 tcp tcpwrapped open
6907149.126.72.220 12385 tcp tcpwrapped open
6908149.126.72.220 12386 tcp tcpwrapped open
6909149.126.72.220 12387 tcp tcpwrapped open
6910149.126.72.220 12388 tcp tcpwrapped open
6911149.126.72.220 12389 tcp tcpwrapped open
6912149.126.72.220 12390 tcp tcpwrapped open
6913149.126.72.220 12391 tcp tcpwrapped open
6914149.126.72.220 12392 tcp tcpwrapped open
6915149.126.72.220 12393 tcp tcpwrapped open
6916149.126.72.220 12394 tcp tcpwrapped open
6917149.126.72.220 12395 tcp tcpwrapped open
6918149.126.72.220 12396 tcp tcpwrapped open
6919149.126.72.220 12397 tcp tcpwrapped open
6920149.126.72.220 12398 tcp tcpwrapped open
6921149.126.72.220 12399 tcp tcpwrapped open
6922149.126.72.220 12400 tcp tcpwrapped open
6923149.126.72.220 12401 tcp tcpwrapped open
6924149.126.72.220 12402 tcp tcpwrapped open
6925149.126.72.220 12403 tcp tcpwrapped open
6926149.126.72.220 12404 tcp tcpwrapped open
6927149.126.72.220 12405 tcp tcpwrapped open
6928149.126.72.220 12406 tcp tcpwrapped open
6929149.126.72.220 12407 tcp tcpwrapped open
6930149.126.72.220 12408 tcp tcpwrapped open
6931149.126.72.220 12409 tcp tcpwrapped open
6932149.126.72.220 12410 tcp tcpwrapped open
6933149.126.72.220 12411 tcp tcpwrapped open
6934149.126.72.220 12412 tcp tcpwrapped open
6935149.126.72.220 12413 tcp tcpwrapped open
6936149.126.72.220 12414 tcp tcpwrapped open
6937149.126.72.220 12415 tcp tcpwrapped open
6938149.126.72.220 12416 tcp tcpwrapped open
6939149.126.72.220 12417 tcp tcpwrapped open
6940149.126.72.220 12418 tcp tcpwrapped open
6941149.126.72.220 12419 tcp tcpwrapped open
6942149.126.72.220 12420 tcp tcpwrapped open
6943149.126.72.220 12421 tcp tcpwrapped open
6944149.126.72.220 12422 tcp tcpwrapped open
6945149.126.72.220 12423 tcp tcpwrapped open
6946149.126.72.220 12424 tcp tcpwrapped open
6947149.126.72.220 12425 tcp tcpwrapped open
6948149.126.72.220 12426 tcp tcpwrapped open
6949149.126.72.220 12427 tcp tcpwrapped open
6950149.126.72.220 12428 tcp tcpwrapped open
6951149.126.72.220 12429 tcp tcpwrapped open
6952149.126.72.220 12430 tcp tcpwrapped open
6953149.126.72.220 12431 tcp tcpwrapped open
6954149.126.72.220 12432 tcp tcpwrapped open
6955149.126.72.220 12433 tcp tcpwrapped open
6956149.126.72.220 12434 tcp tcpwrapped open
6957149.126.72.220 12435 tcp tcpwrapped open
6958149.126.72.220 12436 tcp tcpwrapped open
6959149.126.72.220 12437 tcp tcpwrapped open
6960149.126.72.220 12438 tcp tcpwrapped open
6961149.126.72.220 12439 tcp tcpwrapped open
6962149.126.72.220 12440 tcp tcpwrapped open
6963149.126.72.220 12441 tcp tcpwrapped open
6964149.126.72.220 12442 tcp tcpwrapped open
6965149.126.72.220 12443 tcp tcpwrapped open
6966149.126.72.220 12444 tcp tcpwrapped open
6967149.126.72.220 12445 tcp tcpwrapped open
6968149.126.72.220 12446 tcp tcpwrapped open
6969149.126.72.220 12447 tcp tcpwrapped open
6970149.126.72.220 12448 tcp tcpwrapped open
6971149.126.72.220 12449 tcp tcpwrapped open
6972149.126.72.220 12450 tcp tcpwrapped open
6973149.126.72.220 12451 tcp tcpwrapped open
6974149.126.72.220 12452 tcp tcpwrapped open
6975149.126.72.220 12453 tcp tcpwrapped open
6976149.126.72.220 12454 tcp tcpwrapped open
6977149.126.72.220 12455 tcp tcpwrapped open
6978149.126.72.220 12456 tcp tcpwrapped open
6979149.126.72.220 12457 tcp tcpwrapped open
6980149.126.72.220 12458 tcp tcpwrapped open
6981149.126.72.220 12459 tcp tcpwrapped open
6982149.126.72.220 12460 tcp tcpwrapped open
6983149.126.72.220 12461 tcp tcpwrapped open
6984149.126.72.220 12462 tcp tcpwrapped open
6985149.126.72.220 12463 tcp tcpwrapped open
6986149.126.72.220 12464 tcp tcpwrapped open
6987149.126.72.220 12465 tcp tcpwrapped open
6988149.126.72.220 12466 tcp tcpwrapped open
6989149.126.72.220 12467 tcp tcpwrapped open
6990149.126.72.220 12468 tcp tcpwrapped open
6991149.126.72.220 12469 tcp tcpwrapped open
6992149.126.72.220 12470 tcp tcpwrapped open
6993149.126.72.220 12471 tcp tcpwrapped open
6994149.126.72.220 12472 tcp tcpwrapped open
6995149.126.72.220 12473 tcp tcpwrapped open
6996149.126.72.220 12474 tcp tcpwrapped open
6997149.126.72.220 12475 tcp tcpwrapped open
6998149.126.72.220 12476 tcp tcpwrapped open
6999149.126.72.220 12477 tcp tcpwrapped open
7000149.126.72.220 12478 tcp tcpwrapped open
7001149.126.72.220 12479 tcp tcpwrapped open
7002149.126.72.220 12480 tcp tcpwrapped open
7003149.126.72.220 12481 tcp tcpwrapped open
7004149.126.72.220 12482 tcp tcpwrapped open
7005149.126.72.220 12483 tcp tcpwrapped open
7006149.126.72.220 12484 tcp tcpwrapped open
7007149.126.72.220 12485 tcp tcpwrapped open
7008149.126.72.220 12486 tcp tcpwrapped open
7009149.126.72.220 12487 tcp tcpwrapped open
7010149.126.72.220 12488 tcp tcpwrapped open
7011149.126.72.220 12489 tcp tcpwrapped open
7012149.126.72.220 12490 tcp tcpwrapped open
7013149.126.72.220 12491 tcp tcpwrapped open
7014149.126.72.220 12492 tcp tcpwrapped open
7015149.126.72.220 12493 tcp tcpwrapped open
7016149.126.72.220 12494 tcp tcpwrapped open
7017149.126.72.220 12495 tcp tcpwrapped open
7018149.126.72.220 12496 tcp tcpwrapped open
7019149.126.72.220 12497 tcp tcpwrapped open
7020149.126.72.220 12498 tcp tcpwrapped open
7021149.126.72.220 12499 tcp tcpwrapped open
7022149.126.72.220 12500 tcp tcpwrapped open
7023149.126.72.220 12501 tcp tcpwrapped open
7024149.126.72.220 12502 tcp tcpwrapped open
7025149.126.72.220 12503 tcp tcpwrapped open
7026149.126.72.220 12504 tcp tcpwrapped open
7027149.126.72.220 12505 tcp tcpwrapped open
7028149.126.72.220 12506 tcp tcpwrapped open
7029149.126.72.220 12507 tcp tcpwrapped open
7030149.126.72.220 12508 tcp tcpwrapped open
7031149.126.72.220 12509 tcp tcpwrapped open
7032149.126.72.220 12510 tcp tcpwrapped open
7033149.126.72.220 12511 tcp tcpwrapped open
7034149.126.72.220 12512 tcp tcpwrapped open
7035149.126.72.220 12513 tcp tcpwrapped open
7036149.126.72.220 12514 tcp tcpwrapped open
7037149.126.72.220 12515 tcp tcpwrapped open
7038149.126.72.220 12516 tcp tcpwrapped open
7039149.126.72.220 12517 tcp tcpwrapped open
7040149.126.72.220 12518 tcp tcpwrapped open
7041149.126.72.220 12519 tcp tcpwrapped open
7042149.126.72.220 12520 tcp tcpwrapped open
7043149.126.72.220 12521 tcp tcpwrapped open
7044149.126.72.220 12522 tcp tcpwrapped open
7045149.126.72.220 12523 tcp tcpwrapped open
7046149.126.72.220 12524 tcp tcpwrapped open
7047149.126.72.220 12525 tcp tcpwrapped open
7048149.126.72.220 12526 tcp tcpwrapped open
7049149.126.72.220 12527 tcp tcpwrapped open
7050149.126.72.220 12528 tcp tcpwrapped open
7051149.126.72.220 12529 tcp tcpwrapped open
7052149.126.72.220 12530 tcp tcpwrapped open
7053149.126.72.220 12531 tcp tcpwrapped open
7054149.126.72.220 12532 tcp tcpwrapped open
7055149.126.72.220 12533 tcp tcpwrapped open
7056149.126.72.220 12534 tcp tcpwrapped open
7057149.126.72.220 12535 tcp tcpwrapped open
7058149.126.72.220 12536 tcp tcpwrapped open
7059149.126.72.220 12537 tcp tcpwrapped open
7060149.126.72.220 12538 tcp tcpwrapped open
7061149.126.72.220 12539 tcp tcpwrapped open
7062149.126.72.220 12540 tcp tcpwrapped open
7063149.126.72.220 12541 tcp tcpwrapped open
7064149.126.72.220 12542 tcp tcpwrapped open
7065149.126.72.220 12543 tcp tcpwrapped open
7066149.126.72.220 12544 tcp tcpwrapped open
7067149.126.72.220 12545 tcp tcpwrapped open
7068149.126.72.220 12546 tcp tcpwrapped open
7069149.126.72.220 12547 tcp tcpwrapped open
7070149.126.72.220 12548 tcp tcpwrapped open
7071149.126.72.220 12549 tcp tcpwrapped open
7072149.126.72.220 12550 tcp tcpwrapped open
7073149.126.72.220 12551 tcp tcpwrapped open
7074149.126.72.220 12552 tcp tcpwrapped open
7075149.126.72.220 12553 tcp tcpwrapped open
7076149.126.72.220 12554 tcp tcpwrapped open
7077149.126.72.220 12555 tcp tcpwrapped open
7078149.126.72.220 12556 tcp tcpwrapped open
7079149.126.72.220 12557 tcp tcpwrapped open
7080149.126.72.220 12558 tcp tcpwrapped open
7081149.126.72.220 12559 tcp tcpwrapped open
7082149.126.72.220 12560 tcp tcpwrapped open
7083149.126.72.220 12561 tcp tcpwrapped open
7084149.126.72.220 12562 tcp tcpwrapped open
7085149.126.72.220 12563 tcp tcpwrapped open
7086149.126.72.220 12564 tcp tcpwrapped open
7087149.126.72.220 12565 tcp tcpwrapped open
7088149.126.72.220 12566 tcp tcpwrapped open
7089149.126.72.220 12567 tcp tcpwrapped open
7090149.126.72.220 12568 tcp tcpwrapped open
7091149.126.72.220 12569 tcp tcpwrapped open
7092149.126.72.220 12570 tcp tcpwrapped open
7093149.126.72.220 12571 tcp tcpwrapped open
7094149.126.72.220 12572 tcp tcpwrapped open
7095149.126.72.220 12573 tcp tcpwrapped open
7096149.126.72.220 12574 tcp tcpwrapped open
7097149.126.72.220 12575 tcp tcpwrapped open
7098149.126.72.220 12576 tcp tcpwrapped open
7099149.126.72.220 12577 tcp tcpwrapped open
7100149.126.72.220 12578 tcp tcpwrapped open
7101149.126.72.220 12579 tcp tcpwrapped open
7102149.126.72.220 12580 tcp tcpwrapped open
7103149.126.72.220 12581 tcp tcpwrapped open
7104149.126.72.220 12582 tcp tcpwrapped open
7105149.126.72.220 12583 tcp tcpwrapped open
7106149.126.72.220 12584 tcp tcpwrapped open
7107149.126.72.220 12585 tcp tcpwrapped open
7108149.126.72.220 12586 tcp tcpwrapped open
7109149.126.72.220 12587 tcp tcpwrapped open
7110149.126.72.220 12588 tcp tcpwrapped open
7111149.126.72.220 12589 tcp tcpwrapped open
7112149.126.72.220 12590 tcp tcpwrapped open
7113149.126.72.220 13082 tcp tcpwrapped open
7114149.126.72.220 13084 tcp tcpwrapped open
7115149.126.72.220 13333 tcp tcpwrapped open
7116149.126.72.220 13443 tcp tcpwrapped open
7117149.126.72.220 14006 tcp tcpwrapped open
7118149.126.72.220 14082 tcp tcpwrapped open
7119149.126.72.220 14084 tcp tcpwrapped open
7120149.126.72.220 14104 tcp tcpwrapped open
7121149.126.72.220 14130 tcp tcpwrapped open
7122149.126.72.220 14182 tcp tcpwrapped open
7123149.126.72.220 14184 tcp tcpwrapped open
7124149.126.72.220 14330 tcp tcpwrapped open
7125149.126.72.220 14443 tcp tcpwrapped open
7126149.126.72.220 14825 tcp tcpwrapped open
7127149.126.72.220 15002 tcp tcpwrapped open
7128149.126.72.220 15006 tcp tcpwrapped open
7129149.126.72.220 15082 tcp tcpwrapped open
7130149.126.72.220 15084 tcp tcpwrapped open
7131149.126.72.220 15151 tcp tcpwrapped open
7132149.126.72.220 15555 tcp tcpwrapped open
7133149.126.72.220 16000 tcp tcpwrapped open
7134149.126.72.220 16001 tcp tcpwrapped open
7135149.126.72.220 16015 tcp tcpwrapped open
7136149.126.72.220 16016 tcp tcpwrapped open
7137149.126.72.220 16017 tcp tcpwrapped open
7138149.126.72.220 16082 tcp tcpwrapped open
7139149.126.72.220 16084 tcp tcpwrapped open
7140149.126.72.220 16311 tcp tcpwrapped open
7141149.126.72.220 16316 tcp tcpwrapped open
7142149.126.72.220 16443 tcp tcpwrapped open
7143149.126.72.220 16800 tcp tcpwrapped open
7144149.126.72.220 16888 tcp tcpwrapped open
7145149.126.72.220 17082 tcp tcpwrapped open
7146149.126.72.220 17084 tcp tcpwrapped open
7147149.126.72.220 17182 tcp tcpwrapped open
7148149.126.72.220 17184 tcp tcpwrapped open
7149149.126.72.220 17770 tcp tcpwrapped open
7150149.126.72.220 17771 tcp tcpwrapped open
7151149.126.72.220 17772 tcp tcpwrapped open
7152149.126.72.220 17773 tcp tcpwrapped open
7153149.126.72.220 17774 tcp tcpwrapped open
7154149.126.72.220 17775 tcp tcpwrapped open
7155149.126.72.220 17776 tcp tcpwrapped open
7156149.126.72.220 17777 tcp tcpwrapped open
7157149.126.72.220 17778 tcp tcpwrapped open
7158149.126.72.220 17779 tcp tcpwrapped open
7159149.126.72.220 17780 tcp tcpwrapped open
7160149.126.72.220 18000 tcp tcpwrapped open
7161149.126.72.220 18001 tcp tcpwrapped open
7162149.126.72.220 18002 tcp tcpwrapped open
7163149.126.72.220 18003 tcp tcpwrapped open
7164149.126.72.220 18004 tcp tcpwrapped open
7165149.126.72.220 18005 tcp tcpwrapped open
7166149.126.72.220 18006 tcp tcpwrapped open
7167149.126.72.220 18007 tcp tcpwrapped open
7168149.126.72.220 18008 tcp tcpwrapped open
7169149.126.72.220 18009 tcp tcpwrapped open
7170149.126.72.220 18010 tcp tcpwrapped open
7171149.126.72.220 18011 tcp tcpwrapped open
7172149.126.72.220 18012 tcp tcpwrapped open
7173149.126.72.220 18013 tcp tcpwrapped open
7174149.126.72.220 18014 tcp tcpwrapped open
7175149.126.72.220 18015 tcp tcpwrapped open
7176149.126.72.220 18016 tcp tcpwrapped open
7177149.126.72.220 18017 tcp tcpwrapped open
7178149.126.72.220 18018 tcp tcpwrapped open
7179149.126.72.220 18019 tcp tcpwrapped open
7180149.126.72.220 18020 tcp tcpwrapped open
7181149.126.72.220 18021 tcp tcpwrapped open
7182149.126.72.220 18022 tcp tcpwrapped open
7183149.126.72.220 18023 tcp tcpwrapped open
7184149.126.72.220 18024 tcp tcpwrapped open
7185149.126.72.220 18025 tcp tcpwrapped open
7186149.126.72.220 18026 tcp tcpwrapped open
7187149.126.72.220 18027 tcp tcpwrapped open
7188149.126.72.220 18028 tcp tcpwrapped open
7189149.126.72.220 18029 tcp tcpwrapped open
7190149.126.72.220 18030 tcp tcpwrapped open
7191149.126.72.220 18031 tcp tcpwrapped open
7192149.126.72.220 18032 tcp tcpwrapped open
7193149.126.72.220 18033 tcp tcpwrapped open
7194149.126.72.220 18034 tcp tcpwrapped open
7195149.126.72.220 18035 tcp tcpwrapped open
7196149.126.72.220 18036 tcp tcpwrapped open
7197149.126.72.220 18037 tcp tcpwrapped open
7198149.126.72.220 18038 tcp tcpwrapped open
7199149.126.72.220 18039 tcp tcpwrapped open
7200149.126.72.220 18040 tcp tcpwrapped open
7201149.126.72.220 18041 tcp tcpwrapped open
7202149.126.72.220 18042 tcp tcpwrapped open
7203149.126.72.220 18043 tcp tcpwrapped open
7204149.126.72.220 18044 tcp tcpwrapped open
7205149.126.72.220 18045 tcp tcpwrapped open
7206149.126.72.220 18046 tcp tcpwrapped open
7207149.126.72.220 18047 tcp tcpwrapped open
7208149.126.72.220 18048 tcp tcpwrapped open
7209149.126.72.220 18049 tcp tcpwrapped open
7210149.126.72.220 18050 tcp tcpwrapped open
7211149.126.72.220 18051 tcp tcpwrapped open
7212149.126.72.220 18052 tcp tcpwrapped open
7213149.126.72.220 18053 tcp tcpwrapped open
7214149.126.72.220 18054 tcp tcpwrapped open
7215149.126.72.220 18055 tcp tcpwrapped open
7216149.126.72.220 18056 tcp tcpwrapped open
7217149.126.72.220 18057 tcp tcpwrapped open
7218149.126.72.220 18058 tcp tcpwrapped open
7219149.126.72.220 18059 tcp tcpwrapped open
7220149.126.72.220 18060 tcp tcpwrapped open
7221149.126.72.220 18061 tcp tcpwrapped open
7222149.126.72.220 18062 tcp tcpwrapped open
7223149.126.72.220 18063 tcp tcpwrapped open
7224149.126.72.220 18064 tcp tcpwrapped open
7225149.126.72.220 18065 tcp tcpwrapped open
7226149.126.72.220 18066 tcp tcpwrapped open
7227149.126.72.220 18067 tcp tcpwrapped open
7228149.126.72.220 18068 tcp tcpwrapped open
7229149.126.72.220 18069 tcp tcpwrapped open
7230149.126.72.220 18070 tcp tcpwrapped open
7231149.126.72.220 18071 tcp tcpwrapped open
7232149.126.72.220 18072 tcp tcpwrapped open
7233149.126.72.220 18073 tcp tcpwrapped open
7234149.126.72.220 18074 tcp tcpwrapped open
7235149.126.72.220 18075 tcp tcpwrapped open
7236149.126.72.220 18076 tcp tcpwrapped open
7237149.126.72.220 18077 tcp tcpwrapped open
7238149.126.72.220 18078 tcp tcpwrapped open
7239149.126.72.220 18079 tcp tcpwrapped open
7240149.126.72.220 18080 tcp tcpwrapped open
7241149.126.72.220 18081 tcp tcpwrapped open
7242149.126.72.220 18082 tcp tcpwrapped open
7243149.126.72.220 18083 tcp tcpwrapped open
7244149.126.72.220 18084 tcp tcpwrapped open
7245149.126.72.220 18085 tcp tcpwrapped open
7246149.126.72.220 18086 tcp tcpwrapped open
7247149.126.72.220 18087 tcp tcpwrapped open
7248149.126.72.220 18088 tcp tcpwrapped open
7249149.126.72.220 18089 tcp tcpwrapped open
7250149.126.72.220 18090 tcp tcpwrapped open
7251149.126.72.220 18091 tcp tcpwrapped open
7252149.126.72.220 18092 tcp tcpwrapped open
7253149.126.72.220 18093 tcp tcpwrapped open
7254149.126.72.220 18094 tcp tcpwrapped open
7255149.126.72.220 18095 tcp tcpwrapped open
7256149.126.72.220 18096 tcp tcpwrapped open
7257149.126.72.220 18097 tcp tcpwrapped open
7258149.126.72.220 18098 tcp tcpwrapped open
7259149.126.72.220 18099 tcp tcpwrapped open
7260149.126.72.220 18100 tcp tcpwrapped open
7261149.126.72.220 18101 tcp tcpwrapped open
7262149.126.72.220 18102 tcp tcpwrapped open
7263149.126.72.220 18103 tcp tcpwrapped open
7264149.126.72.220 18104 tcp tcpwrapped open
7265149.126.72.220 18105 tcp tcpwrapped open
7266149.126.72.220 18106 tcp tcpwrapped open
7267149.126.72.220 18107 tcp tcpwrapped open
7268149.126.72.220 18108 tcp tcpwrapped open
7269149.126.72.220 18109 tcp tcpwrapped open
7270149.126.72.220 18110 tcp tcpwrapped open
7271149.126.72.220 18111 tcp tcpwrapped open
7272149.126.72.220 18112 tcp tcpwrapped open
7273149.126.72.220 18113 tcp tcpwrapped open
7274149.126.72.220 18200 tcp tcpwrapped open
7275149.126.72.220 18239 tcp tcpwrapped open
7276149.126.72.220 18443 tcp tcpwrapped open
7277149.126.72.220 18802 tcp tcpwrapped open
7278149.126.72.220 19013 tcp tcpwrapped open
7279149.126.72.220 19014 tcp tcpwrapped open
7280149.126.72.220 19015 tcp tcpwrapped open
7281149.126.72.220 19016 tcp tcpwrapped open
7282149.126.72.220 19017 tcp tcpwrapped open
7283149.126.72.220 19022 tcp tcpwrapped open
7284149.126.72.220 19080 tcp tcpwrapped open
7285149.126.72.220 19082 tcp tcpwrapped open
7286149.126.72.220 19084 tcp tcpwrapped open
7287149.126.72.220 19443 tcp tcpwrapped open
7288149.126.72.220 20000 tcp tcpwrapped open
7289149.126.72.220 20001 tcp tcpwrapped open
7290149.126.72.220 20010 tcp tcpwrapped open
7291149.126.72.220 20020 tcp tcpwrapped open
7292149.126.72.220 20030 tcp tcpwrapped open
7293149.126.72.220 20040 tcp tcpwrapped open
7294149.126.72.220 20050 tcp tcpwrapped open
7295149.126.72.220 20053 tcp tcpwrapped open
7296149.126.72.220 20060 tcp tcpwrapped open
7297149.126.72.220 20070 tcp tcpwrapped open
7298149.126.72.220 20080 tcp tcpwrapped open
7299149.126.72.220 20082 tcp tcpwrapped open
7300149.126.72.220 20084 tcp tcpwrapped open
7301149.126.72.220 20090 tcp tcpwrapped open
7302149.126.72.220 20100 tcp tcpwrapped open
7303149.126.72.220 20106 tcp tcpwrapped open
7304149.126.72.220 20107 tcp tcpwrapped open
7305149.126.72.220 20110 tcp tcpwrapped open
7306149.126.72.220 20150 tcp tcpwrapped open
7307149.126.72.220 20182 tcp tcpwrapped open
7308149.126.72.220 20184 tcp tcpwrapped open
7309149.126.72.220 20185 tcp tcpwrapped open
7310149.126.72.220 20200 tcp tcpwrapped open
7311149.126.72.220 20208 tcp tcpwrapped open
7312149.126.72.220 20325 tcp tcpwrapped open
7313149.126.72.220 20500 tcp tcpwrapped open
7314149.126.72.220 20512 tcp tcpwrapped open
7315149.126.72.220 20600 tcp tcpwrapped open
7316149.126.72.220 20800 tcp tcpwrapped open
7317149.126.72.220 20892 tcp tcpwrapped open
7318149.126.72.220 20894 tcp tcpwrapped open
7319149.126.72.220 20900 tcp tcpwrapped open
7320149.126.72.220 21081 tcp tcpwrapped open
7321149.126.72.220 21082 tcp tcpwrapped open
7322149.126.72.220 21083 tcp tcpwrapped open
7323149.126.72.220 21084 tcp tcpwrapped open
7324149.126.72.220 21100 tcp tcpwrapped open
7325149.126.72.220 21200 tcp tcpwrapped open
7326149.126.72.220 21300 tcp tcpwrapped open
7327149.126.72.220 21357 tcp tcpwrapped open
7328149.126.72.220 21381 tcp tcpwrapped open
7329149.126.72.220 21400 tcp tcpwrapped open
7330149.126.72.220 21500 tcp tcpwrapped open
7331149.126.72.220 21935 tcp tcpwrapped open
7332149.126.72.220 22082 tcp tcpwrapped open
7333149.126.72.220 22084 tcp tcpwrapped open
7334149.126.72.220 22103 tcp tcpwrapped open
7335149.126.72.220 22107 tcp tcpwrapped open
7336149.126.72.220 22206 tcp tcpwrapped open
7337149.126.72.220 22345 tcp tcpwrapped open
7338149.126.72.220 22403 tcp tcpwrapped open
7339149.126.72.220 22609 tcp tcpwrapped open
7340149.126.72.220 22703 tcp tcpwrapped open
7341149.126.72.220 22705 tcp tcpwrapped open
7342149.126.72.220 23082 tcp tcpwrapped open
7343149.126.72.220 23084 tcp tcpwrapped open
7344149.126.72.220 23182 tcp tcpwrapped open
7345149.126.72.220 23184 tcp tcpwrapped open
7346149.126.72.220 24082 tcp tcpwrapped open
7347149.126.72.220 24084 tcp tcpwrapped open
7348149.126.72.220 24472 tcp tcpwrapped open
7349149.126.72.220 24510 tcp tcpwrapped open
7350149.126.72.220 25000 tcp tcpwrapped open
7351149.126.72.220 25001 tcp tcpwrapped open
7352149.126.72.220 25002 tcp tcpwrapped open
7353149.126.72.220 25003 tcp tcpwrapped open
7354149.126.72.220 25004 tcp tcpwrapped open
7355149.126.72.220 25005 tcp tcpwrapped open
7356149.126.72.220 25006 tcp tcpwrapped open
7357149.126.72.220 25007 tcp tcpwrapped open
7358149.126.72.220 25008 tcp tcpwrapped open
7359149.126.72.220 25009 tcp tcpwrapped open
7360149.126.72.220 25010 tcp tcpwrapped open
7361149.126.72.220 25082 tcp tcpwrapped open
7362149.126.72.220 25084 tcp tcpwrapped open
7363149.126.72.220 25782 tcp tcpwrapped open
7364149.126.72.220 25952 tcp tcpwrapped open
7365149.126.72.220 27571 tcp tcpwrapped open
7366149.126.72.220 28001 tcp tcpwrapped open
7367149.126.72.220 28080 tcp tcpwrapped open
7368149.126.72.220 28818 tcp tcpwrapped open
7369149.126.72.220 29798 tcp tcpwrapped open
7370149.126.72.220 29799 tcp tcpwrapped open
7371149.126.72.220 30000 tcp tcpwrapped open
7372149.126.72.220 30001 tcp tcpwrapped open
7373149.126.72.220 30003 tcp tcpwrapped open
7374149.126.72.220 30005 tcp tcpwrapped open
7375149.126.72.220 30007 tcp tcpwrapped open
7376149.126.72.220 30009 tcp tcpwrapped open
7377149.126.72.220 30011 tcp tcpwrapped open
7378149.126.72.220 30013 tcp tcpwrapped open
7379149.126.72.220 30015 tcp tcpwrapped open
7380149.126.72.220 30017 tcp tcpwrapped open
7381149.126.72.220 30019 tcp tcpwrapped open
7382149.126.72.220 30021 tcp tcpwrapped open
7383149.126.72.220 30050 tcp tcpwrapped open
7384149.126.72.220 30106 tcp tcpwrapped open
7385149.126.72.220 30110 tcp tcpwrapped open
7386149.126.72.220 30111 tcp tcpwrapped open
7387149.126.72.220 30112 tcp tcpwrapped open
7388149.126.72.220 30113 tcp tcpwrapped open
7389149.126.72.220 30120 tcp tcpwrapped open
7390149.126.72.220 30121 tcp tcpwrapped open
7391149.126.72.220 30122 tcp tcpwrapped open
7392149.126.72.220 30123 tcp tcpwrapped open
7393149.126.72.220 30452 tcp tcpwrapped open
7394149.126.72.220 30468 tcp tcpwrapped open
7395149.126.72.220 30473 tcp tcpwrapped open
7396149.126.72.220 30479 tcp tcpwrapped open
7397149.126.72.220 30501 tcp tcpwrapped open
7398149.126.72.220 30700 tcp tcpwrapped open
7399149.126.72.220 30701 tcp tcpwrapped open
7400149.126.72.220 30892 tcp tcpwrapped open
7401149.126.72.220 30894 tcp tcpwrapped open
7402149.126.72.220 31337 tcp tcpwrapped open
7403149.126.72.220 32101 tcp tcpwrapped open
7404149.126.72.220 32102 tcp tcpwrapped open
7405149.126.72.220 32202 tcp tcpwrapped open
7406149.126.72.220 32303 tcp tcpwrapped open
7407149.126.72.220 32443 tcp tcpwrapped open
7408149.126.72.220 32444 tcp tcpwrapped open
7409149.126.72.220 32746 tcp tcpwrapped open
7410149.126.72.220 32800 tcp tcpwrapped open
7411149.126.72.220 34225 tcp tcpwrapped open
7412149.126.72.220 34500 tcp tcpwrapped open
7413149.126.72.220 35522 tcp tcpwrapped open
7414149.126.72.220 35524 tcp tcpwrapped open
7415149.126.72.220 35531 tcp tcpwrapped open
7416149.126.72.220 35554 tcp tcpwrapped open
7417149.126.72.220 35559 tcp tcpwrapped open
7418149.126.72.220 35560 tcp tcpwrapped open
7419149.126.72.220 36982 tcp tcpwrapped open
7420149.126.72.220 36983 tcp tcpwrapped open
7421149.126.72.220 36984 tcp tcpwrapped open
7422149.126.72.220 37080 tcp tcpwrapped open
7423149.126.72.220 38880 tcp tcpwrapped open
7424149.126.72.220 39001 tcp tcpwrapped open
7425149.126.72.220 40070 tcp tcpwrapped open
7426149.126.72.220 40099 tcp tcpwrapped open
7427149.126.72.220 40892 tcp tcpwrapped open
7428149.126.72.220 40894 tcp tcpwrapped open
7429149.126.72.220 42208 tcp tcpwrapped open
7430149.126.72.220 42424 tcp tcpwrapped open
7431149.126.72.220 42901 tcp tcpwrapped open
7432149.126.72.220 43008 tcp tcpwrapped open
7433149.126.72.220 43009 tcp tcpwrapped open
7434149.126.72.220 43200 tcp tcpwrapped open
7435149.126.72.220 44100 tcp tcpwrapped open
7436149.126.72.220 44300 tcp tcpwrapped open
7437149.126.72.220 44301 tcp tcpwrapped open
7438149.126.72.220 44302 tcp tcpwrapped open
7439149.126.72.220 44303 tcp tcpwrapped open
7440149.126.72.220 44304 tcp tcpwrapped open
7441149.126.72.220 44305 tcp tcpwrapped open
7442149.126.72.220 44306 tcp tcpwrapped open
7443149.126.72.220 44307 tcp tcpwrapped open
7444149.126.72.220 44308 tcp tcpwrapped open
7445149.126.72.220 44309 tcp tcpwrapped open
7446149.126.72.220 44310 tcp tcpwrapped open
7447149.126.72.220 44320 tcp tcpwrapped open
7448149.126.72.220 44332 tcp tcpwrapped open
7449149.126.72.220 44333 tcp tcpwrapped open
7450149.126.72.220 44334 tcp tcpwrapped open
7451149.126.72.220 44336 tcp tcpwrapped open
7452149.126.72.220 44337 tcp tcpwrapped open
7453149.126.72.220 44340 tcp tcpwrapped open
7454149.126.72.220 44341 tcp tcpwrapped open
7455149.126.72.220 44345 tcp tcpwrapped open
7456149.126.72.220 44400 tcp tcpwrapped open
7457149.126.72.220 44410 tcp tcpwrapped open
7458149.126.72.220 44420 tcp tcpwrapped open
7459149.126.72.220 45000 tcp tcpwrapped open
7460149.126.72.220 45555 tcp tcpwrapped open
7461149.126.72.220 45666 tcp tcpwrapped open
7462149.126.72.220 45667 tcp tcpwrapped open
7463149.126.72.220 45668 tcp tcpwrapped open
7464149.126.72.220 45677 tcp tcpwrapped open
7465149.126.72.220 45777 tcp tcpwrapped open
7466149.126.72.220 45788 tcp tcpwrapped open
7467149.126.72.220 45821 tcp tcpwrapped open
7468149.126.72.220 45886 tcp tcpwrapped open
7469149.126.72.220 45888 tcp tcpwrapped open
7470149.126.72.220 46000 tcp tcpwrapped open
7471149.126.72.220 46443 tcp tcpwrapped open
7472149.126.72.220 46862 tcp tcpwrapped open
7473149.126.72.220 47000 tcp tcpwrapped open
7474149.126.72.220 47080 tcp tcpwrapped open
7475149.126.72.220 47534 tcp tcpwrapped open
7476149.126.72.220 48888 tcp tcpwrapped open
7477149.126.72.220 48889 tcp tcpwrapped open
7478149.126.72.220 49200 tcp tcpwrapped open
7479149.126.72.220 49210 tcp tcpwrapped open
7480149.126.72.220 49443 tcp tcpwrapped open
7481149.126.72.220 49682 tcp tcpwrapped open
7482149.126.72.220 49684 tcp tcpwrapped open
7483149.126.72.220 49686 tcp tcpwrapped open
7484149.126.72.220 49688 tcp tcpwrapped open
7485149.126.72.220 49690 tcp tcpwrapped open
7486149.126.72.220 49692 tcp tcpwrapped open
7487149.126.72.220 49694 tcp tcpwrapped open
7488149.126.72.220 50000 tcp tcpwrapped open
7489149.126.72.220 50001 tcp tcpwrapped open
7490149.126.72.220 50042 tcp tcpwrapped open
7491149.126.72.220 50050 tcp tcpwrapped open
7492149.126.72.220 50073 tcp tcpwrapped open
7493149.126.72.220 50085 tcp tcpwrapped open
7494149.126.72.220 50101 tcp tcpwrapped open
7495149.126.72.220 50102 tcp tcpwrapped open
7496149.126.72.220 50103 tcp tcpwrapped open
7497149.126.72.220 50104 tcp tcpwrapped open
7498149.126.72.220 50105 tcp tcpwrapped open
7499149.126.72.220 50106 tcp tcpwrapped open
7500149.126.72.220 50107 tcp tcpwrapped open
7501149.126.72.220 50112 tcp tcpwrapped open
7502149.126.72.220 50113 tcp tcpwrapped open
7503149.126.72.220 50122 tcp tcpwrapped open
7504149.126.72.220 50160 tcp tcpwrapped open
7505149.126.72.220 50443 tcp tcpwrapped open
7506149.126.72.220 51002 tcp tcpwrapped open
7507149.126.72.220 51003 tcp tcpwrapped open
7508149.126.72.220 51434 tcp tcpwrapped open
7509149.126.72.220 52010 tcp tcpwrapped open
7510149.126.72.220 52230 tcp tcpwrapped open
7511149.126.72.220 52311 tcp tcpwrapped open
7512149.126.72.220 52536 tcp tcpwrapped open
7513149.126.72.220 53480 tcp tcpwrapped open
7514149.126.72.220 53481 tcp tcpwrapped open
7515149.126.72.220 53482 tcp tcpwrapped open
7516149.126.72.220 53483 tcp tcpwrapped open
7517149.126.72.220 53484 tcp tcpwrapped open
7518149.126.72.220 53485 tcp tcpwrapped open
7519149.126.72.220 53490 tcp tcpwrapped open
7520149.126.72.220 53805 tcp tcpwrapped open
7521149.126.72.220 53806 tcp tcpwrapped open
7522149.126.72.220 54327 tcp tcpwrapped open
7523149.126.72.220 54490 tcp tcpwrapped open
7524149.126.72.220 54545 tcp tcpwrapped open
7525149.126.72.220 55055 tcp tcpwrapped open
7526149.126.72.220 55080 tcp tcpwrapped open
7527149.126.72.220 55081 tcp tcpwrapped open
7528149.126.72.220 55350 tcp tcpwrapped open
7529149.126.72.220 55388 tcp tcpwrapped open
7530149.126.72.220 55470 tcp tcpwrapped open
7531149.126.72.220 55475 tcp tcpwrapped open
7532149.126.72.220 55481 tcp tcpwrapped open
7533149.126.72.220 55490 tcp tcpwrapped open
7534149.126.72.220 57778 tcp tcpwrapped open
7535149.126.72.220 57779 tcp tcpwrapped open
7536149.126.72.220 57780 tcp tcpwrapped open
7537149.126.72.220 57781 tcp tcpwrapped open
7538149.126.72.220 57782 tcp tcpwrapped open
7539149.126.72.220 57783 tcp tcpwrapped open
7540149.126.72.220 57784 tcp tcpwrapped open
7541149.126.72.220 57785 tcp tcpwrapped open
7542149.126.72.220 57786 tcp tcpwrapped open
7543149.126.72.220 57787 tcp tcpwrapped open
7544149.126.72.220 57788 tcp tcpwrapped open
7545149.126.72.220 58443 tcp tcpwrapped open
7546149.126.72.220 58585 tcp tcpwrapped open
7547149.126.72.220 59012 tcp tcpwrapped open
7548149.126.72.220 59443 tcp tcpwrapped open
7549149.126.72.220 60021 tcp tcpwrapped open
7550149.126.72.220 60023 tcp tcpwrapped open
7551149.126.72.220 60443 tcp tcpwrapped open
7552149.126.72.220 62080 tcp tcpwrapped open
7553149.126.72.220 62237 tcp tcpwrapped open
7554149.126.72.220 62443 tcp tcpwrapped open
7555149.126.72.220 62865 tcp tcpwrapped open
7556149.126.72.220 63443 tcp tcpwrapped open
7557149.126.72.220 64477 tcp tcpwrapped open
7558149.126.72.220 64671 tcp tcpwrapped open
7559151.106.38.107 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 12:11. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
7560151.106.38.107 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
7561151.106.38.107 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
7562151.106.38.107 67 tcp dhcps filtered
7563151.106.38.107 67 udp dhcps unknown
7564151.106.38.107 68 tcp dhcpc filtered
7565151.106.38.107 68 udp dhcpc unknown
7566151.106.38.107 69 tcp tftp filtered
7567151.106.38.107 69 udp tftp unknown
7568151.106.38.107 88 tcp kerberos-sec filtered
7569151.106.38.107 88 udp kerberos-sec unknown
7570151.106.38.107 123 tcp ntp filtered
7571151.106.38.107 123 udp ntp unknown
7572151.106.38.107 137 tcp netbios-ns filtered
7573151.106.38.107 137 udp netbios-ns unknown
7574151.106.38.107 138 tcp netbios-dgm filtered
7575151.106.38.107 138 udp netbios-dgm unknown
7576151.106.38.107 139 tcp netbios-ssn filtered
7577151.106.38.107 139 udp netbios-ssn unknown
7578151.106.38.107 161 tcp snmp filtered
7579151.106.38.107 161 udp snmp unknown
7580151.106.38.107 162 tcp snmptrap filtered
7581151.106.38.107 162 udp snmptrap unknown
7582151.106.38.107 389 tcp ldap filtered
7583151.106.38.107 389 udp ldap unknown
7584151.106.38.107 520 tcp efs filtered
7585151.106.38.107 520 udp route unknown
7586151.106.38.107 2049 tcp nfs filtered
7587151.106.38.107 2049 udp nfs unknown
7588158.69.13.254 22 tcp ssh open OpenSSH 7.4 protocol 2.0
7589158.69.13.254 25 tcp smtp open Exim smtpd 4.92.3
7590158.69.13.254 53 tcp domain open unknown banner: get lost
7591158.69.13.254 53 udp domain open unknown banner: get lost
7592158.69.13.254 67 tcp dhcps filtered
7593158.69.13.254 67 udp dhcps unknown
7594158.69.13.254 68 tcp dhcpc filtered
7595158.69.13.254 68 udp dhcpc unknown
7596158.69.13.254 69 tcp tftp filtered
7597158.69.13.254 69 udp tftp unknown
7598158.69.13.254 80 tcp http open nginx
7599158.69.13.254 88 tcp kerberos-sec filtered
7600158.69.13.254 88 udp kerberos-sec unknown
7601158.69.13.254 123 tcp ntp filtered
7602158.69.13.254 123 udp ntp unknown
7603158.69.13.254 137 tcp netbios-ns filtered
7604158.69.13.254 137 udp netbios-ns unknown
7605158.69.13.254 138 tcp netbios-dgm filtered
7606158.69.13.254 138 udp netbios-dgm unknown
7607158.69.13.254 139 tcp netbios-ssn filtered
7608158.69.13.254 139 udp netbios-ssn unknown
7609158.69.13.254 161 tcp snmp filtered
7610158.69.13.254 161 udp snmp unknown
7611158.69.13.254 162 tcp snmptrap filtered
7612158.69.13.254 162 udp snmptrap unknown
7613158.69.13.254 389 tcp ldap filtered
7614158.69.13.254 389 udp ldap unknown
7615158.69.13.254 443 tcp ssl/http open nginx
7616158.69.13.254 465 tcp ssl/smtp open Exim smtpd 4.92.3
7617158.69.13.254 520 tcp efs filtered
7618158.69.13.254 520 udp route unknown
7619158.69.13.254 587 tcp smtp open Exim smtpd 4.92.3
7620158.69.13.254 2049 tcp nfs filtered
7621158.69.13.254 2049 udp nfs unknown
7622158.69.13.254 2525 tcp smtp open Exim smtpd 4.92.3
7623158.69.13.254 3306 tcp mysql open MySQL blocked - too many connection errors
7624162.244.35.13 22 tcp ssh open SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
7625162.244.35.13 25 tcp open
7626162.244.35.13 53 tcp domain open ISC BIND 9.10.6
7627162.244.35.13 53 udp domain open ISC BIND 9.10.6
7628162.244.35.13 67 tcp dhcps closed
7629162.244.35.13 67 udp dhcps closed
7630162.244.35.13 68 tcp dhcpc closed
7631162.244.35.13 68 udp dhcpc closed
7632162.244.35.13 69 tcp tftp closed
7633162.244.35.13 69 udp tftp closed
7634162.244.35.13 88 tcp kerberos-sec closed
7635162.244.35.13 88 udp kerberos-sec closed
7636162.244.35.13 123 tcp ntp closed
7637162.244.35.13 123 udp ntp closed
7638162.244.35.13 137 tcp netbios-ns filtered
7639162.244.35.13 137 udp netbios-ns unknown
7640162.244.35.13 138 tcp netbios-dgm filtered
7641162.244.35.13 138 udp netbios-dgm unknown
7642162.244.35.13 139 tcp netbios-ssn filtered
7643162.244.35.13 139 udp netbios-ssn unknown
7644162.244.35.13 161 tcp snmp closed
7645162.244.35.13 161 udp snmp closed
7646162.244.35.13 162 tcp snmptrap closed
7647162.244.35.13 162 udp snmptrap closed
7648162.244.35.13 389 tcp ldap closed
7649162.244.35.13 389 udp ldap closed
7650162.244.35.13 520 tcp efs closed
7651162.244.35.13 520 udp route closed
7652162.244.35.13 2049 tcp nfs closed
7653162.244.35.13 2049 udp nfs closed
7654163.247.48.46 53 tcp domain filtered
7655163.247.48.46 53 udp domain unknown
7656163.247.48.46 67 tcp dhcps filtered
7657163.247.48.46 67 udp dhcps unknown
7658163.247.48.46 68 tcp dhcpc filtered
7659163.247.48.46 68 udp dhcpc unknown
7660163.247.48.46 69 tcp tftp filtered
7661163.247.48.46 69 udp tftp unknown
7662163.247.48.46 88 tcp kerberos-sec filtered
7663163.247.48.46 88 udp kerberos-sec unknown
7664163.247.48.46 123 tcp ntp filtered
7665163.247.48.46 123 udp ntp unknown
7666163.247.48.46 137 tcp netbios-ns filtered
7667163.247.48.46 137 udp netbios-ns unknown
7668163.247.48.46 138 tcp netbios-dgm filtered
7669163.247.48.46 138 udp netbios-dgm unknown
7670163.247.48.46 139 tcp netbios-ssn filtered
7671163.247.48.46 139 udp netbios-ssn unknown
7672163.247.48.46 161 tcp snmp filtered
7673163.247.48.46 161 udp snmp unknown
7674163.247.48.46 162 tcp snmptrap filtered
7675163.247.48.46 162 udp snmptrap unknown
7676163.247.48.46 389 tcp ldap filtered
7677163.247.48.46 389 udp ldap unknown
7678163.247.48.46 520 tcp efs filtered
7679163.247.48.46 520 udp route unknown
7680163.247.48.46 2049 tcp nfs filtered
7681163.247.48.46 2049 udp nfs unknown
7682163.247.127.20 53 tcp domain filtered
7683163.247.127.20 53 udp domain unknown
7684163.247.127.20 67 tcp dhcps filtered
7685163.247.127.20 67 udp dhcps unknown
7686163.247.127.20 68 tcp dhcpc filtered
7687163.247.127.20 68 udp dhcpc unknown
7688163.247.127.20 69 tcp tftp filtered
7689163.247.127.20 69 udp tftp unknown
7690163.247.127.20 88 tcp kerberos-sec filtered
7691163.247.127.20 88 udp kerberos-sec unknown
7692163.247.127.20 123 tcp ntp filtered
7693163.247.127.20 123 udp ntp unknown
7694163.247.127.20 137 tcp netbios-ns filtered
7695163.247.127.20 137 udp netbios-ns unknown
7696163.247.127.20 138 tcp netbios-dgm filtered
7697163.247.127.20 138 udp netbios-dgm unknown
7698163.247.127.20 139 tcp netbios-ssn filtered
7699163.247.127.20 139 udp netbios-ssn unknown
7700163.247.127.20 161 tcp snmp filtered
7701163.247.127.20 161 udp snmp unknown
7702163.247.127.20 162 tcp snmptrap filtered
7703163.247.127.20 162 udp snmptrap unknown
7704163.247.127.20 389 tcp ldap filtered
7705163.247.127.20 389 udp ldap unknown
7706163.247.127.20 520 tcp efs filtered
7707163.247.127.20 520 udp route unknown
7708163.247.127.20 2049 tcp nfs filtered
7709163.247.127.20 2049 udp nfs unknown
7710163.247.130.114 53 tcp domain closed
7711163.247.130.114 53 udp domain unknown
7712163.247.130.114 67 tcp dhcps filtered
7713163.247.130.114 67 udp dhcps unknown
7714163.247.130.114 68 tcp dhcpc filtered
7715163.247.130.114 68 udp dhcpc unknown
7716163.247.130.114 69 tcp tftp filtered
7717163.247.130.114 69 udp tftp closed
7718163.247.130.114 88 tcp kerberos-sec filtered
7719163.247.130.114 88 udp kerberos-sec unknown
7720163.247.130.114 123 tcp ntp filtered
7721163.247.130.114 123 udp ntp unknown
7722163.247.130.114 137 tcp netbios-ns filtered
7723163.247.130.114 137 udp netbios-ns unknown
7724163.247.130.114 138 tcp netbios-dgm filtered
7725163.247.130.114 138 udp netbios-dgm unknown
7726163.247.130.114 139 tcp netbios-ssn filtered
7727163.247.130.114 139 udp netbios-ssn unknown
7728163.247.130.114 161 tcp snmp filtered
7729163.247.130.114 161 udp snmp open net-snmp; net-snmp SNMPv3 server
7730163.247.130.114 162 tcp snmptrap filtered
7731163.247.130.114 162 udp snmptrap unknown
7732163.247.130.114 389 tcp ldap filtered
7733163.247.130.114 389 udp ldap unknown
7734163.247.130.114 520 tcp efs filtered
7735163.247.130.114 520 udp route unknown
7736163.247.130.114 2049 tcp nfs filtered
7737163.247.130.114 2049 udp nfs unknown
7738163.247.175.176 53 tcp tcpwrapped open
7739163.247.175.176 53 udp domain unknown
7740163.247.175.176 67 tcp tcpwrapped open
7741163.247.175.176 67 udp dhcps unknown
7742163.247.175.176 68 tcp tcpwrapped open
7743163.247.175.176 68 udp dhcpc unknown
7744163.247.175.176 69 tcp tcpwrapped open
7745163.247.175.176 69 udp tftp unknown
7746163.247.175.176 88 tcp tcpwrapped open
7747163.247.175.176 88 udp kerberos-sec unknown
7748163.247.175.176 123 tcp tcpwrapped open
7749163.247.175.176 123 udp ntp unknown
7750163.247.175.176 137 tcp tcpwrapped open
7751163.247.175.176 137 udp netbios-ns unknown
7752163.247.175.176 138 tcp tcpwrapped open
7753163.247.175.176 138 udp netbios-dgm unknown
7754163.247.175.176 139 udp netbios-ssn unknown
7755163.247.175.176 161 tcp tcpwrapped open
7756163.247.175.176 161 udp snmp unknown
7757163.247.175.176 162 tcp tcpwrapped open
7758163.247.175.176 162 udp snmptrap unknown
7759163.247.175.176 389 tcp tcpwrapped open
7760163.247.175.176 389 udp ldap unknown
7761163.247.175.176 520 tcp tcpwrapped open
7762163.247.175.176 520 udp route unknown
7763163.247.175.176 2049 tcp tcpwrapped open
7764163.247.175.176 2049 udp nfs unknown
7765165.22.143.229 53 tcp domain closed
7766165.22.143.229 53 udp domain unknown
7767165.22.143.229 67 tcp dhcps closed
7768165.22.143.229 67 udp dhcps unknown
7769165.22.143.229 68 tcp dhcpc closed
7770165.22.143.229 68 udp dhcpc unknown
7771165.22.143.229 69 tcp tftp closed
7772165.22.143.229 69 udp tftp closed
7773165.22.143.229 88 tcp kerberos-sec closed
7774165.22.143.229 88 udp kerberos-sec unknown
7775165.22.143.229 123 tcp ntp closed
7776165.22.143.229 123 udp ntp open NTP v4 secondary server
7777165.22.143.229 137 tcp netbios-ns closed
7778165.22.143.229 137 udp netbios-ns closed
7779165.22.143.229 138 tcp netbios-dgm closed
7780165.22.143.229 138 udp netbios-dgm closed
7781165.22.143.229 139 tcp netbios-ssn closed
7782165.22.143.229 139 udp netbios-ssn unknown
7783165.22.143.229 161 tcp snmp closed
7784165.22.143.229 161 udp snmp closed
7785165.22.143.229 162 tcp snmptrap closed
7786165.22.143.229 162 udp snmptrap unknown
7787165.22.143.229 389 tcp ldap closed
7788165.22.143.229 389 udp ldap closed
7789165.22.143.229 520 tcp efs closed
7790165.22.143.229 520 udp route closed
7791165.22.143.229 2049 tcp nfs closed
7792165.22.143.229 2049 udp nfs closed
7793165.227.99.239 53 tcp domain filtered
7794165.227.99.239 53 udp domain unknown
7795165.227.99.239 67 tcp dhcps filtered
7796165.227.99.239 67 udp dhcps unknown
7797165.227.99.239 68 tcp dhcpc filtered
7798165.227.99.239 68 udp dhcpc unknown
7799165.227.99.239 69 tcp tftp filtered
7800165.227.99.239 69 udp tftp unknown
7801165.227.99.239 80 tcp http open nginx
7802165.227.99.239 88 tcp kerberos-sec filtered
7803165.227.99.239 88 udp kerberos-sec unknown
7804165.227.99.239 123 tcp ntp filtered
7805165.227.99.239 123 udp ntp unknown
7806165.227.99.239 137 tcp netbios-ns filtered
7807165.227.99.239 137 udp netbios-ns unknown
7808165.227.99.239 138 tcp netbios-dgm filtered
7809165.227.99.239 138 udp netbios-dgm unknown
7810165.227.99.239 139 tcp netbios-ssn filtered
7811165.227.99.239 139 udp netbios-ssn unknown
7812165.227.99.239 161 tcp snmp filtered
7813165.227.99.239 161 udp snmp open net-snmp; net-snmp SNMPv3 server
7814165.227.99.239 162 tcp snmptrap filtered
7815165.227.99.239 162 udp snmptrap closed
7816165.227.99.239 389 tcp ldap filtered
7817165.227.99.239 389 udp ldap unknown
7818165.227.99.239 443 tcp ssl/http open nginx
7819165.227.99.239 520 tcp efs filtered
7820165.227.99.239 520 udp route unknown
7821165.227.99.239 2049 tcp nfs filtered
7822165.227.99.239 2049 udp nfs unknown
7823169.239.218.20 25 tcp smtp closed
7824169.239.218.20 53 tcp domain filtered
7825169.239.218.20 53 udp domain unknown
7826169.239.218.20 67 tcp dhcps filtered
7827169.239.218.20 67 udp dhcps unknown
7828169.239.218.20 68 tcp dhcpc filtered
7829169.239.218.20 68 udp dhcpc unknown
7830169.239.218.20 69 tcp tftp filtered
7831169.239.218.20 69 udp tftp unknown
7832169.239.218.20 88 tcp kerberos-sec filtered
7833169.239.218.20 88 udp kerberos-sec unknown
7834169.239.218.20 113 tcp ident closed
7835169.239.218.20 123 tcp ntp filtered
7836169.239.218.20 123 udp ntp unknown
7837169.239.218.20 137 tcp netbios-ns filtered
7838169.239.218.20 137 udp netbios-ns filtered
7839169.239.218.20 138 tcp netbios-dgm filtered
7840169.239.218.20 138 udp netbios-dgm filtered
7841169.239.218.20 139 tcp netbios-ssn closed
7842169.239.218.20 139 udp netbios-ssn unknown
7843169.239.218.20 161 tcp snmp filtered
7844169.239.218.20 161 udp snmp unknown
7845169.239.218.20 162 tcp snmptrap filtered
7846169.239.218.20 162 udp snmptrap unknown
7847169.239.218.20 389 tcp ldap filtered
7848169.239.218.20 389 udp ldap unknown
7849169.239.218.20 445 tcp microsoft-ds closed
7850169.239.218.20 520 tcp efs filtered
7851169.239.218.20 520 udp route unknown
7852169.239.218.20 2049 tcp nfs filtered
7853169.239.218.20 2049 udp nfs unknown
7854169.239.218.20 8008 tcp tcpwrapped open
7855170.239.85.227 53 tcp domain closed
7856170.239.85.227 53 udp domain closed
7857170.239.85.227 67 tcp dhcps closed
7858170.239.85.227 67 udp dhcps unknown
7859170.239.85.227 68 tcp dhcpc closed
7860170.239.85.227 68 udp dhcpc closed
7861170.239.85.227 69 tcp tftp closed
7862170.239.85.227 69 udp tftp closed
7863170.239.85.227 88 tcp kerberos-sec closed
7864170.239.85.227 88 udp kerberos-sec unknown
7865170.239.85.227 123 tcp ntp closed
7866170.239.85.227 123 udp ntp closed
7867170.239.85.227 137 tcp netbios-ns closed
7868170.239.85.227 137 udp netbios-ns closed
7869170.239.85.227 138 tcp netbios-dgm closed
7870170.239.85.227 138 udp netbios-dgm unknown
7871170.239.85.227 139 tcp netbios-ssn closed
7872170.239.85.227 139 udp netbios-ssn closed
7873170.239.85.227 161 tcp snmp closed
7874170.239.85.227 161 udp snmp unknown
7875170.239.85.227 162 tcp snmptrap closed
7876170.239.85.227 162 udp snmptrap unknown
7877170.239.85.227 389 tcp ldap closed
7878170.239.85.227 389 udp ldap unknown
7879170.239.85.227 520 tcp efs closed
7880170.239.85.227 520 udp route unknown
7881170.239.85.227 2049 tcp nfs closed
7882170.239.85.227 2049 udp nfs closed
7883173.214.244.169 53 tcp domain filtered
7884173.214.244.169 53 udp domain unknown
7885173.214.244.169 67 tcp dhcps filtered
7886173.214.244.169 67 udp dhcps unknown
7887173.214.244.169 68 tcp dhcpc filtered
7888173.214.244.169 68 udp dhcpc unknown
7889173.214.244.169 69 tcp tftp filtered
7890173.214.244.169 69 udp tftp unknown
7891173.214.244.169 88 tcp kerberos-sec filtered
7892173.214.244.169 88 udp kerberos-sec unknown
7893173.214.244.169 123 tcp ntp filtered
7894173.214.244.169 123 udp ntp unknown
7895173.214.244.169 137 tcp netbios-ns filtered
7896173.214.244.169 137 udp netbios-ns unknown
7897173.214.244.169 138 tcp netbios-dgm filtered
7898173.214.244.169 138 udp netbios-dgm unknown
7899173.214.244.169 139 tcp netbios-ssn filtered
7900173.214.244.169 139 udp netbios-ssn unknown
7901173.214.244.169 161 tcp snmp filtered
7902173.214.244.169 161 udp snmp unknown
7903173.214.244.169 162 tcp snmptrap filtered
7904173.214.244.169 162 udp snmptrap unknown
7905173.214.244.169 389 tcp ldap filtered
7906173.214.244.169 389 udp ldap unknown
7907173.214.244.169 520 tcp efs filtered
7908173.214.244.169 520 udp route unknown
7909173.214.244.169 2049 tcp nfs filtered
7910173.214.244.169 2049 udp nfs unknown
7911174.142.53.51 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 13:59. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
7912174.142.53.51 22 tcp ssh open SSH-2.0-OpenSSH_7.4
7913174.142.53.51 25 tcp smtp closed
7914174.142.53.51 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
7915174.142.53.51 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
7916174.142.53.51 67 tcp dhcps filtered
7917174.142.53.51 67 udp dhcps unknown
7918174.142.53.51 68 tcp dhcpc filtered
7919174.142.53.51 68 udp dhcpc unknown
7920174.142.53.51 69 tcp tftp filtered
7921174.142.53.51 69 udp tftp unknown
7922174.142.53.51 88 tcp kerberos-sec filtered
7923174.142.53.51 88 udp kerberos-sec unknown
7924174.142.53.51 123 tcp ntp filtered
7925174.142.53.51 123 udp ntp unknown
7926174.142.53.51 137 tcp netbios-ns filtered
7927174.142.53.51 137 udp netbios-ns filtered
7928174.142.53.51 138 tcp netbios-dgm filtered
7929174.142.53.51 138 udp netbios-dgm filtered
7930174.142.53.51 139 tcp netbios-ssn closed
7931174.142.53.51 139 udp netbios-ssn unknown
7932174.142.53.51 161 tcp snmp filtered
7933174.142.53.51 161 udp snmp unknown
7934174.142.53.51 162 tcp snmptrap filtered
7935174.142.53.51 162 udp snmptrap unknown
7936174.142.53.51 389 tcp ldap filtered
7937174.142.53.51 389 udp ldap unknown
7938174.142.53.51 445 tcp microsoft-ds closed
7939174.142.53.51 520 tcp efs filtered
7940174.142.53.51 520 udp route unknown
7941174.142.53.51 2049 tcp nfs filtered
7942174.142.53.51 2049 udp nfs unknown
7943186.64.118.40 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 100 allowed.\x0d\x0a220-Local time is now 13:39. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 10 minutes of inactivity.\x0d\x0a
7944186.64.118.40 53 tcp domain filtered
7945186.64.118.40 53 udp domain closed
7946186.64.118.40 67 tcp dhcps filtered
7947186.64.118.40 67 udp dhcps unknown
7948186.64.118.40 68 tcp dhcpc filtered
7949186.64.118.40 68 udp dhcpc unknown
7950186.64.118.40 69 tcp tftp filtered
7951186.64.118.40 69 udp tftp unknown
7952186.64.118.40 88 tcp kerberos-sec filtered
7953186.64.118.40 88 udp kerberos-sec unknown
7954186.64.118.40 123 tcp ntp filtered
7955186.64.118.40 123 udp ntp unknown
7956186.64.118.40 137 tcp netbios-ns filtered
7957186.64.118.40 137 udp netbios-ns unknown
7958186.64.118.40 138 tcp netbios-dgm filtered
7959186.64.118.40 138 udp netbios-dgm unknown
7960186.64.118.40 139 tcp netbios-ssn filtered
7961186.64.118.40 139 udp netbios-ssn unknown
7962186.64.118.40 161 tcp snmp filtered
7963186.64.118.40 161 udp snmp unknown
7964186.64.118.40 162 tcp snmptrap filtered
7965186.64.118.40 162 udp snmptrap unknown
7966186.64.118.40 389 tcp ldap filtered
7967186.64.118.40 389 udp ldap unknown
7968186.64.118.40 520 tcp efs filtered
7969186.64.118.40 520 udp route unknown
7970186.64.118.40 2049 tcp nfs closed
7971186.64.118.40 2049 udp nfs unknown
7972190.98.209.37 53 tcp domain filtered
7973190.98.209.37 53 udp domain unknown
7974190.98.209.37 67 tcp dhcps filtered
7975190.98.209.37 67 udp dhcps unknown
7976190.98.209.37 68 tcp dhcpc filtered
7977190.98.209.37 68 udp dhcpc unknown
7978190.98.209.37 69 tcp tftp filtered
7979190.98.209.37 69 udp tftp unknown
7980190.98.209.37 88 tcp kerberos-sec filtered
7981190.98.209.37 88 udp kerberos-sec unknown
7982190.98.209.37 123 tcp ntp filtered
7983190.98.209.37 123 udp ntp unknown
7984190.98.209.37 137 tcp netbios-ns filtered
7985190.98.209.37 137 udp netbios-ns unknown
7986190.98.209.37 138 tcp netbios-dgm filtered
7987190.98.209.37 138 udp netbios-dgm unknown
7988190.98.209.37 139 tcp netbios-ssn filtered
7989190.98.209.37 139 udp netbios-ssn unknown
7990190.98.209.37 161 tcp snmp filtered
7991190.98.209.37 161 udp snmp unknown
7992190.98.209.37 162 tcp snmptrap filtered
7993190.98.209.37 162 udp snmptrap unknown
7994190.98.209.37 389 tcp ldap filtered
7995190.98.209.37 389 udp ldap unknown
7996190.98.209.37 520 tcp efs filtered
7997190.98.209.37 520 udp route unknown
7998190.98.209.37 2049 tcp nfs filtered
7999190.98.209.37 2049 udp nfs unknown
8000190.107.177.35 53 tcp domain filtered ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8001190.107.177.35 53 udp domain unknown ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8002190.107.177.35 67 tcp dhcps filtered
8003190.107.177.35 67 udp dhcps unknown
8004190.107.177.35 68 tcp dhcpc filtered
8005190.107.177.35 68 udp dhcpc unknown
8006190.107.177.35 69 tcp tftp filtered
8007190.107.177.35 69 udp tftp unknown
8008190.107.177.35 88 tcp kerberos-sec filtered
8009190.107.177.35 88 udp kerberos-sec unknown
8010190.107.177.35 123 tcp ntp filtered
8011190.107.177.35 123 udp ntp unknown
8012190.107.177.35 137 tcp netbios-ns filtered
8013190.107.177.35 137 udp netbios-ns unknown
8014190.107.177.35 138 tcp netbios-dgm filtered
8015190.107.177.35 138 udp netbios-dgm unknown
8016190.107.177.35 139 tcp netbios-ssn filtered
8017190.107.177.35 139 udp netbios-ssn unknown
8018190.107.177.35 161 tcp snmp filtered
8019190.107.177.35 161 udp snmp unknown
8020190.107.177.35 162 tcp snmptrap filtered
8021190.107.177.35 162 udp snmptrap unknown
8022190.107.177.35 389 tcp ldap filtered
8023190.107.177.35 389 udp ldap unknown
8024190.107.177.35 520 tcp efs filtered
8025190.107.177.35 520 udp route unknown
8026190.107.177.35 2049 tcp nfs filtered
8027190.107.177.35 2049 udp nfs unknown
8028190.110.121.175 53 tcp domain filtered
8029190.110.121.175 53 udp domain unknown
8030190.110.121.175 67 tcp dhcps filtered
8031190.110.121.175 67 udp dhcps unknown
8032190.110.121.175 68 tcp dhcpc filtered
8033190.110.121.175 68 udp dhcpc unknown
8034190.110.121.175 69 tcp tftp filtered
8035190.110.121.175 69 udp tftp unknown
8036190.110.121.175 88 tcp kerberos-sec filtered
8037190.110.121.175 88 udp kerberos-sec unknown
8038190.110.121.175 123 tcp ntp filtered
8039190.110.121.175 123 udp ntp unknown
8040190.110.121.175 137 tcp netbios-ns filtered
8041190.110.121.175 137 udp netbios-ns unknown
8042190.110.121.175 138 tcp netbios-dgm filtered
8043190.110.121.175 138 udp netbios-dgm unknown
8044190.110.121.175 139 tcp netbios-ssn filtered
8045190.110.121.175 139 udp netbios-ssn unknown
8046190.110.121.175 161 tcp snmp filtered
8047190.110.121.175 161 udp snmp unknown
8048190.110.121.175 162 tcp snmptrap filtered
8049190.110.121.175 162 udp snmptrap unknown
8050190.110.121.175 389 tcp ldap filtered
8051190.110.121.175 389 udp ldap unknown
8052190.110.121.175 520 tcp efs filtered
8053190.110.121.175 520 udp route unknown
8054190.110.121.175 2049 tcp nfs filtered
8055190.110.121.175 2049 udp nfs unknown
8056190.153.209.187 53 tcp domain filtered
8057190.153.209.187 53 udp domain unknown
8058190.153.209.187 67 tcp dhcps filtered
8059190.153.209.187 67 udp dhcps unknown
8060190.153.209.187 68 tcp dhcpc filtered
8061190.153.209.187 68 udp dhcpc unknown
8062190.153.209.187 69 tcp tftp filtered
8063190.153.209.187 69 udp tftp unknown
8064190.153.209.187 88 tcp kerberos-sec filtered
8065190.153.209.187 88 udp kerberos-sec unknown
8066190.153.209.187 123 tcp ntp filtered
8067190.153.209.187 123 udp ntp unknown
8068190.153.209.187 137 tcp netbios-ns filtered
8069190.153.209.187 137 udp netbios-ns unknown
8070190.153.209.187 138 tcp netbios-dgm filtered
8071190.153.209.187 138 udp netbios-dgm unknown
8072190.153.209.187 139 tcp netbios-ssn filtered
8073190.153.209.187 139 udp netbios-ssn unknown
8074190.153.209.187 161 tcp snmp filtered
8075190.153.209.187 161 udp snmp unknown
8076190.153.209.187 162 tcp snmptrap filtered
8077190.153.209.187 162 udp snmptrap unknown
8078190.153.209.187 389 tcp ldap filtered
8079190.153.209.187 389 udp ldap unknown
8080190.153.209.187 520 tcp efs filtered
8081190.153.209.187 520 udp route unknown
8082190.153.209.187 2049 tcp nfs filtered
8083190.153.209.187 2049 udp nfs unknown
8084190.153.219.254 22 tcp ssh open SSH-2.0-OpenSSH_7.4
8085190.153.219.254 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
8086190.153.219.254 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
8087190.153.219.254 67 tcp dhcps filtered
8088190.153.219.254 67 udp dhcps unknown
8089190.153.219.254 68 tcp dhcpc filtered
8090190.153.219.254 68 udp dhcpc unknown
8091190.153.219.254 69 tcp tftp filtered
8092190.153.219.254 69 udp tftp unknown
8093190.153.219.254 88 tcp kerberos-sec filtered
8094190.153.219.254 88 udp kerberos-sec unknown
8095190.153.219.254 123 tcp ntp filtered
8096190.153.219.254 123 udp ntp unknown
8097190.153.219.254 137 tcp netbios-ns filtered
8098190.153.219.254 137 udp netbios-ns unknown
8099190.153.219.254 138 tcp netbios-dgm filtered
8100190.153.219.254 138 udp netbios-dgm unknown
8101190.153.219.254 139 tcp netbios-ssn filtered
8102190.153.219.254 139 udp netbios-ssn unknown
8103190.153.219.254 161 tcp snmp filtered
8104190.153.219.254 161 udp snmp unknown
8105190.153.219.254 162 tcp snmptrap filtered
8106190.153.219.254 162 udp snmptrap unknown
8107190.153.219.254 389 tcp ldap filtered
8108190.153.219.254 389 udp ldap unknown
8109190.153.219.254 520 tcp efs filtered
8110190.153.219.254 520 udp route unknown
8111190.153.219.254 2049 tcp nfs filtered
8112190.153.219.254 2049 udp nfs unknown
8113192.185.134.58 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 2 of 150 allowed.\x0d\x0a220-Local time is now 22:31. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
8114192.185.134.58 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8115192.185.134.58 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8116192.185.134.58 67 tcp dhcps closed
8117192.185.134.58 67 udp dhcps unknown
8118192.185.134.58 68 tcp dhcpc closed
8119192.185.134.58 68 udp dhcpc unknown
8120192.185.134.58 69 tcp tftp closed
8121192.185.134.58 69 udp tftp closed
8122192.185.134.58 88 tcp kerberos-sec closed
8123192.185.134.58 88 udp kerberos-sec closed
8124192.185.134.58 123 tcp ntp closed
8125192.185.134.58 123 udp ntp unknown
8126192.185.134.58 137 tcp netbios-ns closed
8127192.185.134.58 137 udp netbios-ns closed
8128192.185.134.58 138 tcp netbios-dgm closed
8129192.185.134.58 138 udp netbios-dgm closed
8130192.185.134.58 139 tcp netbios-ssn closed
8131192.185.134.58 139 udp netbios-ssn closed
8132192.185.134.58 161 tcp snmp closed
8133192.185.134.58 161 udp snmp unknown
8134192.185.134.58 162 tcp snmptrap closed
8135192.185.134.58 162 udp snmptrap closed
8136192.185.134.58 389 tcp ldap closed
8137192.185.134.58 389 udp ldap unknown
8138192.185.134.58 520 tcp efs closed
8139192.185.134.58 520 udp route unknown
8140192.185.134.58 2049 tcp nfs closed
8141192.185.134.58 2049 udp nfs unknown
8142199.38.245.243 21 tcp ftp open Pure-FTPd
8143199.38.245.243 22 tcp ssh open OpenSSH 5.3 protocol 2.0
8144199.38.245.243 25 tcp smtp open Exim smtpd 4.92
8145199.38.245.243 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8146199.38.245.243 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8147199.38.245.243 67 tcp dhcps closed
8148199.38.245.243 67 udp dhcps unknown
8149199.38.245.243 68 tcp dhcpc closed
8150199.38.245.243 68 udp dhcpc unknown
8151199.38.245.243 69 tcp tftp closed
8152199.38.245.243 69 udp tftp unknown
8153199.38.245.243 80 tcp ssl/http open Apache/2
8154199.38.245.243 88 tcp kerberos-sec closed
8155199.38.245.243 88 udp kerberos-sec unknown
8156199.38.245.243 110 tcp pop3 open Dovecot DirectAdmin pop3d
8157199.38.245.243 123 tcp ntp closed
8158199.38.245.243 123 udp ntp unknown
8159199.38.245.243 137 tcp netbios-ns closed
8160199.38.245.243 137 udp netbios-ns unknown
8161199.38.245.243 138 tcp netbios-dgm closed
8162199.38.245.243 138 udp netbios-dgm unknown
8163199.38.245.243 139 tcp netbios-ssn closed
8164199.38.245.243 139 udp netbios-ssn unknown
8165199.38.245.243 143 tcp imap open Dovecot imapd
8166199.38.245.243 161 tcp snmp closed
8167199.38.245.243 161 udp snmp unknown
8168199.38.245.243 162 tcp snmptrap closed
8169199.38.245.243 162 udp snmptrap unknown
8170199.38.245.243 389 tcp ldap closed
8171199.38.245.243 389 udp ldap unknown
8172199.38.245.243 443 tcp ssl/ssl open Apache httpd SSL-only mode
8173199.38.245.243 465 tcp ssl/smtp open Exim smtpd 4.92
8174199.38.245.243 520 tcp efs closed
8175199.38.245.243 520 udp route unknown
8176199.38.245.243 587 tcp smtp open Exim smtpd 4.92
8177199.38.245.243 993 tcp ssl/imap open
8178199.38.245.243 995 tcp ssl/pop3 open Dovecot DirectAdmin pop3d
8179199.38.245.243 2049 tcp nfs closed
8180199.38.245.243 2049 udp nfs unknown
8181199.38.245.243 2222 tcp http open DirectAdmin httpd 1.57.1 Registered to Your Domain Goes Here, LLP
8182199.38.245.243 3306 tcp mysql open MySQL unauthorized
8183200.2.249.28 21 tcp ftp open vsftpd 3.0.2
8184200.2.249.28 53 udp domain unknown
8185200.2.249.28 67 udp dhcps unknown
8186200.2.249.28 68 udp dhcpc unknown
8187200.2.249.28 69 udp tftp unknown
8188200.2.249.28 80 tcp http open Oracle Application Server 10g httpd 10.1.3.5.0
8189200.2.249.28 88 udp kerberos-sec unknown
8190200.2.249.28 123 udp ntp unknown
8191200.2.249.28 137 udp netbios-ns unknown
8192200.2.249.28 138 udp netbios-dgm unknown
8193200.2.249.28 139 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
8194200.2.249.28 139 udp netbios-ssn unknown
8195200.2.249.28 161 udp snmp unknown
8196200.2.249.28 162 udp snmptrap unknown
8197200.2.249.28 389 udp ldap unknown
8198200.2.249.28 445 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
8199200.2.249.28 520 udp route unknown
8200200.2.249.28 2049 udp nfs unknown
8201200.10.251.82 53 tcp domain filtered
8202200.10.251.82 53 udp domain unknown
8203200.10.251.82 67 tcp dhcps filtered
8204200.10.251.82 67 udp dhcps unknown
8205200.10.251.82 68 tcp dhcpc filtered
8206200.10.251.82 68 udp dhcpc unknown
8207200.10.251.82 69 tcp tftp filtered
8208200.10.251.82 69 udp tftp unknown
8209200.10.251.82 88 tcp kerberos-sec filtered
8210200.10.251.82 88 udp kerberos-sec unknown
8211200.10.251.82 123 tcp ntp filtered
8212200.10.251.82 123 udp ntp unknown
8213200.10.251.82 137 tcp netbios-ns filtered
8214200.10.251.82 137 udp netbios-ns unknown
8215200.10.251.82 138 tcp netbios-dgm filtered
8216200.10.251.82 138 udp netbios-dgm unknown
8217200.10.251.82 139 tcp netbios-ssn filtered
8218200.10.251.82 139 udp netbios-ssn unknown
8219200.10.251.82 161 tcp snmp filtered
8220200.10.251.82 161 udp snmp unknown
8221200.10.251.82 162 tcp snmptrap filtered
8222200.10.251.82 162 udp snmptrap unknown
8223200.10.251.82 389 tcp ldap filtered
8224200.10.251.82 389 udp ldap unknown
8225200.10.251.82 520 tcp efs filtered
8226200.10.251.82 520 udp route unknown
8227200.10.251.82 2049 tcp nfs filtered
8228200.10.251.82 2049 udp nfs unknown
8229200.12.19.101 21 tcp ftp open 220 Microsoft FTP Service\x0d\x0a
8230200.12.19.101 53 tcp domain filtered
8231200.12.19.101 53 udp domain unknown
8232200.12.19.101 67 tcp dhcps filtered
8233200.12.19.101 67 udp dhcps closed
8234200.12.19.101 68 tcp dhcpc closed
8235200.12.19.101 68 udp dhcpc closed
8236200.12.19.101 69 tcp tftp closed
8237200.12.19.101 69 udp tftp closed
8238200.12.19.101 88 tcp kerberos-sec closed
8239200.12.19.101 88 udp kerberos-sec closed
8240200.12.19.101 123 tcp ntp filtered
8241200.12.19.101 123 udp ntp unknown
8242200.12.19.101 137 tcp netbios-ns closed
8243200.12.19.101 137 udp netbios-ns unknown
8244200.12.19.101 138 tcp netbios-dgm closed
8245200.12.19.101 138 udp netbios-dgm closed
8246200.12.19.101 139 tcp netbios-ssn closed
8247200.12.19.101 139 udp netbios-ssn closed
8248200.12.19.101 161 tcp snmp closed
8249200.12.19.101 161 udp snmp unknown
8250200.12.19.101 162 tcp snmptrap closed
8251200.12.19.101 162 udp snmptrap closed
8252200.12.19.101 389 tcp ldap closed
8253200.12.19.101 389 udp ldap unknown
8254200.12.19.101 520 tcp efs filtered
8255200.12.19.101 520 udp route unknown
8256200.12.19.101 2049 tcp nfs closed
8257200.12.19.101 2049 udp nfs unknown
8258200.29.0.33 53 tcp domain filtered
8259200.29.0.33 53 udp domain unknown
8260200.29.0.33 67 tcp dhcps filtered
8261200.29.0.33 67 udp dhcps unknown
8262200.29.0.33 68 tcp dhcpc filtered
8263200.29.0.33 68 udp dhcpc unknown
8264200.29.0.33 69 tcp tftp filtered
8265200.29.0.33 69 udp tftp unknown
8266200.29.0.33 88 tcp kerberos-sec filtered
8267200.29.0.33 88 udp kerberos-sec unknown
8268200.29.0.33 123 tcp ntp filtered
8269200.29.0.33 123 udp ntp unknown
8270200.29.0.33 137 tcp netbios-ns filtered
8271200.29.0.33 137 udp netbios-ns unknown
8272200.29.0.33 138 tcp netbios-dgm filtered
8273200.29.0.33 138 udp netbios-dgm unknown
8274200.29.0.33 139 tcp netbios-ssn filtered
8275200.29.0.33 139 udp netbios-ssn unknown
8276200.29.0.33 161 tcp snmp filtered
8277200.29.0.33 161 udp snmp unknown
8278200.29.0.33 162 tcp snmptrap filtered
8279200.29.0.33 162 udp snmptrap unknown
8280200.29.0.33 389 tcp ldap filtered
8281200.29.0.33 389 udp ldap unknown
8282200.29.0.33 520 tcp efs filtered
8283200.29.0.33 520 udp route unknown
8284200.29.0.33 2049 tcp nfs filtered
8285200.29.0.33 2049 udp nfs unknown
8286200.54.92.108 21 tcp ftp open 220 (vsFTPd 3.0.3)\x0d\x0a
8287200.54.92.108 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7
8288200.54.92.108 53 tcp domain closed
8289200.54.92.108 53 udp domain unknown
8290200.54.92.108 67 tcp dhcps closed
8291200.54.92.108 67 udp dhcps unknown
8292200.54.92.108 68 tcp dhcpc closed
8293200.54.92.108 68 udp dhcpc unknown
8294200.54.92.108 69 tcp tftp closed
8295200.54.92.108 69 udp tftp unknown
8296200.54.92.108 88 tcp kerberos-sec closed
8297200.54.92.108 88 udp kerberos-sec unknown
8298200.54.92.108 123 tcp ntp closed
8299200.54.92.108 123 udp ntp unknown
8300200.54.92.108 137 tcp netbios-ns closed
8301200.54.92.108 137 udp netbios-ns unknown
8302200.54.92.108 138 tcp netbios-dgm closed
8303200.54.92.108 138 udp netbios-dgm unknown
8304200.54.92.108 139 tcp netbios-ssn closed
8305200.54.92.108 139 udp netbios-ssn unknown
8306200.54.92.108 161 tcp snmp closed
8307200.54.92.108 161 udp snmp unknown
8308200.54.92.108 162 tcp snmptrap closed
8309200.54.92.108 162 udp snmptrap unknown
8310200.54.92.108 389 tcp ldap closed
8311200.54.92.108 389 udp ldap unknown
8312200.54.92.108 520 tcp efs closed
8313200.54.92.108 520 udp route unknown
8314200.54.92.108 2049 tcp nfs closed
8315200.54.92.108 2049 udp nfs unknown
8316200.54.230.247 21 tcp ftp open 220 ProFTPD Server (ProFTPD) [200.54.230.247]\x0d\x0a
8317200.54.230.247 22 tcp ssh open SSH-2.0-OpenSSH_7.4
8318200.54.230.247 53 tcp domain open unknown banner: none
8319200.54.230.247 53 udp domain open unknown banner: none
8320200.54.230.247 67 tcp dhcps filtered
8321200.54.230.247 67 udp dhcps unknown
8322200.54.230.247 68 tcp dhcpc filtered
8323200.54.230.247 68 udp dhcpc unknown
8324200.54.230.247 69 tcp tftp filtered
8325200.54.230.247 69 udp tftp unknown
8326200.54.230.247 88 tcp kerberos-sec filtered
8327200.54.230.247 88 udp kerberos-sec unknown
8328200.54.230.247 123 tcp ntp filtered
8329200.54.230.247 123 udp ntp unknown
8330200.54.230.247 137 tcp netbios-ns filtered
8331200.54.230.247 137 udp netbios-ns unknown
8332200.54.230.247 138 tcp netbios-dgm filtered
8333200.54.230.247 138 udp netbios-dgm unknown
8334200.54.230.247 139 tcp netbios-ssn filtered
8335200.54.230.247 139 udp netbios-ssn filtered
8336200.54.230.247 161 tcp snmp filtered
8337200.54.230.247 161 udp snmp unknown
8338200.54.230.247 162 tcp snmptrap filtered
8339200.54.230.247 162 udp snmptrap unknown
8340200.54.230.247 389 tcp ldap filtered
8341200.54.230.247 389 udp ldap filtered
8342200.54.230.247 520 tcp efs filtered
8343200.54.230.247 520 udp route filtered
8344200.54.230.247 2049 tcp nfs filtered
8345200.54.230.247 2049 udp nfs unknown
8346200.55.198.228 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-11.0nosystemd1
8347200.55.198.228 53 tcp domain open
8348200.55.198.228 53 udp domain open
8349200.55.198.228 67 tcp dhcps filtered
8350200.55.198.228 67 udp dhcps unknown
8351200.55.198.228 68 tcp dhcpc filtered
8352200.55.198.228 68 udp dhcpc unknown
8353200.55.198.228 69 tcp tftp filtered
8354200.55.198.228 69 udp tftp unknown
8355200.55.198.228 88 tcp kerberos-sec filtered
8356200.55.198.228 88 udp kerberos-sec unknown
8357200.55.198.228 123 tcp ntp filtered
8358200.55.198.228 123 udp ntp unknown
8359200.55.198.228 137 tcp netbios-ns filtered
8360200.55.198.228 137 udp netbios-ns unknown
8361200.55.198.228 138 tcp netbios-dgm filtered
8362200.55.198.228 138 udp netbios-dgm unknown
8363200.55.198.228 139 tcp netbios-ssn filtered
8364200.55.198.228 139 udp netbios-ssn unknown
8365200.55.198.228 161 tcp snmp filtered
8366200.55.198.228 161 udp snmp unknown
8367200.55.198.228 162 tcp snmptrap filtered
8368200.55.198.228 162 udp snmptrap unknown
8369200.55.198.228 389 tcp ldap filtered
8370200.55.198.228 389 udp ldap unknown
8371200.55.198.228 520 tcp efs filtered
8372200.55.198.228 520 udp route closed
8373200.55.198.228 2049 tcp nfs filtered
8374200.55.198.228 2049 udp nfs unknown
8375200.68.30.227 53 tcp domain closed
8376200.68.30.227 53 udp domain unknown
8377200.68.30.227 67 tcp dhcps closed
8378200.68.30.227 67 udp dhcps filtered
8379200.68.30.227 68 tcp dhcpc closed
8380200.68.30.227 68 udp dhcpc unknown
8381200.68.30.227 69 tcp tftp closed
8382200.68.30.227 69 udp tftp unknown
8383200.68.30.227 88 tcp kerberos-sec closed
8384200.68.30.227 88 udp kerberos-sec unknown
8385200.68.30.227 123 tcp ntp closed
8386200.68.30.227 123 udp ntp filtered
8387200.68.30.227 137 tcp netbios-ns closed
8388200.68.30.227 137 udp netbios-ns filtered
8389200.68.30.227 138 tcp netbios-dgm closed
8390200.68.30.227 138 udp netbios-dgm filtered
8391200.68.30.227 139 tcp netbios-ssn closed
8392200.68.30.227 139 udp netbios-ssn filtered
8393200.68.30.227 161 tcp snmp closed
8394200.68.30.227 161 udp snmp filtered
8395200.68.30.227 162 tcp snmptrap closed
8396200.68.30.227 162 udp snmptrap filtered
8397200.68.30.227 389 tcp ldap closed
8398200.68.30.227 389 udp ldap unknown
8399200.68.30.227 520 tcp efs closed
8400200.68.30.227 520 udp route filtered
8401200.68.30.227 2049 tcp nfs closed
8402200.68.30.227 2049 udp nfs filtered
8403200.68.34.99 53 tcp domain filtered
8404200.68.34.99 53 udp domain unknown
8405200.68.34.99 67 tcp dhcps filtered
8406200.68.34.99 67 udp dhcps unknown
8407200.68.34.99 68 tcp dhcpc filtered
8408200.68.34.99 68 udp dhcpc unknown
8409200.68.34.99 69 tcp tftp filtered
8410200.68.34.99 69 udp tftp unknown
8411200.68.34.99 88 tcp kerberos-sec filtered
8412200.68.34.99 88 udp kerberos-sec unknown
8413200.68.34.99 123 tcp ntp filtered
8414200.68.34.99 123 udp ntp unknown
8415200.68.34.99 137 tcp netbios-ns filtered
8416200.68.34.99 137 udp netbios-ns unknown
8417200.68.34.99 138 tcp netbios-dgm filtered
8418200.68.34.99 138 udp netbios-dgm unknown
8419200.68.34.99 139 tcp netbios-ssn filtered
8420200.68.34.99 139 udp netbios-ssn unknown
8421200.68.34.99 161 tcp snmp filtered
8422200.68.34.99 161 udp snmp unknown
8423200.68.34.99 162 tcp snmptrap filtered
8424200.68.34.99 162 udp snmptrap unknown
8425200.68.34.99 389 tcp ldap filtered
8426200.68.34.99 389 udp ldap unknown
8427200.68.34.99 520 tcp efs filtered
8428200.68.34.99 520 udp route unknown
8429200.68.34.99 2049 tcp nfs filtered
8430200.68.34.99 2049 udp nfs unknown
8431200.73.54.34 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8432200.73.54.34 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8433200.73.54.34 67 tcp dhcps filtered
8434200.73.54.34 67 udp dhcps unknown
8435200.73.54.34 68 tcp dhcpc filtered
8436200.73.54.34 68 udp dhcpc unknown
8437200.73.54.34 69 tcp tftp filtered
8438200.73.54.34 69 udp tftp unknown
8439200.73.54.34 88 tcp kerberos-sec filtered
8440200.73.54.34 88 udp kerberos-sec unknown
8441200.73.54.34 123 tcp ntp filtered
8442200.73.54.34 123 udp ntp unknown
8443200.73.54.34 137 tcp netbios-ns filtered
8444200.73.54.34 137 udp netbios-ns unknown
8445200.73.54.34 138 tcp netbios-dgm filtered
8446200.73.54.34 138 udp netbios-dgm unknown
8447200.73.54.34 139 tcp netbios-ssn filtered
8448200.73.54.34 139 udp netbios-ssn unknown
8449200.73.54.34 161 tcp snmp filtered
8450200.73.54.34 161 udp snmp unknown
8451200.73.54.34 162 tcp snmptrap filtered
8452200.73.54.34 162 udp snmptrap unknown
8453200.73.54.34 389 tcp ldap filtered
8454200.73.54.34 389 udp ldap unknown
8455200.73.54.34 520 tcp efs filtered
8456200.73.54.34 520 udp route unknown
8457200.73.54.34 2049 tcp nfs filtered
8458200.73.54.34 2049 udp nfs unknown
8459200.91.40.252 53 tcp domain filtered
8460200.91.40.252 53 udp domain unknown
8461200.91.40.252 67 tcp dhcps filtered
8462200.91.40.252 67 udp dhcps unknown
8463200.91.40.252 68 tcp dhcpc filtered
8464200.91.40.252 68 udp dhcpc unknown
8465200.91.40.252 69 tcp tftp filtered
8466200.91.40.252 69 udp tftp unknown
8467200.91.40.252 88 tcp kerberos-sec filtered
8468200.91.40.252 88 udp kerberos-sec unknown
8469200.91.40.252 123 tcp ntp filtered
8470200.91.40.252 123 udp ntp unknown
8471200.91.40.252 137 tcp netbios-ns filtered
8472200.91.40.252 137 udp netbios-ns unknown
8473200.91.40.252 138 tcp netbios-dgm filtered
8474200.91.40.252 138 udp netbios-dgm unknown
8475200.91.40.252 139 tcp netbios-ssn filtered
8476200.91.40.252 139 udp netbios-ssn unknown
8477200.91.40.252 161 tcp snmp filtered
8478200.91.40.252 161 udp snmp unknown
8479200.91.40.252 162 tcp snmptrap filtered
8480200.91.40.252 162 udp snmptrap unknown
8481200.91.40.252 389 tcp ldap filtered
8482200.91.40.252 389 udp ldap unknown
8483200.91.40.252 520 tcp efs filtered
8484200.91.40.252 520 udp route unknown
8485200.91.40.252 2049 tcp nfs filtered
8486200.91.40.252 2049 udp nfs unknown
8487200.91.41.5 53 tcp domain filtered
8488200.91.41.5 53 udp domain unknown
8489200.91.41.5 67 tcp dhcps filtered
8490200.91.41.5 67 udp dhcps unknown
8491200.91.41.5 68 tcp dhcpc filtered
8492200.91.41.5 68 udp dhcpc unknown
8493200.91.41.5 69 tcp tftp filtered
8494200.91.41.5 69 udp tftp unknown
8495200.91.41.5 88 tcp kerberos-sec filtered
8496200.91.41.5 88 udp kerberos-sec unknown
8497200.91.41.5 123 tcp ntp filtered
8498200.91.41.5 123 udp ntp unknown
8499200.91.41.5 137 tcp netbios-ns filtered
8500200.91.41.5 137 udp netbios-ns unknown
8501200.91.41.5 138 tcp netbios-dgm filtered
8502200.91.41.5 138 udp netbios-dgm unknown
8503200.91.41.5 139 tcp netbios-ssn filtered
8504200.91.41.5 139 udp netbios-ssn unknown
8505200.91.41.5 161 tcp snmp filtered
8506200.91.41.5 161 udp snmp unknown
8507200.91.41.5 162 tcp snmptrap filtered
8508200.91.41.5 162 udp snmptrap unknown
8509200.91.41.5 389 tcp ldap filtered
8510200.91.41.5 389 udp ldap unknown
8511200.91.41.5 520 tcp efs filtered
8512200.91.41.5 520 udp route unknown
8513200.91.41.5 2049 tcp nfs filtered
8514200.91.41.5 2049 udp nfs unknown
8515200.126.100.83 53 tcp domain filtered
8516200.126.100.83 53 udp domain unknown
8517200.126.100.83 67 tcp dhcps filtered
8518200.126.100.83 67 udp dhcps unknown
8519200.126.100.83 68 tcp dhcpc filtered
8520200.126.100.83 68 udp dhcpc unknown
8521200.126.100.83 69 tcp tftp filtered
8522200.126.100.83 69 udp tftp unknown
8523200.126.100.83 88 tcp kerberos-sec filtered
8524200.126.100.83 88 udp kerberos-sec unknown
8525200.126.100.83 123 tcp ntp filtered
8526200.126.100.83 123 udp ntp unknown
8527200.126.100.83 137 tcp netbios-ns filtered
8528200.126.100.83 137 udp netbios-ns unknown
8529200.126.100.83 138 tcp netbios-dgm filtered
8530200.126.100.83 138 udp netbios-dgm unknown
8531200.126.100.83 139 tcp netbios-ssn filtered
8532200.126.100.83 139 udp netbios-ssn unknown
8533200.126.100.83 161 tcp snmp filtered
8534200.126.100.83 161 udp snmp unknown
8535200.126.100.83 162 tcp snmptrap filtered
8536200.126.100.83 162 udp snmptrap unknown
8537200.126.100.83 389 tcp ldap filtered
8538200.126.100.83 389 udp ldap unknown
8539200.126.100.83 520 tcp efs filtered
8540200.126.100.83 520 udp route unknown
8541200.126.100.83 2049 tcp nfs filtered
8542200.126.100.83 2049 udp nfs unknown
8543201.159.170.136 53 tcp domain filtered
8544201.159.170.136 53 udp domain unknown
8545201.159.170.136 67 tcp dhcps filtered
8546201.159.170.136 67 udp dhcps unknown
8547201.159.170.136 68 tcp dhcpc filtered
8548201.159.170.136 68 udp dhcpc unknown
8549201.159.170.136 69 tcp tftp filtered
8550201.159.170.136 69 udp tftp unknown
8551201.159.170.136 88 tcp kerberos-sec filtered
8552201.159.170.136 88 udp kerberos-sec unknown
8553201.159.170.136 123 tcp ntp filtered
8554201.159.170.136 123 udp ntp unknown
8555201.159.170.136 137 tcp netbios-ns filtered
8556201.159.170.136 137 udp netbios-ns unknown
8557201.159.170.136 138 tcp netbios-dgm filtered
8558201.159.170.136 138 udp netbios-dgm unknown
8559201.159.170.136 139 tcp netbios-ssn filtered
8560201.159.170.136 139 udp netbios-ssn unknown
8561201.159.170.136 161 tcp snmp filtered
8562201.159.170.136 161 udp snmp unknown
8563201.159.170.136 162 tcp snmptrap filtered
8564201.159.170.136 162 udp snmptrap unknown
8565201.159.170.136 389 tcp ldap filtered
8566201.159.170.136 389 udp ldap unknown
8567201.159.170.136 520 tcp efs filtered
8568201.159.170.136 520 udp route unknown
8569201.159.170.136 2049 tcp nfs filtered
8570201.159.170.136 2049 udp nfs unknown
8571204.93.193.141 21 tcp ftp open Your connection to this server has been blocked.\x0d\x0a\x0d\x0aYou are most likely being blocked due to use of incorrect user/pass combination. Please, check all of your computers/devices to make sure that they are using the correct login credentials, including your email clients. You may also get blocked due to too many POP3/IMAP logins in 1 minute interval, please adjust your email client settings.\x0d\x0a
8572204.93.193.141 53 tcp domain filtered
8573204.93.193.141 53 udp domain unknown
8574204.93.193.141 67 tcp dhcps filtered
8575204.93.193.141 67 udp dhcps unknown
8576204.93.193.141 68 tcp dhcpc filtered
8577204.93.193.141 68 udp dhcpc unknown
8578204.93.193.141 69 tcp tftp filtered
8579204.93.193.141 69 udp tftp unknown
8580204.93.193.141 88 tcp kerberos-sec filtered
8581204.93.193.141 88 udp kerberos-sec unknown
8582204.93.193.141 123 tcp ntp filtered
8583204.93.193.141 123 udp ntp unknown
8584204.93.193.141 137 tcp netbios-ns filtered
8585204.93.193.141 137 udp netbios-ns unknown
8586204.93.193.141 138 tcp netbios-dgm filtered
8587204.93.193.141 138 udp netbios-dgm unknown
8588204.93.193.141 139 tcp netbios-ssn filtered
8589204.93.193.141 139 udp netbios-ssn unknown
8590204.93.193.141 161 tcp snmp filtered
8591204.93.193.141 161 udp snmp unknown
8592204.93.193.141 162 tcp snmptrap filtered
8593204.93.193.141 162 udp snmptrap unknown
8594204.93.193.141 389 tcp ldap filtered
8595204.93.193.141 389 udp ldap unknown
8596204.93.193.141 520 tcp efs filtered
8597204.93.193.141 520 udp route unknown
8598204.93.193.141 2049 tcp nfs filtered
8599204.93.193.141 2049 udp nfs unknown
8600206.48.140.40 53 tcp domain filtered
8601206.48.140.40 53 udp domain unknown
8602206.48.140.40 67 tcp dhcps filtered
8603206.48.140.40 67 udp dhcps unknown
8604206.48.140.40 68 tcp dhcpc filtered
8605206.48.140.40 68 udp dhcpc unknown
8606206.48.140.40 69 tcp tftp filtered
8607206.48.140.40 69 udp tftp unknown
8608206.48.140.40 88 tcp kerberos-sec filtered
8609206.48.140.40 88 udp kerberos-sec unknown
8610206.48.140.40 123 tcp ntp filtered
8611206.48.140.40 123 udp ntp unknown
8612206.48.140.40 137 tcp netbios-ns filtered
8613206.48.140.40 137 udp netbios-ns unknown
8614206.48.140.40 138 tcp netbios-dgm filtered
8615206.48.140.40 138 udp netbios-dgm unknown
8616206.48.140.40 139 tcp netbios-ssn filtered
8617206.48.140.40 139 udp netbios-ssn unknown
8618206.48.140.40 161 tcp snmp filtered
8619206.48.140.40 161 udp snmp unknown
8620206.48.140.40 162 tcp snmptrap filtered
8621206.48.140.40 162 udp snmptrap unknown
8622206.48.140.40 389 tcp ldap filtered
8623206.48.140.40 389 udp ldap unknown
8624206.48.140.40 520 tcp efs filtered
8625206.48.140.40 520 udp route unknown
8626206.48.140.40 2049 tcp nfs filtered
8627206.48.140.40 2049 udp nfs unknown
8628207.246.147.189 53 tcp domain filtered
8629207.246.147.189 53 udp domain unknown
8630207.246.147.189 67 tcp dhcps filtered
8631207.246.147.189 67 udp dhcps unknown
8632207.246.147.189 68 tcp dhcpc filtered
8633207.246.147.189 68 udp dhcpc unknown
8634207.246.147.189 69 tcp tftp filtered
8635207.246.147.189 69 udp tftp unknown
8636207.246.147.189 80 tcp http open nginx
8637207.246.147.189 88 tcp kerberos-sec filtered
8638207.246.147.189 88 udp kerberos-sec unknown
8639207.246.147.189 123 tcp ntp filtered
8640207.246.147.189 123 udp ntp unknown
8641207.246.147.189 137 tcp netbios-ns filtered
8642207.246.147.189 137 udp netbios-ns unknown
8643207.246.147.189 138 tcp netbios-dgm filtered
8644207.246.147.189 138 udp netbios-dgm unknown
8645207.246.147.189 139 tcp netbios-ssn filtered
8646207.246.147.189 139 udp netbios-ssn unknown
8647207.246.147.189 161 tcp snmp filtered
8648207.246.147.189 161 udp snmp unknown
8649207.246.147.189 162 tcp snmptrap filtered
8650207.246.147.189 162 udp snmptrap unknown
8651207.246.147.189 389 tcp ldap filtered
8652207.246.147.189 389 udp ldap unknown
8653207.246.147.189 443 tcp ssl/http open nginx
8654207.246.147.189 520 tcp efs filtered
8655207.246.147.189 520 udp route unknown
8656207.246.147.189 2049 tcp nfs filtered
8657207.246.147.189 2049 udp nfs unknown
8658207.246.147.190 53 tcp domain filtered
8659207.246.147.190 53 udp domain unknown
8660207.246.147.190 67 tcp dhcps filtered
8661207.246.147.190 67 udp dhcps unknown
8662207.246.147.190 68 tcp dhcpc filtered
8663207.246.147.190 68 udp dhcpc unknown
8664207.246.147.190 69 tcp tftp filtered
8665207.246.147.190 69 udp tftp unknown
8666207.246.147.190 80 tcp http open nginx
8667207.246.147.190 88 tcp kerberos-sec filtered
8668207.246.147.190 88 udp kerberos-sec unknown
8669207.246.147.190 123 tcp ntp filtered
8670207.246.147.190 123 udp ntp unknown
8671207.246.147.190 137 tcp netbios-ns filtered
8672207.246.147.190 137 udp netbios-ns unknown
8673207.246.147.190 138 tcp netbios-dgm filtered
8674207.246.147.190 138 udp netbios-dgm filtered
8675207.246.147.190 139 tcp netbios-ssn filtered
8676207.246.147.190 139 udp netbios-ssn unknown
8677207.246.147.190 161 tcp snmp filtered
8678207.246.147.190 161 udp snmp unknown
8679207.246.147.190 162 tcp snmptrap filtered
8680207.246.147.190 162 udp snmptrap unknown
8681207.246.147.190 389 tcp ldap filtered
8682207.246.147.190 389 udp ldap unknown
8683207.246.147.190 443 tcp ssl/http open nginx
8684207.246.147.190 520 tcp efs filtered
8685207.246.147.190 520 udp route unknown
8686207.246.147.190 2049 tcp nfs filtered
8687207.246.147.190 2049 udp nfs unknown
8688207.246.147.247 53 tcp domain filtered
8689207.246.147.247 53 udp domain filtered
8690207.246.147.247 67 tcp dhcps filtered
8691207.246.147.247 67 udp dhcps unknown
8692207.246.147.247 68 tcp dhcpc filtered
8693207.246.147.247 68 udp dhcpc unknown
8694207.246.147.247 69 tcp tftp filtered
8695207.246.147.247 69 udp tftp unknown
8696207.246.147.247 80 tcp http open nginx
8697207.246.147.247 88 tcp kerberos-sec filtered
8698207.246.147.247 88 udp kerberos-sec unknown
8699207.246.147.247 123 tcp ntp filtered
8700207.246.147.247 123 udp ntp unknown
8701207.246.147.247 137 tcp netbios-ns filtered
8702207.246.147.247 137 udp netbios-ns filtered
8703207.246.147.247 138 tcp netbios-dgm filtered
8704207.246.147.247 138 udp netbios-dgm unknown
8705207.246.147.247 139 tcp netbios-ssn filtered
8706207.246.147.247 139 udp netbios-ssn unknown
8707207.246.147.247 161 tcp snmp filtered
8708207.246.147.247 161 udp snmp unknown
8709207.246.147.247 162 tcp snmptrap filtered
8710207.246.147.247 162 udp snmptrap unknown
8711207.246.147.247 389 tcp ldap filtered
8712207.246.147.247 389 udp ldap unknown
8713207.246.147.247 443 tcp ssl/http open nginx
8714207.246.147.247 520 tcp efs filtered
8715207.246.147.247 520 udp route unknown
8716207.246.147.247 2049 tcp nfs filtered
8717207.246.147.247 2049 udp nfs unknown
8718207.246.147.248 53 tcp domain filtered
8719207.246.147.248 53 udp domain unknown
8720207.246.147.248 67 tcp dhcps filtered
8721207.246.147.248 67 udp dhcps unknown
8722207.246.147.248 68 tcp dhcpc filtered
8723207.246.147.248 68 udp dhcpc unknown
8724207.246.147.248 69 tcp tftp filtered
8725207.246.147.248 69 udp tftp unknown
8726207.246.147.248 80 tcp http open nginx
8727207.246.147.248 88 tcp kerberos-sec filtered
8728207.246.147.248 88 udp kerberos-sec unknown
8729207.246.147.248 123 tcp ntp filtered
8730207.246.147.248 123 udp ntp unknown
8731207.246.147.248 137 tcp netbios-ns filtered
8732207.246.147.248 137 udp netbios-ns unknown
8733207.246.147.248 138 tcp netbios-dgm filtered
8734207.246.147.248 138 udp netbios-dgm unknown
8735207.246.147.248 139 tcp netbios-ssn filtered
8736207.246.147.248 139 udp netbios-ssn unknown
8737207.246.147.248 161 tcp snmp filtered
8738207.246.147.248 161 udp snmp unknown
8739207.246.147.248 162 tcp snmptrap filtered
8740207.246.147.248 162 udp snmptrap unknown
8741207.246.147.248 389 tcp ldap filtered
8742207.246.147.248 389 udp ldap unknown
8743207.246.147.248 443 tcp ssl/http open nginx
8744207.246.147.248 520 tcp efs filtered
8745207.246.147.248 520 udp route unknown
8746207.246.147.248 2049 tcp nfs filtered
8747207.246.147.248 2049 udp nfs unknown
8748211.13.196.135 25 tcp smtp closed
8749211.13.196.135 53 tcp domain filtered
8750211.13.196.135 53 udp domain unknown
8751211.13.196.135 67 tcp dhcps filtered
8752211.13.196.135 67 udp dhcps unknown
8753211.13.196.135 68 tcp dhcpc filtered
8754211.13.196.135 68 udp dhcpc unknown
8755211.13.196.135 69 tcp tftp filtered
8756211.13.196.135 69 udp tftp unknown
8757211.13.196.135 80 tcp http open Apache httpd
8758211.13.196.135 88 tcp kerberos-sec filtered
8759211.13.196.135 88 udp kerberos-sec unknown
8760211.13.196.135 113 tcp ident closed
8761211.13.196.135 123 tcp ntp filtered
8762211.13.196.135 123 udp ntp unknown
8763211.13.196.135 137 tcp netbios-ns filtered
8764211.13.196.135 137 udp netbios-ns filtered
8765211.13.196.135 138 tcp netbios-dgm filtered
8766211.13.196.135 138 udp netbios-dgm filtered
8767211.13.196.135 139 tcp netbios-ssn closed
8768211.13.196.135 139 udp netbios-ssn unknown
8769211.13.196.135 161 tcp snmp filtered
8770211.13.196.135 161 udp snmp unknown
8771211.13.196.135 162 tcp snmptrap filtered
8772211.13.196.135 162 udp snmptrap unknown
8773211.13.196.135 389 tcp ldap filtered
8774211.13.196.135 389 udp ldap unknown
8775211.13.196.135 443 tcp ssl/http open Apache httpd
8776211.13.196.135 445 tcp microsoft-ds closed
8777211.13.196.135 520 tcp efs filtered
8778211.13.196.135 520 udp route unknown
8779211.13.196.135 2049 tcp nfs filtered
8780211.13.196.135 2049 udp nfs unknown
8781212.174.0.150 53 tcp domain filtered
8782212.174.0.150 53 udp domain unknown
8783212.174.0.150 67 tcp dhcps filtered
8784212.174.0.150 67 udp dhcps unknown
8785212.174.0.150 68 tcp dhcpc filtered
8786212.174.0.150 68 udp dhcpc unknown
8787212.174.0.150 69 tcp tftp filtered
8788212.174.0.150 69 udp tftp unknown
8789212.174.0.150 80 tcp http open Microsoft IIS httpd 8.5
8790212.174.0.150 88 tcp kerberos-sec filtered
8791212.174.0.150 88 udp kerberos-sec unknown
8792212.174.0.150 123 tcp ntp filtered
8793212.174.0.150 123 udp ntp unknown
8794212.174.0.150 137 tcp netbios-ns filtered
8795212.174.0.150 137 udp netbios-ns unknown
8796212.174.0.150 138 tcp netbios-dgm filtered
8797212.174.0.150 138 udp netbios-dgm unknown
8798212.174.0.150 139 tcp netbios-ssn filtered
8799212.174.0.150 139 udp netbios-ssn unknown
8800212.174.0.150 161 tcp snmp filtered
8801212.174.0.150 161 udp snmp unknown
8802212.174.0.150 162 tcp snmptrap filtered
8803212.174.0.150 162 udp snmptrap unknown
8804212.174.0.150 389 tcp ldap filtered
8805212.174.0.150 389 udp ldap unknown
8806212.174.0.150 520 tcp efs filtered
8807212.174.0.150 520 udp route unknown
8808212.174.0.150 2049 tcp nfs filtered
8809212.174.0.150 2049 udp nfs unknown
8810216.172.184.117 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 5 of 150 allowed.\x0d\x0a220-Local time is now 01:41. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
8811216.172.184.117 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8812216.172.184.117 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8813216.172.184.117 67 tcp dhcps closed
8814216.172.184.117 67 udp dhcps closed
8815216.172.184.117 68 tcp dhcpc closed
8816216.172.184.117 68 udp dhcpc unknown
8817216.172.184.117 69 tcp tftp closed
8818216.172.184.117 69 udp tftp unknown
8819216.172.184.117 88 tcp kerberos-sec closed
8820216.172.184.117 88 udp kerberos-sec unknown
8821216.172.184.117 123 tcp ntp closed
8822216.172.184.117 123 udp ntp unknown
8823216.172.184.117 137 tcp netbios-ns closed
8824216.172.184.117 137 udp netbios-ns unknown
8825216.172.184.117 138 tcp netbios-dgm closed
8826216.172.184.117 138 udp netbios-dgm closed
8827216.172.184.117 139 tcp netbios-ssn closed
8828216.172.184.117 139 udp netbios-ssn closed
8829216.172.184.117 161 tcp snmp closed
8830216.172.184.117 161 udp snmp unknown
8831216.172.184.117 162 tcp snmptrap closed
8832216.172.184.117 162 udp snmptrap closed
8833216.172.184.117 389 tcp ldap closed
8834216.172.184.117 389 udp ldap closed
8835216.172.184.117 520 tcp efs closed
8836216.172.184.117 520 udp route closed
8837216.172.184.117 2049 tcp nfs closed
8838216.172.184.117 2049 udp nfs unknown
8839218.45.5.97 25 tcp smtp closed
8840218.45.5.97 53 tcp domain filtered
8841218.45.5.97 53 udp domain unknown
8842218.45.5.97 67 tcp dhcps filtered
8843218.45.5.97 67 udp dhcps unknown
8844218.45.5.97 68 tcp dhcpc filtered
8845218.45.5.97 68 udp dhcpc unknown
8846218.45.5.97 69 tcp tftp filtered
8847218.45.5.97 69 udp tftp unknown
8848218.45.5.97 80 tcp http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
8849218.45.5.97 88 tcp kerberos-sec filtered
8850218.45.5.97 88 udp kerberos-sec unknown
8851218.45.5.97 113 tcp ident closed
8852218.45.5.97 123 tcp ntp filtered
8853218.45.5.97 123 udp ntp unknown
8854218.45.5.97 137 tcp netbios-ns filtered
8855218.45.5.97 137 udp netbios-ns filtered
8856218.45.5.97 138 tcp netbios-dgm filtered
8857218.45.5.97 138 udp netbios-dgm filtered
8858218.45.5.97 139 tcp netbios-ssn closed
8859218.45.5.97 139 udp netbios-ssn unknown
8860218.45.5.97 161 tcp snmp filtered
8861218.45.5.97 161 udp snmp unknown
8862218.45.5.97 162 tcp snmptrap filtered
8863218.45.5.97 162 udp snmptrap unknown
8864218.45.5.97 389 tcp ldap filtered
8865218.45.5.97 389 udp ldap unknown
8866218.45.5.97 443 tcp ssl/http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
8867218.45.5.97 445 tcp microsoft-ds closed
8868218.45.5.97 520 tcp efs filtered
8869218.45.5.97 520 udp route unknown
8870218.45.5.97 2049 tcp nfs filtered
8871218.45.5.97 2049 udp nfs unknown
8872#################################################################################################################################
8873Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-19 13:01 EDT
8874Nmap scan report for gesaguas.cl (170.239.85.227)
8875Host is up (0.39s latency).
8876Not shown: 996 closed ports
8877PORT STATE SERVICE VERSION
887880/tcp open http
8879| fingerprint-strings:
8880| DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, X11Probe:
8881| HTTP/1.1 400 Bad Request
8882| Connection: close
8883| FourOhFourRequest:
8884| HTTP/1.1 301 Moved Permanently
8885| Location: https://undefined/nice%20ports%2C/Tri%6Eity.txt%2ebak
8886| Date: Thu, 19 Mar 2020 17:01:50 GMT
8887| Connection: close
8888| GetRequest:
8889| HTTP/1.1 301 Moved Permanently
8890| Location: https://undefined/
8891| Date: Thu, 19 Mar 2020 17:01:47 GMT
8892| Connection: close
8893| HTTPOptions:
8894| HTTP/1.1 301 Moved Permanently
8895| Location: https://undefined/
8896| Date: Thu, 19 Mar 2020 17:01:48 GMT
8897|_ Connection: close
8898443/tcp open ssl/http Node.js Express framework
8899| vulscan: VulDB - https://vuldb.com:
8900| [105127] Express Web Framework up to 3.10/4.4 on Node.js 400 Level Response Content-Type Header cross site scripting
8901| [119217] protobufjs on Node.js proto File Regular Expression denial of service
8902| [119216] sshpk on Node.js Public Key Regular Expression denial of service
8903| [119105] mime Module on Node.js Regular Expression denial of service
8904| [119104] Debug Module on Node.js Regular Expression denial of service
8905| [119103] method-override on Node.js Regular Expression denial of service
8906| [119086] Fresh on Node.js Regular Expression Loop denial of service
8907| [119085] forwarded on Node.js Regular Expression Loop denial of service
8908| [119084] slug on Node.js Regular Expression Loop denial of service
8909| [119083] string on Node.js Regular Expression denial of service
8910| [119082] timespan on Node.js Regular Expression Loop denial of service
8911| [119081] marked on Node.js Regular Expression denial of service
8912| [119080] parsejson on Node.js Regular Expression denial of service
8913| [119079] Content module on Node.js Regular Expression denial of service
8914| [119067] no-case on Node.js Regular Expression Loop denial of service
8915| [119066] charset up to 1.0.0 on Node.js DHTTP_MAX_HEADER_SIZE Regular Expression denial of service
8916| [119055] ua-parser on Node.js Regular Expression denial of service
8917| [118919] Useragent up to 2.1.12 on Node.js Regular Expression Loop denial of service
8918| [118913] Decamelize 1.1.0/1.1.1 on Node.js Regular Expression denial of service
8919| [118440] galenframework-cli up to 2.3.0 on Node.js weak encryption
8920| [118425] Minimatch up to 3.0.1 on Node.js Regular Expression minimatch denial of service
8921| [118424] negotiator up to 0.6.0 on Node.js Regular Expression denial of service
8922| [118408] jshamcrest on Node.js Regular Expression denial of service
8923| [118407] jadedown on Node.js Regular Expression denial of service
8924| [118404] ansi2html on Node.js Regular Expression denial of service
8925| [117635] Spring Framework up to 4.3.16/5.0.5 STOMP Regular Expression denial of service
8926| [114051] Anton Myshenin aws-lambda-multipart-parser NPM Package up to 0.1.1 node.js Regular Expression denial of service
8927| [114050] Moment Module up to 2.19.2 on Node.js Regular Expression denial of service
8928| [114047] ssri Module up to 5.2.1 on Node.js Regular Expression Base64 String denial of service
8929| [107424] Tough-Cookie Module up to 2.3.2 on Node.js Regular Expression CPU Exhaustion denial of service
8930|
8931| MITRE CVE - https://cve.mitre.org:
8932| [CVE-2011-2730] VMware SpringSource Spring Framework before 2.5.6.SEC03, 2.5.7.SR023, and 3.x before 3.0.6, when a container supports Expression Language (EL), evaluates EL expressions in tags twice, which allows remote attackers to obtain sensitive information via a (1) name attribute in a (a) spring:hasBindErrors tag
8933| [CVE-2011-1484] jboss-seam.jar in the JBoss Seam 2 framework 2.2.x and earlier, as distributed in Red Hat JBoss Enterprise SOA Platform 4.3.0.CP04 and 5.1.0 and JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3.0.CP09 and 5.1.0, does not properly restrict use of Expression Language (EL) statements in FacesMessages during page exception handling, which allows remote attackers to execute arbitrary Java code via a crafted URL to an application.
8934| [CVE-2011-1271] The JIT compiler in Microsoft .NET Framework 3.5 Gold and SP1, 3.5.1, and 4.0, when IsJITOptimizerDisabled is false, does not properly handle expressions related to null strings, which allows context-dependent attackers to bypass intended access restrictions, and consequently execute arbitrary code, in opportunistic circumstances by leveraging a crafted application, as demonstrated by (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka ".NET Framework JIT Optimization Vulnerability."
8935| [CVE-2009-2504] Multiple integer overflows in unspecified APIs in GDI+ in Microsoft .NET Framework 1.1 SP1, .NET Framework 2.0 SP1 and SP2, Windows XP SP2 and SP3, Windows Server 2003 SP2, Vista Gold and SP1, Server 2008 Gold, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allow remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "GDI+ .NET API Vulnerability."
8936| [CVE-2006-7192] Microsoft ASP .NET Framework 2.0.50727.42 does not properly handle comment (/* */) enclosures, which allows remote attackers to bypass request filtering and conduct cross-site scripting (XSS) attacks, or cause a denial of service, as demonstrated via an xss:expression STYLE attribute in a closing XSS HTML tag.
8937| [CVE-2013-4946] Multiple cross-site scripting (XSS) vulnerabilities in BMC Service Desk Express (SDE) 10.2.1.95 allow remote attackers to inject arbitrary web script or HTML via the (1) SelTab parameter to QV_admin.aspx, the (2) CallBack parameter to QV_grid.aspx, or the (3) HelpPage parameter to commonhelp.aspx.
8938| [CVE-2013-4945] Multiple SQL injection vulnerabilities in BMC Service Desk Express (SDE) 10.2.1.95 allow remote attackers to execute arbitrary SQL commands via the (1) ASPSESSIONIDASSRATTQ, (2) TABLE_WIDGET_1, (3) TABLE_WIDGET_2, (4) browserDateTimeInfo, or (5) browserNumberInfo cookie parameter to DashBoardGUI.aspx
8939| [CVE-2013-4660] The JS-YAML module before 2.0.5 for Node.js parses input without properly considering the unsafe !!js/function tag, which allows remote attackers to execute arbitrary code via a crafted string that triggers an eval operation.
8940| [CVE-2013-3824] Unspecified vulnerability in the Oracle Agile Collaboration Framework component in Oracle Supply Chain Products Suite 9.3.1 allows remote authenticated users to affect integrity via unknown vectors related to Manufacturing/Mfg Parts.
8941| [CVE-2013-3823] Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Security.
8942| [CVE-2013-3822] Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.1 allows remote attackers to affect integrity via unknown vectors related to Web Client (CS).
8943| [CVE-2013-3791] Unspecified vulnerability in Enterprise Manager (EM) Base Platform 10.2.0.5 and EM DB Control 11.1.0.7 in Oracle Enterprise Manager Grid Control allows remote attackers to affect integrity via unknown vectors related to User Interface Framework.
8944| [CVE-2013-3753] Unspecified vulnerability in Oracle Solaris 11 allows remote attackers to affect availability via vectors related to Kernel/STREAMS framework.
8945| [CVE-2013-3444] The web framework in Cisco WAAS Software before 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1
8946| [CVE-2013-3443] The web service framework in Cisco WAAS Software 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1 in a Central Manager (CM) configuration allows remote attackers to execute arbitrary code via a crafted POST request, aka Bug ID CSCuh26626.
8947| [CVE-2013-3438] The web framework in the server in Cisco Unified MeetingPlace Web Conferencing allows remote attackers to bypass intended access restrictions and read unspecified web pages via crafted parameters, aka Bug ID CSCuh86385.
8948| [CVE-2013-3420] Cross-site request forgery (CSRF) vulnerability in the web framework on the Cisco Identity Services Engine (ISE) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuh25506.
8949| [CVE-2013-3416] Cross-site scripting (XSS) vulnerability in the web framework in the unified-communications management implementation in Cisco Unified Operations Manager and Unified Service Monitor allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug IDs CSCuh47574 and CSCuh95997.
8950| [CVE-2013-3398] The web framework in Cisco Prime Central for Hosted Collaboration Solution (HCS) Assurance provides different responses to requests for arbitrary pathnames depending on whether the pathname exists, which allows remote attackers to enumerate directories and files via a series of crafted requests, aka Bug ID CSCuh64574.
8951| [CVE-2013-3396] Cross-site scripting (XSS) vulnerability in the web framework in Cisco Content Security Management on Security Management Appliance (SMA) devices allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCuh24749.
8952| [CVE-2013-3395] Cross-site request forgery (CSRF) vulnerability in the web framework on Cisco IronPort Web Security Appliance (WSA) devices, Email Security Appliance (ESA) devices, and Content Security Management Appliance (SMA) devices allows remote attackers to hijack the authentication of arbitrary users, aka Bug IDs CSCuh70263, CSCuh70323, and CSCuh26634.
8953| [CVE-2013-3386] The IronPort Spam Quarantine (ISQ) component in the web framework in IronPort AsyncOS on Cisco Email Security Appliance devices before 7.1.5-106 and 7.3, 7.5, and 7.6 before 7.6.3-019 and Content Security Management Appliance devices before 7.9.1-102 and 8.0 before 8.0.0-404 allows remote attackers to cause a denial of service (service crash or hang) via a high rate of TCP connection attempts, aka Bug IDs CSCzv25573 and CSCzv81712.
8954| [CVE-2013-3385] The management GUI in the web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-602
8955| [CVE-2013-3384] The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550
8956| [CVE-2013-3383] The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL sent over IPv4, aka Bug ID CSCzv69294.
8957| [CVE-2013-3171] The serialization functionality in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 does not properly check the permissions of delegate objects, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a partial-trust relationship, aka "Delegate Serialization Vulnerability."
8958| [CVE-2013-3134] The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 on 64-bit platforms does not properly allocate arrays of structures, which allows remote attackers to execute arbitrary code via a crafted .NET Framework application that changes array data, aka "Array Allocation Vulnerability."
8959| [CVE-2013-3133] Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check the permissions of objects that use reflection, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "Anonymous Method Injection Vulnerability."
8960| [CVE-2013-3132] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check the permissions of objects that use reflection, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "Delegate Reflection Bypass Vulnerability."
8961| [CVE-2013-3131] Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5, and Silverlight 5 before 5.1.20513.0, does not properly prevent changes to data in multidimensional arrays of structures, which allows remote attackers to execute arbitrary code via (1) a crafted .NET Framework application or (2) a crafted Silverlight application, aka "Array Access Violation Vulnerability."
8962| [CVE-2013-3129] Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5
8963| [CVE-2013-2494] libdns in ISC DHCP 4.2.x before 4.2.5-P1 allows remote name servers to cause a denial of service (memory consumption) via vectors involving a regular expression, as demonstrated by a memory-exhaustion attack against a machine running a dhcpd process, a related issue to CVE-2013-2266.
8964| [CVE-2013-2398] Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Open UI Client.
8965| [CVE-2013-2266] libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
8966| [CVE-2013-2251] Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
8967| [CVE-2013-2165] ResourceBuilderImpl.java in the RichFaces 3.x through 5.x implementation in Red Hat JBoss Web Framework Kit before 2.3.0, Red Hat JBoss Web Platform through 5.2.0, Red Hat JBoss Enterprise Application Platform through 4.3.0 CP10 and 5.x through 5.2.0, Red Hat JBoss BRMS through 5.3.1, Red Hat JBoss SOA Platform through 4.3.0 CP05 and 5.x through 5.3.1, Red Hat JBoss Portal through 4.3 CP07 and 5.x through 5.2.2, and Red Hat JBoss Operations Network through 2.4.2 and 3.x through 3.1.2 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data.
8968| [CVE-2013-1842] SQL injection vulnerability in the Extbase Framework in TYPO3 4.5.x before 4.5.24, 4.6.x before 4.6.17, 4.7.x before 4.7.9, and 6.0.x before 6.0.3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, related to "the Query Object Model and relation values."
8969| [CVE-2013-1543] Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Open UI Client.
8970| [CVE-2013-1519] Unspecified vulnerability in the Application Express component in Oracle Database Server before 4.2.1 allows remote attackers to affect integrity via unknown vectors.
8971| [CVE-2013-1510] Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect confidentiality via unknown vectors related to Portal Framework.
8972| [CVE-2013-1337] Microsoft .NET Framework 4.5 does not properly create policy requirements for custom Windows Communication Foundation (WCF) endpoint authentication in certain situations involving passwords over HTTPS, which allows remote attackers to bypass authentication by sending queries to an endpoint, aka "Authentication Bypass Vulnerability."
8973| [CVE-2013-1336] The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check signatures, which allows remote attackers to make undetected changes to signed XML documents via unspecified vectors that preserve signature validity, aka "XML Digital Signature Spoofing Vulnerability."
8974| [CVE-2013-1242] Memory leak in the web framework in the server in Cisco Unified Presence (CUP) allows remote attackers to cause a denial of service (memory consumption) via malformed TCP packets, aka Bug ID CSCug38080.
8975| [CVE-2013-1227] Cross-site scripting (XSS) vulnerability in the web framework in Cisco Unified Communications Domain Manager allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCug37902.
8976| [CVE-2013-1214] The scripts editor in Cisco Unified Contact Center Express (aka Unified CCX) does not properly manage privileges for anonymous logins, which allows remote attackers to read arbitrary scripts by visiting the scripts repository directory, aka Bug ID CSCuf77546.
8977| [CVE-2013-1120] Multiple cross-site request forgery (CSRF) vulnerabilities on the Cisco Unity Express with software before 8.0 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors, aka Bug ID CSCue35910.
8978| [CVE-2013-1114] Multiple cross-site scripting (XSS) vulnerabilities in Cisco Unity Express before 8.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCud87527.
8979| [CVE-2013-1093] Open redirect vulnerability in the fwdToURL function in the ZCC login page in zcc-framework.jar in Novell ZENworks Configuration Management (ZCM) 11.2 before 11.2.3a Monthly Update 1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the directToPage parameter.
8980| [CVE-2013-0934] EMC RSA Archer 5.x before GRC 5.3SP1, and Archer Smart Suite Framework 4.x, allows remote authenticated users to bypass intended access restrictions and modify global reports via unspecified vectors.
8981| [CVE-2013-0933] Multiple cross-site scripting (XSS) vulnerabilities in EMC RSA Archer 5.x before GRC 5.3SP1, and Archer Smart Suite Framework 4.x, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
8982| [CVE-2013-0932] EMC RSA Archer 5.x before GRC 5.3SP1, and Archer Smart Suite Framework 4.x, allows remote authenticated users to bypass intended access restrictions and upload arbitrary files via unspecified vectors.
8983| [CVE-2013-0407] Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect availability via unknown vectors related to Kernel/DTrace Framework.
8984| [CVE-2013-0397] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.3 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Diagnostics.
8985| [CVE-2013-0390] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.3 allows remote authenticated users to affect integrity via unknown vectors related to Bookmarkable Pages.
8986| [CVE-2013-0381] Unspecified vulnerability in the Oracle CRM Technical Foundation component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.3 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Application Framework.
8987| [CVE-2013-0376] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to Diagnostics.
8988| [CVE-2013-0370] Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.1.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Security.
8989| [CVE-2013-0354] Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control EM Base Platform 10.2.0.5, and EM DB Control 11.1.0.7, 11.2.0.2, and 11.2.0.3, allows remote attackers to affect integrity via unknown vectors related to Policy Framework.
8990| [CVE-2013-0242] Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
8991| [CVE-2013-0073] The Windows Forms (aka WinForms) component in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly restrict the privileges of a callback function during object creation, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "WinForms Callback Elevation Vulnerability."
8992| [CVE-2013-0005] The WCF Replace function in the Open Data (aka OData) protocol implementation in Microsoft .NET Framework 3.5, 3.5 SP1, 3.5.1, and 4, and the Management OData IIS Extension on Windows Server 2012, allows remote attackers to cause a denial of service (resource consumption and daemon restart) via crafted values in HTTP requests, aka "Replace Denial of Service Vulnerability."
8993| [CVE-2013-0004] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly validate the permissions of objects in memory, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "Double Construction Vulnerability."
8994| [CVE-2013-0003] Buffer overflow in a System.DirectoryServices.Protocols (S.DS.P) namespace method in Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a missing array-size check during a memory copy operation, aka "S.DS.P Buffer Overflow Vulnerability."
8995| [CVE-2013-0002] Buffer overflow in the Windows Forms (aka WinForms) component in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages improper counting of objects during a memory copy operation, aka "WinForms Buffer Overflow Vulnerability."
8996| [CVE-2013-0001] The Windows Forms (aka WinForms) component in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 4, and 4.5 does not properly initialize memory arrays, which allows remote attackers to obtain sensitive information via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a pointer to an unmanaged memory location, aka "System Drawing Information Disclosure Vulnerability."
8997| [CVE-2012-6532] (1) Zend_Dom, (2) Zend_Feed, (3) Zend_Soap, and (4) Zend_XmlRpc in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 allow remote attackers to cause a denial of service (CPU consumption) via recursive or circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity Expansion (XEE) attack.
8998| [CVE-2012-6531] (1) Zend_Dom, (2) Zend_Feed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363.
8999| [CVE-2012-6528] Multiple cross-site scripting (XSS) vulnerabilities in ATutor before 2.1 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) themes/default/tile_search/index.tmpl.php, (2) login.php, (3) search.php, (4) password_reminder.php, (5) login.php/jscripts/infusion, (6) login.php/mods/_standard/flowplayer, (7) browse.php/jscripts/infusion/framework/fss, (8) registration.php/themes/default/ie_styles.css, (9) about.php, or (10) themes/default/social/basic_profile.tmpl.php.
9000| [CVE-2012-6109] lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.
9001| [CVE-2012-5795] The PayPal Express module in osCommerce does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
9002| [CVE-2012-5657] The (1) Zend_Feed_Rss and (2) Zend_Feed_Atom classes in Zend_Feed in Zend Framework 1.11.x before 1.11.15 and 1.12.x before 1.12.1 allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, and possibly cause a denial of service (CPU and memory consumption) via an XML External Entity (XXE) attack.
9003| [CVE-2012-5382] ** DISPUTED ** Untrusted search path vulnerability in the installation functionality in Zend Server 5.6.0 SP4, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the C:\Zend\ZendServer\share\ZendFramework\bin directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the choice of C:\ (and the resulting unsafe PATH) is established by an administrative action that is not a default part of the Zend Server installation.
9004| [CVE-2012-5223] The proc_deutf function in includes/functions_vbseocp_abstract.php in vBSEO 3.5.0, 3.5.1, 3.5.2, 3.6.0, and earlier allows remote attackers to insert and execute arbitrary PHP code via "complex curly syntax" in the char_repl parameter, which is inserted into a regular expression that is processed by the preg_replace function with the eval switch.
9005| [CVE-2012-5109] The International Components for Unicode (ICU) functionality in Google Chrome before 22.0.1229.92 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to a regular expression.
9006| [CVE-2012-5062] Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control EM Base Platform 10.2.0.5 and EM DB Control 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote attackers to affect integrity via unknown vectors related to User Interface Framework.
9007| [CVE-2012-4934] TomatoCart 1.1.7, when the PayPal Express Checkout module is enabled in sandbox mode, allows remote authenticated users to bypass intended payment requirements by modifying a certain redirection URL.
9008| [CVE-2012-4855] Unspecified vulnerability in the web services framework in IBM WebSphere Commerce 6.0 through 6.0.0.11 and 7.0 through 7.0.0.6 allows remote attackers to cause a denial of service (login outage) via unknown vectors.
9009| [CVE-2012-4832] Information Services Framework (ISF) in IBM InfoSphere Information Server 8.1, 8.5 before FP3, and 8.7 and InfoSphere Business Glossary 8.1.1 and 8.1.2 does not have an off autocomplete attribute for the password field on the login page, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.
9010| [CVE-2012-4816] IBM Rational Automation Framework (RAF) 3.x through 3.0.0.5 allows remote attackers to bypass intended Env Gen Wizard (aka Environment Generation Wizard) access restrictions by visiting context roots in HTTP sessions on port 8080.
9011| [CVE-2012-4777] The code-optimization feature in the reflection implementation in Microsoft .NET Framework 4 and 4.5 does not properly enforce object permissions, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka "WPF Reflection Optimization Vulnerability."
9012| [CVE-2012-4776] The Web Proxy Auto-Discovery (WPAD) functionality in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not validate configuration data that is returned during acquisition of proxy settings, which allows remote attackers to execute arbitrary JavaScript code by providing crafted data during execution of (1) an XAML browser application (aka XBAP) or (2) a .NET Framework application, aka "Web Proxy Auto-Discovery Vulnerability."
9013| [CVE-2012-4387] Apache Struts 2.0.0 through 2.3.4 allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression.
9014| [CVE-2012-4281] Multiple SQL injection vulnerabilities in Travelon Express 6.2.2 allow remote attackers to execute arbitrary SQL commands via the hid parameter to (1) holiday.php or (2) holiday_book.php, (3) id parameter to pages.php, (4) fid parameter to admin/airline-edit.php, or (5) cid parameter to admin/customer-edit.php.
9015| [CVE-2012-4028] Tridium Niagara AX Framework does not properly store credential data, which allows context-dependent attackers to bypass intended access restrictions by using the stored information for authentication.
9016| [CVE-2012-4027] Directory traversal vulnerability in Tridium Niagara AX Framework allows remote attackers to read files outside of the intended images, nav, and px folders by leveraging incorrect permissions, as demonstrated by reading the config.bog file.
9017| [CVE-2012-3551] Cross-site scripting (XSS) vulnerability in crowbar_framework/app/views/support/index.html.haml in the Crowbar barclamp in Crowbar, possibly 1.4 and earlier, allows remote attackers to inject arbitrary web script or HTML via the file parameter to /utils.
9018| [CVE-2012-3446] Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
9019| [CVE-2012-3363] Zend_XmlRpc in Zend Framework 1.x before 1.11.12 and 1.12.x before 1.12.0 does not properly handle SimpleXMLElement classes, which allows remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack.
9020| [CVE-2012-3298] Unspecified vulnerability in the REST services framework in IBM WebSphere Commerce 7.0 Feature Pack 4 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unspecified vectors.
9021| [CVE-2012-3230] Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Portal Framework.
9022| [CVE-2012-3229] Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Siebel Documentation.
9023| [CVE-2012-3200] Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.1.1 allows remote authenticated users to affect confidentiality, related to ROLESPRV.
9024| [CVE-2012-3162] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.3 allows local users to affect confidentiality, related to MDS loading.
9025| [CVE-2012-3161] Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.1.1 allows remote attackers to affect integrity via unknown vectors related to Web Client (CS).
9026| [CVE-2012-3154] Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.1.0 allows remote authenticated users to affect confidentiality, related to ATTACH.
9027| [CVE-2012-3025] The default configuration of Tridium Niagara AX Framework through 3.6 uses a cleartext base64 format for transmission of credentials in cookies, which allows remote attackers to obtain sensitive information by sniffing the network.
9028| [CVE-2012-3024] Tridium Niagara AX Framework through 3.6 uses predictable values for (1) session IDs and (2) keys, which might allow remote attackers to bypass authentication via a brute-force attack.
9029| [CVE-2012-2939] Multiple unrestricted file upload vulnerabilities in Travelon Express 6.2.2 allow remote authenticated users to execute arbitrary code by uploading a file with an executable extension using (1) airline-edit.php, (2) hotel-image-add.php, or (3) hotel-add.php.
9030| [CVE-2012-2938] Multiple cross-site scripting (XSS) vulnerabilities in Travelon Express 6.2.2 allow remote attackers to inject arbitrary web script or HTML via the holiday name field to (1) holiday_add.php or (2) holiday_view.php.
9031| [CVE-2012-2870] libxslt 1.1.26 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly manage memory, which might allow remote attackers to cause a denial of service (application crash) via a crafted XSLT expression that is not properly identified during XPath navigation, related to (1) the xsltCompileLocationPathPattern function in libxslt/pattern.c and (2) the xsltGenerateIdFunction function in libxslt/functions.c.
9032| [CVE-2012-2585] Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine ServiceDesk Plus 8.1 allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) a SCRIPT element, (2) a crafted Cascading Style Sheets (CSS) expression property, (3) a CSS expression property in the STYLE attribute of an arbitrary element, or (4) a crafted SRC attribute of an IFRAME element, or an e-mail message subject with (5) a SCRIPT element, (6) a CSS expression property in the STYLE attribute of an arbitrary element, (7) a crafted SRC attribute of an IFRAME element, (8) a crafted CONTENT attribute of an HTTP-EQUIV="refresh" META element, or (9) a data: URL in the CONTENT attribute of an HTTP-EQUIV="refresh" META element.
9033| [CVE-2012-2584] Multiple cross-site scripting (XSS) vulnerabilities in Alt-N MDaemon Free 12.5.4 allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) the Cascading Style Sheets (CSS) expression property in conjunction with a CSS comment within the STYLE attribute of an IMG element, (2) the CSS expression property in conjunction with multiple CSS comments within the STYLE attribute of an arbitrary element, or (3) an innerHTML attribute within an XML document.
9034| [CVE-2012-2582] Multiple cross-site scripting (XSS) vulnerabilities in Open Ticket Request System (OTRS) Help Desk 2.4.x before 2.4.13, 3.0.x before 3.0.15, and 3.1.x before 3.1.9, and OTRS ITSM 2.1.x before 2.1.5, 3.0.x before 3.0.6, and 3.1.x before 3.1.6, allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) a Cascading Style Sheets (CSS) expression property in the STYLE attribute of an arbitrary element or (2) UTF-7 text in an HTTP-EQUIV="CONTENT-TYPE" META element.
9035| [CVE-2012-2578] Multiple cross-site scripting (XSS) vulnerabilities in SmarterMail 9.2 allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) a JavaScript alert function used in conjunction with the fromCharCode method, (2) a SCRIPT element, (3) a Cascading Style Sheets (CSS) expression property in the STYLE attribute of an arbitrary element, or (4) an innerHTML attribute within an XML document.
9036| [CVE-2012-2573] Multiple cross-site scripting (XSS) vulnerabilities in T-dah WebMail 3.2.0-2.3 allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) a SCRIPT element, (2) a crafted Cascading Style Sheets (CSS) expression property, (3) a CSS expression property in the STYLE attribute of an arbitrary element, (4) an ONLOAD attribute of a BODY element, (5) a crafted SRC attribute of an IFRAME element, (6) a crafted CONTENT attribute of an HTTP-EQUIV="refresh" META element, or (7) a data: URL in the CONTENT attribute of an HTTP-EQUIV="refresh" META element.
9037| [CVE-2012-2571] Multiple cross-site scripting (XSS) vulnerabilities in WinWebMail Server 3.8.1.6 allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) a SCRIPT element, (2) a crafted Cascading Style Sheets (CSS) expression property, (3) a CSS expression property in the STYLE attribute of an arbitrary element, (4) a crafted SRC attribute of an IFRAME element, or (5) UTF-7 text in an HTTP-EQUIV="CONTENT-TYPE" META element.
9038| [CVE-2012-2519] Untrusted search path vulnerability in Entity Framework in ADO.NET in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, and 4 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .NET application, aka ".NET Framework Insecure Library Loading Vulnerability."
9039| [CVE-2012-2330] The Update method in src/node_http_parser.cc in Node.js before 0.6.17 and 0.7 before 0.7.8 does not properly check the length of a string, which allows remote attackers to obtain sensitive information (request header contents) and possibly spoof HTTP headers via a zero length string.
9040| [CVE-2012-2294] EMC RSA Archer SmartSuite Framework 4.x and RSA Archer GRC 5.x before 5.2SP1 allow remote attackers to conduct clickjacking attacks via a crafted web page.
9041| [CVE-2012-2293] Directory traversal vulnerability in EMC RSA Archer SmartSuite Framework 4.x and RSA Archer GRC 5.x before 5.2SP1 allows remote authenticated users to upload files, and consequently execute arbitrary code, via a relative path.
9042| [CVE-2012-2292] The Silverlight cross-domain policy in EMC RSA Archer SmartSuite Framework 4.x and RSA Archer GRC 5.x before 5.2SP1 does not restrict access to the Archer application, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
9043| [CVE-2012-1896] Microsoft .NET Framework 2.0 SP2 and 3.5.1 does not properly consider trust levels during construction of output data, which allows remote attackers to obtain sensitive information via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka "Code Access Security Info Disclosure Vulnerability."
9044| [CVE-2012-1895] The reflection implementation in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5.1, and 4 does not properly enforce object permissions, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka "Reflection Bypass Vulnerability."
9045| [CVE-2012-1855] Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly handle function pointers, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka ".NET Framework Memory Access Vulnerability."
9046| [CVE-2012-1761] Unspecified vulnerability in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect integrity via unknown vectors related to UI Framework.
9047| [CVE-2012-1760] Unspecified vulnerability in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect availability via unknown vectors related to UI Framework.
9048| [CVE-2012-1754] Unspecified vulnerability in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality via unknown vectors related to UI Framework.
9049| [CVE-2012-1742] Unspecified vulnerability in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect availability via unknown vectors related to UI Framework.
9050| [CVE-2012-1740] Unspecified vulnerability in the Oracle Application Express Listener component in Oracle Application Express Listener 1.1-ea, 1.1.1, 1.1.2, and 1.1.3 allows remote attackers to affect confidentiality via unknown vectors.
9051| [CVE-2012-1732] Unspecified vulnerability in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality via unknown vectors related to UI Framework.
9052| [CVE-2012-1728] Unspecified vulnerability in the Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Portal Framework.
9053| [CVE-2012-1708] Unspecified vulnerability in the Application Express component in Oracle Database Server 4.0 and 4.1 allows remote attackers to affect integrity via unknown vectors.
9054| [CVE-2012-1700] Unspecified vulnerability in the Siebel CRM component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Siebel UI Framework.
9055| [CVE-2012-1605] The Extbase Framework in TYPO3 4.6.x through 4.6.6, 4.7, and 6.0 unserializes untrusted data, which allows remote attackers to unserialize arbitrary objects and possibly execute arbitrary code via vectors related to "a missing signature (HMAC) for a request argument."
9056| [CVE-2012-1314] The WAAS Express feature in Cisco IOS 15.1 and 15.2 allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted transit traffic, aka Bug ID CSCtt45381.
9057| [CVE-2012-1247] Cross-site scripting (XSS) vulnerability in KENT-WEB WEB MART 1.7 and earlier, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML by leveraging support for Cascading Style Sheets (CSS) expressions.
9058| [CVE-2012-1064] Multiple cross-site scripting (XSS) vulnerabilities in EMC RSA Archer SmartSuite Framework 4.x and RSA Archer GRC 5.x before 5.2SP1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
9059| [CVE-2012-0936] Cross-site scripting (XSS) vulnerability in web/springframework/security/SecurityAuthenticationEventOnmsEventBuilder.java in OpenNMS 1.8.x before 1.8.17, 1.9.93 and earlier, and 1.10.x before 1.10.1 allows remote attackers to inject arbitrary web script or HTML via the Username field, related to login.
9060| [CVE-2012-0838] Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
9061| [CVE-2012-0712] The XML feature in IBM DB2 9.5 before FP9, 9.7 through FP5, and 9.8 through FP4 allows remote authenticated users to cause a denial of service (infinite loop) by calling the XMLPARSE function with a crafted string expression.
9062| [CVE-2012-0703] Open redirect vulnerability in Information Services Framework (ISF) in IBM InfoSphere Information Server 8.1, 8.5 before FP3, and 8.7 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
9063| [CVE-2012-0702] Information Services Framework (ISF) in IBM InfoSphere Information Server 8.1, 8.5 before FP3, and 8.7 does not properly determine authorization, which allows remote authenticated users to gain privileges via unspecified vectors.
9064| [CVE-2012-0662] Integer overflow in the Security Framework in Apple Mac OS X before 10.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted input.
9065| [CVE-2012-0656] Race condition in LoginUIFramework in Apple Mac OS X 10.7.x before 10.7.4, when the Guest account is enabled, allows physically proximate attackers to login to arbitrary accounts by entering the account name and no password.
9066| [CVE-2012-0528] Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, and 11.1.0.7, and Oracle Enterprise Manager Grid Control, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security Framework.
9067| [CVE-2012-0520] Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, and 11.2.0.2, and in Oracle Enterprise Manager Grid Control 10.2.0.5 and 11.1.0.1, allows remote attackers to affect integrity via unknown vectors related to Security Framework.
9068| [CVE-2012-0391] The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.
9069| [CVE-2012-0215] model/modelstorage.py in the Tryton application framework (trytond) before 2.4.0 for Python does not properly restrict access to the Many2Many field in the relation model, which allows remote authenticated users to modify the privileges of arbitrary users via a (1) create, (2) write, (3) delete, or (4) copy rpc call.
9070| [CVE-2012-0199] Multiple SQL injection vulnerabilities in IBM Tivoli Provisioning Manager Express for Software Distribution 4.1.1 allow remote attackers to execute arbitrary SQL commands via (1) a SOAP message to the Printer.getPrinterAgentKey function in the SoapServlet servlet, (2) the User.updateUserValue function in the register.do servlet, (3) the User.isExistingUser function in the logon.do servlet, (4) the Asset.getHWKey function in the CallHomeExec servlet, (5) the Asset.getMimeType function in the getAttachment (aka GetAttachmentServlet) servlet, (6) the addAsset.do servlet, or (7) a crafted EG2 file.
9071| [CVE-2012-0198] Stack-based buffer overflow in the RunAndUploadFile method in the Isig.isigCtl.1 ActiveX control in IBM Tivoli Provisioning Manager Express for Software Distribution 4.1.1 allows remote attackers to execute arbitrary code via vectors related to an Asset Information file.
9072| [CVE-2012-0164] Microsoft .NET Framework 4 does not properly compare index values, which allows remote attackers to cause a denial of service (application hang) via crafted requests to a Windows Presentation Foundation (WPF) application, aka ".NET Framework Index Comparison Vulnerability."
9073| [CVE-2012-0163] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly validate function parameters, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka ".NET Framework Parameter Validation Vulnerability."
9074| [CVE-2012-0162] Microsoft .NET Framework 4 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka ".NET Framework Buffer Allocation Vulnerability."
9075| [CVE-2012-0161] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5 SP1, 3.5.1, and 4 does not properly handle an unspecified exception during use of partially trusted assemblies to serialize input data, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka ".NET Framework Serialization Vulnerability."
9076| [CVE-2012-0160] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5 SP1, 3.5.1, and 4 does not properly serialize input data, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka ".NET Framework Serialization Vulnerability."
9077| [CVE-2012-0124] Unspecified vulnerability in HP Data Protector Express (aka DPX) 5.0.00 before build 59287 and 6.0.00 before build 11974 allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors.
9078| [CVE-2012-0123] Unspecified vulnerability in HP Data Protector Express (aka DPX) 5.0.00 before build 59287 and 6.0.00 before build 11974 allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors, aka ZDI-CAN-1498.
9079| [CVE-2012-0122] Unspecified vulnerability in HP Data Protector Express (aka DPX) 5.0.00 before build 59287 and 6.0.00 before build 11974 allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors, aka ZDI-CAN-1393.
9080| [CVE-2012-0121] Unspecified vulnerability in HP Data Protector Express (aka DPX) 5.0.00 before build 59287 and 6.0.00 before build 11974 allows remote attackers to execute arbitrary code or cause a denial of service via unknown vectors, aka ZDI-CAN-1392.
9081| [CVE-2012-0109] Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect confidentiality and availability, related to TCP/IP.
9082| [CVE-2012-0103] Unspecified vulnerability in Oracle Solaris 11 Express allows local users to affect availability via unknown vectors related to Kernel.
9083| [CVE-2012-0100] Unspecified vulnerability in Oracle Solaris 9, 10, and 11 Express allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Kerberos.
9084| [CVE-2012-0099] Unspecified vulnerability in Oracle Solaris 9, 10, and 11 Express allows remote attackers to affect availability via unknown vectors related to sshd.
9085| [CVE-2012-0098] Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability via unknown vectors related to Kernel.
9086| [CVE-2012-0097] Unspecified vulnerability in Oracle Solaris 11 Express allows local users to affect confidentiality via unknown vectors related to ksh93 Shell.
9087| [CVE-2012-0096] Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows remote attackers to affect availability via unknown vectors related to Network.
9088| [CVE-2012-0094] Unspecified vulnerability in Oracle Solaris 9, 10, and 11 Express allows remote attackers to affect availability, related to TCP/IP.
9089| [CVE-2012-0035] Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.
9090| [CVE-2012-0016] Untrusted search path vulnerability in Microsoft Expression Design
9091| [CVE-2012-0015] Microsoft .NET Framework 2.0 SP2 and 3.5.1 does not properly calculate the length of an unspecified buffer, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka ".NET Framework Heap Corruption Vulnerability."
9092| [CVE-2012-0014] Microsoft .NET Framework 2.0 SP2, 3.5.1, and 4, and Silverlight 4 before 4.1.10111, does not properly restrict access to memory associated with unmanaged objects, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, (3) a crafted .NET Framework application, or (4) a crafted Silverlight application, aka ".NET Framework Unmanaged Objects Vulnerability."
9093| [CVE-2011-5174] Buffer overflow in Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) in Intel Q67 Express, C202, C204, C206 Chipsets, and Mobile Intel QM67, and QS67 Chipset before 2nd_gen_i5_i7_SINIT_51.BIN Express
9094| [CVE-2011-5037] Google V8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, as demonstrated by attacks against Node.js.
9095| [CVE-2011-5021] PHPIDS before 0.7 does not properly implement Regular Expression Denial of Service (ReDoS) filters, which allows remote attackers to bypass rulesets and add PHP sequences to a file via unspecified vectors.
9096| [CVE-2011-4539] dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.
9097| [CVE-2011-4314] message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.
9098| [CVE-2011-4061] Multiple untrusted search path vulnerabilities in (1) db2rspgn and (2) kbbacf1 in IBM DB2 Express Edition 9.7, as used in the IBM Tivoli Monitoring for Databases: DB2 Agent, allow local users to gain privileges via a Trojan horse libkbb.so in the current working directory, related to the DT_RPATH ELF header.
9099| [CVE-2011-3979] Cross-site scripting (XSS) vulnerability in ztemp/view_compiled/Theme/theme_admin_setasdefault.php in the theme module in Zikula Application Framework 1.3.0 build 3168, 1.2.7, and probably other versions allows remote attackers to inject arbitrary web script or HTML via the themename parameter in the setasdefault action to index.php.
9100| [CVE-2011-3874] Stack-based buffer overflow in libsysutils in Android 2.2.x through 2.2.2 and 2.3.x through 2.3.6 allows user-assisted remote attackers to execute arbitrary code via an application that calls the FrameworkListener::dispatchCommand method with the wrong number of arguments, as demonstrated by zergRush to trigger a use-after-free error.
9101| [CVE-2011-3825] Zend Framework 1.11.3 in Zend Server CE 5.1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by Validate.php and certain other files.
9102| [CVE-2011-3734] Energine 2.3.8 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by core/framework/SimpleBuilder.class.php and certain other files.
9103| [CVE-2011-3543] Unspecified vulnerability in Oracle Solaris 11 Express allows remote attackers to affect availability, related to iSCSI DataMover (IDM).
9104| [CVE-2011-3542] Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows local users to affect availability via unknown vectors related to Kernel/Performance Counter BackEnd Module (pcbe).
9105| [CVE-2011-3539] Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows local users to affect availability via unknown vectors related to Zones.
9106| [CVE-2011-3537] Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability via unknown vectors related to Kernel/Filesystem.
9107| [CVE-2011-3535] Unspecified vulnerability in the Solaris component in Oracle Sun Products Suite 8, 9, 10, and 11 Express allows remote attackers to affect availability via unknown vectors related to Remote Quota Server (rquotad).
9108| [CVE-2011-3534] Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows remote attackers to affect availability via unknown vectors related to Network Status Monitor (statd).
9109| [CVE-2011-3525] Unspecified vulnerability in the Application Express component in Oracle Database Server 3.2 and 4.0 allows remote authenticated users to affect confidentiality, integrity, and availability, related to APEX developer user.
9110| [CVE-2011-3519] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 12.1.2 and 12.1.3 allows remote authenticated users to affect confidentiality, related to REST Services.
9111| [CVE-2011-3515] Unspecified vulnerability in the Oracle Solaris 10 and 11 Express allows local users to affect integrity and availability via unknown vectors related to Process File System (procfs).
9112| [CVE-2011-3508] Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows remote attackers to affect confidentiality, integrity, and availability, related to LDAP library.
9113| [CVE-2011-3417] The Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0, when sliding expiry is enabled, does not properly handle cached content, which allows remote attackers to obtain access to arbitrary user accounts via a crafted URL, aka "ASP.NET Forms Authentication Ticket Caching Vulnerability."
9114| [CVE-2011-3416] The Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 allows remote authenticated users to obtain access to arbitrary user accounts via a crafted username, aka "ASP.Net Forms Authentication Bypass Vulnerability."
9115| [CVE-2011-3415] Open redirect vulnerability in the Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted return URL, aka "Insecure Redirect in .NET Form Authentication Vulnerability."
9116| [CVE-2011-3414] The CaseInsensitiveHashProvider.getHashCode function in the HashTable implementation in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka "Collisions in HashTable May Cause DoS Vulnerability."
9117| [CVE-2011-3315] Directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049.
9118| [CVE-2011-3192] The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
9119| [CVE-2011-2998] Integer underflow in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via JavaScript code containing a large RegExp expression.
9120| [CVE-2011-2894] Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.
9121| [CVE-2011-2821] Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression.
9122| [CVE-2011-2728] The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
9123| [CVE-2011-2605] CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \n (newline) character, which is not properly handled in a JavaScript "document.cookie =" expression, a different vulnerability than CVE-2011-2374.
9124| [CVE-2011-2583] Cisco Unified Contact Center Express (aka CCX) 8.0 and 8.5 allows remote attackers to cause a denial of service via network traffic, as demonstrated by an SEC-BE-STABLE test case, aka Bug ID CSCth33834.
9125| [CVE-2011-2564] Unspecified vulnerability in the Service Advertisement Framework (SAF) in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 8.x before 8.5(1) and Cisco Intercompany Media Engine 8.x before 8.5(1) allows remote attackers to cause a denial of service (device reload) via crafted SAF packets, aka Bug ID CSCth19417.
9126| [CVE-2011-2563] Unspecified vulnerability in the Service Advertisement Framework (SAF) in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 8.x before 8.5(1) and Cisco Intercompany Media Engine 8.x before 8.5(1) allows remote attackers to cause a denial of service (device reload) via crafted SAF packets, aka Bug ID CSCth26669.
9127| [CVE-2011-2507] libraries/server_synchronize.lib.php in the Synchronize implementation in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 does not properly quote regular expressions, which allows remote authenticated users to inject a PCRE e (aka PREG_REPLACE_EVAL) modifier, and consequently execute arbitrary PHP code, by leveraging the ability to modify the SESSION superglobal array.
9128| [CVE-2011-2477] Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in Icinga before 1.4.1, when escape_html_tags is disabled, allow remote attackers to inject arbitrary web script or HTML via a JavaScript expression, as demonstrated by the onload attribute of a BODY element located after a check-host-alive! sequence, a different vulnerability than CVE-2011-2179.
9129| [CVE-2011-2330] Tivoli Endpoint in IBM Tivoli Management Framework 3.7.1, 4.1, 4.1.1, and 4.3.1 has an unspecified "built-in account" that is "trivially" accessed, which makes it easier for remote attackers to send requests to restricted pages via a session on TCP port 9495, a different vulnerability than CVE-2011-1220.
9130| [CVE-2011-2298] Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows remote attackers to affect availability, related to KSSL.
9131| [CVE-2011-2296] Unspecified vulnerability in Oracle Solaris 11 Express allows local users to affect availability, related to Kernel/SCTP.
9132| [CVE-2011-2295] Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability, related to Driver/USB.
9133| [CVE-2011-2294] Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows remote attackers to affect availability, related to SSH.
9134| [CVE-2011-2293] Unspecified vulnerability in Oracle Solaris 11 Express allows local users to affect availability via unknown vectors related to Zones.
9135| [CVE-2011-2292] Unspecified vulnerability in Oracle Solaris 9 and 11 Express allows local users to affect confidentiality and integrity via unknown vectors related to xscreensaver.
9136| [CVE-2011-2290] Unspecified vulnerability in Oracle Solaris 10, and 11 Express allows local users to affect availability via unknown vectors related to Kernel/sockfs.
9137| [CVE-2011-2287] Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows remote attackers to affect availability via unknown vectors related to fingerd.
9138| [CVE-2011-2286] Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows remote authenticated users to affect availability, related to ZFS.
9139| [CVE-2011-2259] Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability, related to UFS.
9140| [CVE-2011-2258] Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect confidentiality, integrity, and availability via unknown vectors related to rksh.
9141| [CVE-2011-2244] Unspecified vulnerability in the Security Framework component in Oracle Database Server 10.1.0.5, 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.1, and 11.2.0.2
9142| [CVE-2011-2196] jboss-seam.jar in the JBoss Seam 2 framework 2.2.x and earlier, as distributed in Red Hat JBoss Enterprise SOA Platform 4.3.0.CP05 and 5.1.0
9143| [CVE-2011-1978] Microsoft .NET Framework 2.0 SP2, 3.5.1, and 4 does not properly validate the System.Net.Sockets trust level, which allows remote attackers to obtain sensitive information or trigger arbitrary outbound network traffic via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Socket Restriction Bypass Vulnerability."
9144| [CVE-2011-1977] The ASP.NET Chart controls in Microsoft .NET Framework 4, and Chart Control for Microsoft .NET Framework 3.5 SP1, do not properly verify functions in URIs, which allows remote attackers to read arbitrary files via special characters in a URI in an HTTP request, aka "Chart Control Information Disclosure Vulnerability."
9145| [CVE-2011-1951] lib/logmatcher.c in Balabit syslog-ng before 3.2.4, when the global flag is set and when using PCRE 8.12 and possibly other versions, allows remote attackers to cause a denial of service (memory consumption) via a message that does not match a regular expression.
9146| [CVE-2011-1944] Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.
9147| [CVE-2011-1813] Google Chrome before 12.0.742.91 does not properly implement the framework for extensions, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."
9148| [CVE-2011-1781] SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding (aka backtracing).
9149| [CVE-2011-1769] SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access.
9150| [CVE-2011-1715] Directory traversal vulnerability in framework/source/resource/qx/test/part/delay.php in QooxDoo 1.3 and possibly other versions, as used in eyeOS 2.2 and 2.3, and possibly other products allows remote attackers to read arbitrary files via ..%2f (encoded dot dot) sequences in the file parameter.
9151| [CVE-2011-1714] Cross-site scripting (XSS) vulnerability in framework/source/resource/qx/test/jsonp_primitive.php in QooxDoo 1.3 and possibly other versions, as used in eyeOS 2.2 and 2.3, and possibly other products allows remote attackers to inject arbitrary web script or HTML via the callback parameter.
9152| [CVE-2011-1710] Multiple integer overflows in the HTTP server in the Novell XTier framework 3.1.8 allow remote attackers to cause a denial of service (service crash) or possibly execute arbitrary code via crafted header length variables.
9153| [CVE-2011-1367] Unspecified vulnerability in the File Load feature in IBM Rational AppScan Standard and Express 7.8.x, 7.9.x, and 8.0.x before 8.0.0.3 allows remote attackers to execute arbitrary commands via a crafted .scan file.
9154| [CVE-2011-1320] The Security component in IBM WebSphere Application Server (WAS) 6.1.0.x before 6.1.0.35 and 7.x before 7.0.0.15, when the Tivoli Integrated Portal / embedded WebSphere Application Server (TIP/eWAS) framework is used, does not properly delete AuthCache entries upon a logout, which might allow remote attackers to access the server by leveraging an unattended workstation.
9155| [CVE-2011-1285] The regular-expression functionality in Google Chrome before 10.0.648.127 does not properly implement reentrancy, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
9156| [CVE-2011-1253] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5.1, and 4, and Silverlight 4 before 4.0.60831, does not properly restrict inheritance, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, (3) a crafted .NET Framework application, or (4) a crafted Silverlight application, aka ".NET Framework Class Inheritance Vulnerability."
9157| [CVE-2011-1220] Stack-based buffer overflow in lcfd.exe in Tivoli Endpoint in IBM Tivoli Management Framework 3.7.1, 4.1, 4.1.1, and 4.3.1 allows remote authenticated users to execute arbitrary code via a long opts field.
9158| [CVE-2011-1056] The installer for Metasploit Framework 3.5.1, when running on Windows, uses weak inherited permissions for the Metasploit installation directory, which allows local users to gain privileges by replacing critical files with a Trojan horse.
9159| [CVE-2011-0848] Unspecified vulnerability in the Security Framework component in Oracle Database Server 10.1.0.5, 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.1, and 11.2.0.2
9160| [CVE-2011-0841] Unspecified vulnerability in Oracle Solaris 11 Express allows remote attackers to affect availability, related to TCP/IP.
9161| [CVE-2011-0839] Unspecified vulnerability in Oracle Solaris 9, 10, and 11 Express allows local users to affect availability, related to LOFS.
9162| [CVE-2011-0829] Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows local users to affect availability, related to Kernel/SPARC.
9163| [CVE-2011-0820] Unspecified vulnerability in Oracle Solaris 10, and 11 Express allows remote attackers to affect availability via unknown vectors related to Kernel.
9164| [CVE-2011-0813] Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability via unknown vectors related to Kernel.
9165| [CVE-2011-0812] Unspecified vulnerability in the Solaris component in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability via unknown vectors related to Kernel.
9166| [CVE-2011-0801] Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows local users to affect confidentiality and integrity via unknown vectors related to cp.
9167| [CVE-2011-0800] Unspecified vulnerability in the Solaris component in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Administration Utilities.
9168| [CVE-2011-0762] The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
9169| [CVE-2011-0664] Microsoft .NET Framework 2.0 SP1 and SP2, 3.5 Gold and SP1, 3.5.1, and 4.0, and Silverlight 4 before 4.0.60531.0, does not properly validate arguments to unspecified networking API functions, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, (3) a crafted .NET Framework application, or (4) a crafted Silverlight application, aka ".NET Framework Array Offset Vulnerability."
9170| [CVE-2011-0418] The glob implementation in Pure-FTPd before 1.0.32, and in libc in NetBSD 5.1, does not properly expand expressions containing curly brackets, which allows remote authenticated users to cause a denial of service (memory consumption) via a crafted FTP STAT command.
9171| [CVE-2011-0384] The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253.
9172| [CVE-2011-0383] The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008.
9173| [CVE-2011-0287] Unspecified vulnerability in the BlackBerry Administration API in Research In Motion (RIM) BlackBerry Enterprise Server (BES) software 5.0.1 through 5.0.3, and BlackBerry Enterprise Server Express software 5.0.1 through 5.0.3, allows remote attackers to read text files or cause a denial of service via unknown vectors.
9174| [CVE-2011-0286] Cross-site scripting (XSS) vulnerability in webdesktop/app in the BlackBerry Web Desktop Manager component in Research In Motion (RIM) BlackBerry Enterprise Server (BES) software before 5.0.2 MR5 and 5.0.3 before MR1, and BlackBerry Enterprise Server Express software 5.0.1 and 5.0.2, allows remote attackers to inject arbitrary web script or HTML via the displayErrorMessage parameter in a ManageDevices action.
9175| [CVE-2011-0201] Off-by-one error in the CoreFoundation framework in Apple Mac OS X before 10.6.8 allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a CFString object that triggers a buffer overflow.
9176| [CVE-2011-0063] The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.
9177| [CVE-2011-0006] The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM.
9178| [CVE-2011-0001] Double free vulnerability in the iscsi_rx_handler function (usr/iscsi/iscsid.c) in the tgt daemon (tgtd) in Linux SCSI target framework (tgt) before 1.0.14, aka scsi-target-utils, allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown vectors related to a buffer overflow during iscsi login. NOTE: some of these details are obtained from third party information.
9179| [CVE-2010-5143] McAfee VirusScan Enterprise before 8.8 allows local users to disable the product by leveraging administrative privileges to execute an unspecified Metasploit Framework module.
9180| [CVE-2010-5097] Cross-site scripting (XSS) vulnerability in the click enlarge functionality in TYPO3 4.3.x before 4.3.9 and 4.4.x before 4.4.5 when the caching framework is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
9181| [CVE-2010-4998] PHP remote file inclusion vulnerability in ardeaCore/lib/core/ardeaInit.php in ardeaCore PHP Framework 2.2 allows remote attackers to execute arbitrary PHP code via a URL in the pathForArdeaCore parameter. NOTE: some of these details are obtained from third party information.
9182| [CVE-2010-4756] The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.
9183| [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
9184| [CVE-2010-4754] The glob implementation in libc in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, and OpenBSD 4.7, and Libsystem in Apple Mac OS X before 10.6.8, allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.
9185| [CVE-2010-4687] STCAPP (aka the SCCP telephony control application) on Cisco IOS before 15.0(1)XA1 does not properly handle multiple calls to a shared line, which allows remote attackers to cause a denial of service (port hang) by simultaneously ending two calls that were controlled by CallManager Express (CME), aka Bug ID CSCtd42552.
9186| [CVE-2010-4686] CallManager Express (CME) on Cisco IOS before 15.0(1)XA1 does not properly handle SIP TRUNK traffic that contains rate bursts and a "peculiar" request size, which allows remote attackers to cause a denial of service (memory consumption) by sending this traffic over a long duration, aka Bug ID CSCtb47950.
9187| [CVE-2010-4589] Cross-site scripting (XSS) vulnerability in IBM ENOVIA 6 allows remote attackers to inject arbitrary web script or HTML via vectors related to the emxFramework.FilterParameterPattern property.
9188| [CVE-2010-4534] The administrative interface in django.contrib.admin in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not properly restrict use of the query string to perform certain object filtering, which allows remote authenticated users to obtain sensitive information via a series of requests containing regular expressions, as demonstrated by a created_by__password__regex parameter.
9189| [CVE-2010-4465] Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the lack of framework support by AWT event dispatch, and/or "clipboard access in Applets."
9190| [CVE-2010-4459] Unspecified vulnerability in Oracle Solaris 11 Express allows local users to affect availability via unknown vectors related to SCTP and Kernel/sockfs.
9191| [CVE-2010-4458] Unspecified vulnerability in Oracle Solaris 11 Express allows local users to affect availability, related to ZFS.
9192| [CVE-2010-4457] Unspecified vulnerability in Oracle Solaris 11 Express allows remote attackers to affect availability, related to SMB and CIFS.
9193| [CVE-2010-4456] Unspecified vulnerability in Oracle Sun Java System Communications Express 6.2 and 6.3 allows remote attackers to affect integrity via unknown vectors related to Web Mail.
9194| [CVE-2010-4446] Unspecified vulnerability in Oracle Solaris 11 Express allows local users to affect availability via unknown vectors related to RDS and Kernel/InfiniBand.
9195| [CVE-2010-4443] Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows local users to affect availability, related to Kernel/NFS.
9196| [CVE-2010-4442] Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows local users to affect availability via unknown vectors related to the Kernel.
9197| [CVE-2010-4440] Unspecified vulnerability in Oracle 10 and 11 Express allows local users to affect availability via unknown vectors related to the Kernel.
9198| [CVE-2010-4052] Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.
9199| [CVE-2010-4051] The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."
9200| [CVE-2010-4008] libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.
9201| [CVE-2010-3958] The x86 JIT compiler in Microsoft .NET Framework 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 does not properly compile function calls, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka ".NET Framework Stack Corruption Vulnerability."
9202| [CVE-2010-3835] MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table.
9203| [CVE-2010-3694] Cross-site request forgery (CSRF) vulnerability in the Horde Application Framework before 3.3.9 allows remote attackers to hijack the authentication of unspecified victims for requests to a preference form.
9204| [CVE-2010-3476] Open Ticket Request System (OTRS) 2.3.x before 2.3.6 and 2.4.x before 2.4.8 does not properly handle the matching of Perl regular expressions against HTML e-mail messages, which allows remote attackers to cause a denial of service (CPU consumption) via a large message, a different vulnerability than CVE-2010-2080.
9205| [CVE-2010-3332] Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka "ASP.NET Padding Oracle Vulnerability."
9206| [CVE-2010-3228] The JIT compiler in Microsoft .NET Framework 4.0 on 64-bit platforms does not properly perform optimizations, which allows remote attackers to execute arbitrary code via a crafted .NET application that triggers memory corruption, aka ".NET Framework x64 JIT Compiler Vulnerability."
9207| [CVE-2010-3077] Cross-site scripting (XSS) vulnerability in util/icon_browser.php in the Horde Application Framework before 3.3.9 allows remote attackers to inject arbitrary web script or HTML via the subdir parameter.
9208| [CVE-2010-3076] The filter function in php/src/include.php in Simple Management for BIND (aka smbind) before 0.4.8 does not anchor a certain regular expression, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via the username parameter to the admin login page.
9209| [CVE-2010-3008] Unspecified vulnerability in HP Data Protector Express, and Data Protector Express Single Server Edition (SSE), 3.x before build 56936 and 4.x before build 56906 on Windows allows local users to gain privileges or cause a denial of service via unknown vectors, a different vulnerability than CVE-2010-3007.
9210| [CVE-2010-3007] Unspecified vulnerability in HP Data Protector Express, and Data Protector Express Single Server Edition (SSE), 3.x before build 56936 and 4.x before build 56906 allows local users to gain privileges or cause a denial of service via unknown vectors.
9211| [CVE-2010-2632] Unspecified vulnerability in the FTP Server in Oracle Solaris 8, 9, 10, and 11 Express allows remote attackers to affect availability. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable researcher that this is an issue in the glob implementation in libc that allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames.
9212| [CVE-2010-2604] Multiple buffer overflows in the PDF Distiller in the BlackBerry Attachment Service component in Research In Motion (RIM) BlackBerry Enterprise Server 4.1.3 through 5.0.2, and Enterprise Server Express 5.0.1 and 5.0.2, allow remote attackers to execute arbitrary code via a crafted PDF file.
9213| [CVE-2010-2221] Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.
9214| [CVE-2010-2087] Oracle Mojarra 1.2_14 and 2.0.2, as used in IBM WebSphere Application Server, Caucho Resin, and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.
9215| [CVE-2010-2086] Apache MyFaces 1.1.7 and 1.2.8, as used in IBM WebSphere Application Server and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.
9216| [CVE-2010-1942] Unspecified vulnerability in the Servlet service in Fujitsu Limited Interstage Application Server 3.0 through 7.0, as used in Interstage Application Framework Suite, Interstage Business Application Server, and Interstage List Manager, allows attackers to obtain sensitive information or force invalid requests to be processed via unknown vectors related to unspecified invalid requests and settings on the load balancing device.
9217| [CVE-2010-1941] Unspecified vulnerability in NEC WebSAM DeploymentManager 5.13 and earlier, as used in SigmaSystemCenter 2.1 Update2 and earlier, BladeSystemCenter, ExpressSystemCenter, and VirtualPCCenter 2.2 and earlier, allows remote attackers to cause a denial of service (OS shutdown or restart) via unknown vectors related to Client Service for DPM and crafted packets to port 56010.
9218| [CVE-2010-1898] The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP1, 2.0 SP2, 3.5, 3.5 SP1, and 3.5.1, and Microsoft Silverlight 2 and 3 before 3.0.50611.0 on Windows and before 3.0.41130.0 on Mac OS X, does not properly handle interfaces and delegations to virtual methods, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft Silverlight and Microsoft .NET Framework CLR Virtual Method Delegate Vulnerability."
9219| [CVE-2010-1871] JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.
9220| [CVE-2010-1870] The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504.
9221| [CVE-2010-1804] Unspecified vulnerability in the network bridge functionality on the Apple Time Capsule, AirPort Extreme Base Station, and AirPort Express Base Station with firmware before 7.5.2 allows remote attackers to cause a denial of service (networking outage) via a crafted DHCP reply.
9222| [CVE-2010-1732] Cross-site request forgery (CSRF) vulnerability in the users module in Zikula Application Framework before 1.2.3 allows remote attackers to hijack the authentication of administrators for requests that change the administrator email address (updateemail action).
9223| [CVE-2010-1724] Multiple cross-site scripting (XSS) vulnerabilities in Zikula Application Framework 1.2.2, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) func parameter to index.php, or the (2) lang parameter to index.php, which is not properly handled by ZLanguage.php.
9224| [CVE-2010-1622] SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.
9225| [CVE-2010-1583] SQL injection vulnerability in the loadByKey function in the TznDbConnection class in tzn_mysql.php in Tirzen (aka TZN) Framework 1.5, as used in TaskFreak! before 0.6.3, allows remote attackers to execute arbitrary SQL commands via the username field in a login action.
9226| [CVE-2010-1571] Directory traversal vulnerability in the bootstrap service in Cisco Unified Contact Center Express (UCCX) 7.0 before 7.0(1)SR4 and 7.0(2), unspecified 6.0 versions, and 5.0 before 5.0(2)SR3 allows remote attackers to read arbitrary files via a crafted bootstrap message to TCP port 6295.
9227| [CVE-2010-1570] The computer telephony integration (CTI) server component in Cisco Unified Contact Center Express (UCCX) 7.0 before 7.0(1)SR4 and 7.0(2), 6.0 before 6.0(1)SR1, and 5.0 before 5.0(2)SR3 allows remote attackers to cause a denial of service (CTI server and Node Manager failure) via a malformed CTI message.
9228| [CVE-2010-1330] The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
9229| [CVE-2010-1227] Cross-site scripting (XSS) vulnerability in Sun Java System Communications Express 6.2 and 6.3 allows remote attackers to inject arbitrary web script or HTML via the subject field of a message, as demonstrated by a subject containing an IMG element with a SRC attribute that performs a cross-site request forgery (CSRF) attack involving the cmd and argv parameters to cmd.msc.
9230| [CVE-2010-1158] Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string.
9231| [CVE-2010-0962] The FTP proxy server in Apple AirPort Express, AirPort Extreme, and Time Capsule with firmware 7.5 does not restrict the IP address and port specified in a PORT command from a client, which allows remote attackers to leverage intranet FTP servers for arbitrary TCP forwarding via a crafted PORT command.
9232| [CVE-2010-0912] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.2 allows remote attackers to affect integrity via unknown vectors.
9233| [CVE-2010-0909] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.2 allows remote authenticated users to affect confidentiality via unknown vectors.
9234| [CVE-2010-0908] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 12.1.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
9235| [CVE-2010-0892] Unspecified vulnerability in the Application Express component in Oracle Database Server 3.2.0.00.27 allows remote attackers to affect integrity via unknown vectors.
9236| [CVE-2010-0885] Unspecified vulnerability in the Sun Java System Communications Express component in Oracle Sun Product Suite 6 2005Q4 (6.2) and and 6.3 allows remote authenticated users to affect confidentiality via unknown vectors related to Address Book.
9237| [CVE-2010-0816] Integer overflow in inetcomm.dll in Microsoft Outlook Express 5.5 SP2, 6, and 6 SP1
9238| [CVE-2010-0743] Multiple format string vulnerabilities in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) 1.0.3, 0.9.5, and earlier and (2) iSCSI Enterprise Target (aka iscsitarget) 0.4.16 allow remote attackers to cause a denial of service (tgtd daemon crash) or possibly have unspecified other impact via vectors that involve the isns_attr_query and qry_rsp_handle functions, and are related to (a) client appearance and (b) client disappearance messages.
9239| [CVE-2010-0600] Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 does not properly restrict network access to an unspecified configuration file, which allows remote attackers to read passwords and unspecified other account details via a (1) XML RPC or (2) XML RPC over HTTPS session, aka Bug ID CSCtb83512.
9240| [CVE-2010-0599] Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 does not encrypt XML RPC sessions from operator workstations, which allows remote attackers to discover Administrator credentials by sniffing the network, aka Bug ID CSCtb83505.
9241| [CVE-2010-0598] Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 does not encrypt HTTP sessions from operator workstations, which allows remote attackers to discover Administrator credentials by sniffing the network, aka Bug ID CSCtb83631.
9242| [CVE-2010-0597] Unspecified vulnerability in Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 allows remote authenticated users to read or modify the device configuration, and gain privileges or cause a denial of service (device reload), via a (1) XML RPC or (2) XML RPC over HTTPS request, aka Bug ID CSCtb83618.
9243| [CVE-2010-0596] Unspecified vulnerability in Cisco Mediator Framework 2.2 before 2.2.1.dev.1 and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 allows remote authenticated users to read or modify the device configuration, and gain privileges, via a (1) HTTP or (2) HTTPS request, aka Bug ID CSCtb83607.
9244| [CVE-2010-0595] Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 has a default password for the administrative user account and unspecified other accounts, which makes it easier for remote attackers to obtain privileged access, aka Bug ID CSCtb83495.
9245| [CVE-2010-0586] Cisco IOS 12.1 through 12.4, when Cisco Unified Communications Manager Express (CME) or Cisco Unified Survivable Remote Site Telephony (SRST) is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug ID CSCsz49741, the "SCCP Request Handling Denial of Service Vulnerability."
9246| [CVE-2010-0585] Cisco IOS 12.1 through 12.4, when Cisco Unified Communications Manager Express (CME) or Cisco Unified Survivable Remote Site Telephony (SRST) is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug ID CSCsz48614, the "SCCP Packet Processing Denial of Service Vulnerability."
9247| [CVE-2010-0557] IBM Cognos Express 9.0 allows attackers to obtain unspecified access to the Tomcat Manager component, and cause a denial of service, by leveraging hardcoded credentials.
9248| [CVE-2010-0132] Cross-site scripting (XSS) vulnerability in ViewVC 1.1 before 1.1.5 and 1.0 before 1.0.11, when the regular expression search functionality is enabled, allows remote attackers to inject arbitrary web script or HTML via vectors related to "search_re input," a different vulnerability than CVE-2010-0736.
9249| [CVE-2010-0076] Unspecified vulnerability in the Application Express Application Builder component in Oracle Database 3.2.1.00.10 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
9250| [CVE-2010-0039] The Application-Level Gateway (ALG) on the Apple Time Capsule, AirPort Extreme Base Station, and AirPort Express Base Station with firmware before 7.5.2 modifies PORT commands in incoming FTP traffic, which allows remote attackers to use the device's IP address for arbitrary intranet TCP traffic by leveraging write access to an intranet FTP server.
9251| [CVE-2010-0019] Microsoft Silverlight 3 before 3.0.50611.0 on Windows, and before 3.0.41130.0 on Mac OS X, does not properly handle pointers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and framework outage) via a crafted web site, aka "Microsoft Silverlight Memory Corruption Vulnerability."
9252| [CVE-2010-0007] net/bridge/netfilter/ebtables.c in the ebtables module in the netfilter framework in the Linux kernel before 2.6.33-rc4 does not require the CAP_NET_ADMIN capability for setting or modifying rules, which allows local users to bypass intended access restrictions and configure arbitrary network-traffic filtering via a modified ebtables application.
9253| [CVE-2009-5040] CallManager Express (CME) on Cisco IOS before 15.0(1)XA allows remote authenticated users to cause a denial of service (device crash) by using an extension mobility (EM) phone to interact with the menu for SNR number changes, aka Bug ID CSCta63555.
9254| [CVE-2009-4666] Multiple PHP remote file inclusion vulnerabilities in Webradev Download Protect 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[RootPath] parameter to (1) Framework/EmailTemplates.class.php, (2) Customers/PDPEmailReplaceConstants.class.php, and (3) Admin/ResellersManager.class.php in includes/DProtect/.
9255| [CVE-2009-4419] Intel Q35, GM45, PM45 Express, Q45, and Q43 Express chipsets in the SINIT Authenticated Code Module (ACM), which allows local users to bypass the Trusted Execution Technology protection mechanism and gain privileges by modifying the MCHBAR register to point to an attacker-controlled region, which prevents the SENTER instruction from properly applying VT-d protection while an MLE is being loaded.
9256| [CVE-2009-4417] The shutdown function in the Zend_Log_Writer_Mail class in Zend Framework (ZF) allows context-dependent attackers to send arbitrary e-mail messages to any recipient address via vectors related to "events not yet mailed."
9257| [CVE-2009-4363] Text_Filter/lib/Horde/Text/Filter/Xss.php in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 does not properly handle data: URIs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via data:text/html values for the HREF attribute of an A element in an HTML e-mail message. NOTE: the vendor states that the issue is caused by "an XSS vulnerability in Firefox browsers."
9258| [CVE-2009-4261] Multiple directory traversal vulnerabilities in the iallocator framework in Ganeti 1.2.4 through 1.2.8, 2.0.0 through 2.0.4, and 2.1.0 before 2.1.0~rc2 allow (1) remote attackers to execute arbitrary programs via a crafted external script name supplied through the HTTP remote API (RAPI) and allow (2) local users to execute arbitrary programs and gain privileges via a crafted external script name supplied through a gnt-* command, related to "path sanitization errors."
9259| [CVE-2009-3853] Stack-based buffer overflow in the client acceptor daemon (CAD) scheduler in the client in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.7, 5.4 before 5.4.3, 5.5 before 5.5.2.2, and 6.1 before 6.1.0.2, and TSM Express 5.3.3.0 through 5.3.6.6, allows remote attackers to execute arbitrary code via crafted data in a TCP packet.
9260| [CVE-2009-3701] Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) phpshell.php, (2) cmdshell.php, or (3) sqlshell.php in admin/, related to the PHP_SELF variable.
9261| [CVE-2009-3695] Algorithmic complexity vulnerability in the forms library in Django 1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a crafted (1) EmailField (email address) or (2) URLField (URL) that triggers a large amount of backtracking in a regular expression.
9262| [CVE-2009-3626] Perl 5.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a UTF-8 character with a large, invalid codepoint, which is not properly handled during a regular-expression match.
9263| [CVE-2009-3402] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.1 allows remote authenticated users to affect confidentiality via unknown vectors.
9264| [CVE-2009-3372] Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via a crafted regular expression in a Proxy Auto-configuration (PAC) file.
9265| [CVE-2009-3277] DataVault.Tesla/Impl/TypeSystem/AssociationHelper.cs in datavault allows context-dependent attackers to cause a denial of service (CPU consumption) via an input string composed of an [ (open bracket) followed by many commas, related to a certain regular expression, aka a "ReDoS" vulnerability.
9266| [CVE-2009-3276] Zoran/WinFormsAdvansed/RegeularDataToXML/Form1.cs in WinFormsAdvansed in NASD CORE.NET Terelik (aka corenet1) allows context-dependent attackers to cause a denial of service (CPU consumption) via an input string composed of many alphabetic characters followed by a ! (exclamation point), related to a certain regular expression, aka a "ReDoS" vulnerability.
9267| [CVE-2009-3275] Blocks/Common/Src/Configuration/Manageability/Adm/AdmContentBuilder.cs in Microsoft patterns & practices Enterprise Library (aka EntLib) allows context-dependent attackers to cause a denial of service (CPU consumption) via an input string composed of many \ (backslash) characters followed by a " (double quote), related to a certain regular expression, aka a "ReDoS" vulnerability.
9268| [CVE-2009-3237] Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5
9269| [CVE-2009-3236] The form library in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5
9270| [CVE-2009-3126] Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted PNG image file, aka "GDI+ PNG Integer Overflow Vulnerability."
9271| [CVE-2009-3033] Buffer overflow in the RunCmd method in the Altiris eXpress NS Console Utilities ActiveX control in AeXNSConsoleUtilities.dll in the web console in Symantec Altiris Deployment Solution 6.9.x, Altiris Notification Server 6.0.x, and Management Platform 7.0.x allows remote attackers to execute arbitrary code via a long string in the second argument.
9272| [CVE-2009-3031] Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument.
9273| [CVE-2009-3030] Cross-site scripting (XSS) vulnerability in Symantec SecurityExpressions Audit and Compliance Server 4.1.1, 4.1, and earlier allows remote attackers to inject arbitrary web script or HTML via vectors that trigger an error message in a response, related to an "HTML Injection issue."
9274| [CVE-2009-3029] Cross-site scripting (XSS) vulnerability in the console in Symantec SecurityExpressions Audit and Compliance Server 4.1.1, 4.1, and earlier allows remote authenticated users to inject arbitrary web script or HTML via "external client input" that triggers crafted error messages.
9275| [CVE-2009-3028] The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method.
9276| [CVE-2009-2911] SystemTap 1.0, when the --unprivileged option is used, does not properly restrict certain data sizes, which allows local users to (1) cause a denial of service or gain privileges via a print operation with a large number of arguments that trigger a kernel stack overflow, (2) cause a denial of service via crafted DWARF expressions that trigger a kernel stack frame overflow, or (3) cause a denial of service (infinite loop) via vectors that trigger creation of large unwind tables, related to Common Information Entry (CIE) and Call Frame Instruction (CFI) records.
9277| [CVE-2009-2873] Cisco IOS 12.0 through 12.4, when IP-based tunnels and the Cisco Express Forwarding feature are enabled, allows remote attackers to cause a denial of service (device reload) via malformed packets, aka Bug ID CSCsx70889.
9278| [CVE-2009-2872] Cisco IOS 12.0 through 12.4, when IP-based tunnels and the Cisco Express Forwarding feature are enabled, allows remote attackers to cause a denial of service (device reload) via a malformed packet that is not properly handled during switching from one tunnel to a second tunnel, aka Bug IDs CSCsh97579 and CSCsq31776.
9279| [CVE-2009-2865] Buffer overflow in the login implementation in the Extension Mobility feature in the Unified Communications Manager Express (CME) component in Cisco IOS 12.4XW, 12.4XY, 12.4XZ, and 12.4YA allows remote attackers to execute arbitrary code or cause a denial of service via crafted HTTP requests, aka Bug ID CSCsq58779.
9280| [CVE-2009-2625] XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
9281| [CVE-2009-2555] Heap-based buffer overflow in src/jsregexp.cc in Google V8 before 1.1.10.14, as used in Google Chrome before 2.0.172.37, allows remote attackers to execute arbitrary code in the Chrome sandbox via a crafted JavaScript regular expression.
9282| [CVE-2009-2503] GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Windows Server 2003 SP2, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 does not properly allocate an unspecified buffer, which allows remote attackers to execute arbitrary code via a crafted TIFF image file that triggers memory corruption, aka "GDI+ TIFF Memory Corruption Vulnerability."
9283| [CVE-2009-2502] Buffer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted TIFF image file, aka "GDI+ TIFF Buffer Overflow Vulnerability."
9284| [CVE-2009-2501] Heap-based buffer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted PNG image file, aka "GDI+ PNG Heap Overflow Vulnerability."
9285| [CVE-2009-2500] Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted WMF image file, aka "GDI+ WMF Integer Overflow Vulnerability."
9286| [CVE-2009-2497] The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0, 2.0 SP1, 2.0 SP2, 3.5, and 3.5 SP1, and Silverlight 2, does not properly handle interfaces, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted Silverlight application, (3) a crafted ASP.NET application, or (4) a crafted .NET Framework application, aka "Microsoft Silverlight and Microsoft .NET Framework CLR Vulnerability."
9287| [CVE-2009-2416] Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.
9288| [CVE-2009-2414] Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD, related to a function recursion, as demonstrated by the Codenomicon XML fuzzing framework.
9289| [CVE-2009-2404] Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
9290| [CVE-2009-2189] The ICMPv6 implementation on the Apple Time Capsule, AirPort Extreme Base Station, and AirPort Express Base Station with firmware before 7.5.2 does not limit the rate of (1) Router Advertisement and (2) Neighbor Discovery packets, which allows remote attackers to cause a denial of service (resource consumption and device restart) by sending many packets.
9291| [CVE-2009-2048] Cross-site scripting (XSS) vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to inject arbitrary web script or HTML into the CCX database via unspecified vectors.
9292| [CVE-2009-2047] Directory traversal vulnerability in the Administration interface in Cisco Customer Response Solutions (CRS) before 7.0(1) SR2 in Cisco Unified Contact Center Express (aka CCX) server allows remote authenticated users to read, modify, or delete arbitrary files via unspecified vectors.
9293| [CVE-2009-1993] Unspecified vulnerability in the Application Express component in Oracle Database 3.0.1 allows remote authenticated users to affect confidentiality and integrity, related to FLOWS_030000.WWV_EXECUTE_IMMEDIATE.
9294| [CVE-2009-1982] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2 and 12.0.6 allows remote attackers to affect integrity via unknown vectors.
9295| [CVE-2009-1896] The Java Web Start framework in IcedTea in OpenJDK before 1.6.0.0-20.b16.fc10 on Fedora 10, and before 1.6.0.0-27.b16.fc11 on Fedora 11, trusts an entire application when at least one of the listed jar files is trusted, which allows context-dependent attackers to execute arbitrary code without the untrusted-code restrictions via a crafted application, related to NetX.
9296| [CVE-2009-1885] Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.
9297| [CVE-2009-1879] Cross-site scripting (XSS) vulnerability in index.template.html in the express-install templates in the SDK in Adobe Flex before 3.4, when the installed Flash version is older than a specified requiredMajorVersion value, allows remote attackers to inject arbitrary web script or HTML via the query string.
9298| [CVE-2009-1729] Multiple cross-site scripting (XSS) vulnerabilities in Sun Java System Communications Express 6 2005Q4 (aka 6.2) and 6.3 allow remote attackers to inject arbitrary web script or HTML via (1) the abperson_displayName parameter to uwc/abs/search.xml in the Add Contact implementation in the Personal Address Book component or (2) the temporaryCalendars parameter to uwc/base/UWCMain.
9299| [CVE-2009-1635] Multiple cross-site scripting (XSS) vulnerabilities in the WebAccess component in Novell GroupWise 7.x before 7.03 HP3 and 8.x before 8.0 HP2 allow remote attackers to inject arbitrary web script or HTML via (1) the User.lang parameter to the login page (aka gw/webacc), (2) style expressions in a message that contains an HTML file, or (3) vectors associated with incorrect protection mechanisms against scripting, as demonstrated using whitespace between JavaScript event names and values.
9300| [CVE-2009-1536] ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows remote attackers to cause a denial of service (daemon outage) via a series of crafted HTTP requests, aka "Remote Unauthenticated Denial of Service in ASP.NET Vulnerability."
9301| [CVE-2009-1521] Unspecified vulnerability in the Java GUI in the IBM Tivoli Storage Manager (TSM) client 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.5, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17, and the TSM Express client 5.3.3.0 through 5.3.6.5, allows attackers to read or modify arbitrary files via unknown vectors.
9302| [CVE-2009-1275] Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttribute and (2) tiles:insertTemplate JSP tags.
9303| [CVE-2009-1219] Sun Calendar Express Web Server in Sun ONE Calendar Server 6.0 and Sun Java System Calendar Server 6 2004Q2 through 6.3-7.01 allows remote attackers to cause a denial of service (daemon crash) via multiple requests to the default URI with alphabetic characters in the tzid parameter.
9304| [CVE-2009-1218] Multiple cross-site scripting (XSS) vulnerabilities in Sun Calendar Express Web Server in Sun ONE Calendar Server 6.0 and Sun Java System Calendar Server 6 2004Q2 through 6.3-7.01 allow remote attackers to inject arbitrary web script or HTML via (1) the fmt-out parameter to login.wcap or (2) the date parameter to command.shtml.
9305| [CVE-2009-1190] Algorithmic complexity vulnerability in the java.util.regex.Pattern.compile method in Sun Java Development Kit (JDK) before 1.6, when used with spring.jar in SpringSource Spring Framework 1.1.0 through 2.5.6 and 3.0.0.M1 through 3.0.0.M2 and dm Server 1.0.0 through 1.0.2, allows remote attackers to cause a denial of service (CPU consumption) via serializable data with a long regex string containing multiple optional groups, a related issue to CVE-2004-2540.
9306| [CVE-2009-1070] Cross-site scripting (XSS) vulnerability in system/index.php in ExpressionEngine 1.6.4 through 1.6.6, and possibly earlier versions, allows remote attackers to inject arbitrary web script or HTML via the avatar parameter.
9307| [CVE-2009-1000] The Oracle Applications Framework component in Oracle E-Business Suite 12.0.6 and 11i10CU2 uses default passwords for unspecified "FND Applications Users (not DB users)," which has unknown impact and attack vectors.
9308| [CVE-2009-0995] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 12.0.6 and 11i10CU2 allows remote attackers to affect integrity via unknown vectors.
9309| [CVE-2009-0981] Unspecified vulnerability in the Application Express component in Oracle Database 11.1.0.7 allows remote authenticated users to affect confidentiality, related to APEX. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on reliable researcher claims that this issue allows remote authenticated users to obtain APEX password hashes from the WWV_FLOW_USERS table via a SELECT statement.
9310| [CVE-2009-0932] Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
9311| [CVE-2009-0877] Multiple cross-site scripting (XSS) vulnerabilities in Sun Java System Communications Express allow remote attackers to inject arbitrary web script or HTML via the (1) Full Name or (2) Subject field.
9312| [CVE-2009-0819] sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via "an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML()," which triggers an assertion failure.
9313| [CVE-2009-0714] Unspecified vulnerability in the dpwinsup module (dpwinsup.dll) for dpwingad (dpwingad.exe) in HP Data Protector Express and Express SSE 3.x before build 47065, and Express and Express SSE 4.x before build 46537, allows remote attackers cause a denial of service (application crash) or read portions of memory via one or more crafted packets.
9314| [CVE-2009-0630] The (1) Cisco Unified Communications Manager Express
9315| [CVE-2009-0419] Microsoft XML Core Services, as used in Microsoft Expression Web, Office, Internet Explorer 6 and 7, and other products, does not properly restrict access from web pages to Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-4033.
9316| [CVE-2009-0404] Multiple cross-site scripting (XSS) vulnerabilities in Bioinformatics htmLawed 1.1.3 and 1.1.4 allow remote attackers to inject arbitrary web script or HTML via invalid Cascading Style Sheets (CSS) expressions in the style attribute, which is processed by Internet Explorer 7.
9317| [CVE-2009-0362] filter.d/wuftpd.conf in Fail2ban 0.8.3 uses an incorrect regular expression that allows remote attackers to cause a denial of service (forced authentication failures) via a crafted reverse-resolved DNS name (rhost) entry that contains a substring that is interpreted as an IP address, a different vulnerability than CVE-2007-4321.
9318| [CVE-2009-0091] Microsoft .NET Framework 2.0, 2.0 SP1, and 3.5 does not properly enforce a certain type-equality constraint in .NET verifiable code, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Type Verification Vulnerability."
9319| [CVE-2009-0090] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, and 2.0 SP1 does not properly validate .NET verifiable code, which allows remote attackers to obtain unintended access to stack memory, and execute arbitrary code, via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Pointer Verification Vulnerability."
9320| [CVE-2009-0015] Unspecified vulnerability in fseventsd in the FSEvents framework in Apple Mac OS X 10.5.6 allows local users to obtain sensitive information (filesystem activities and directory names) via unknown vectors related to "credential management."
9321| [CVE-2008-7220] Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors.
9322| [CVE-2008-7123] Static code injection vulnerability in admin/configuration/modifier.php in zKup CMS 2.0 through 2.3 allows remote attackers to inject arbitrary PHP code into fichiers/config.php via a null byte (%00) in the login parameter in an ajout action, which bypasses the regular expression check.
9323| [CVE-2008-6992] GreenSQL Firewall (greensql-fw), possibly before 0.9.2 or 0.9.4, allows remote attackers to bypass the SQL injection protection mechanism via a WHERE clause containing an expression such as "x=y=z", which is successfully parsed by MySQL.
9324| [CVE-2008-6531] The WebWork 1 web application framework in Atlassian JIRA before 3.13.2 allows remote attackers to invoke exposed public JIRA methods via a crafted URL that is dynamically transformed into method calls, aka "WebWork 1 Parameter Injection Hole."
9325| [CVE-2008-6428] The CGI framework in Kaya 0.4.0 allows remote attackers to inject arbitrary HTTP headers and conduct cross-site scripting (XSS) attacks via unspecified vectors.
9326| [CVE-2008-6217] Cross-site scripting (XSS) vulnerability in index.php in Extrakt Framework 0.7 allows remote attackers to inject arbitrary web script or HTML via the plugins[file][id] parameter. NOTE: the provenance of this information is unknown
9327| [CVE-2008-5917] Cross-site scripting (XSS) vulnerability in the XSS filter (framework/Text_Filter/Filter/xss.php) in Horde Application Framework 3.2.2 and 3.3, when Internet Explorer is being used, allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to style attributes.
9328| [CVE-2008-5745] Integer overflow in quartz.dll in the DirectShow framework in Microsoft Windows Media Player (WMP) 9, 10, and 11, including 11.0.5721.5260, allows remote attackers to cause a denial of service (application crash) via a crafted (1) WAV, (2) SND, or (3) MID file. NOTE: this has been incorrectly reported as a code-execution vulnerability. NOTE: it is not clear whether this issue is related to CVE-2008-4927.
9329| [CVE-2008-5590] SQL injection vulnerability in customer.forumtopic.php in Kalptaru Infotech Product Sale Framework 0.1 beta allows remote attackers to execute arbitrary SQL commands via the forum_topic_id parameter.
9330| [CVE-2008-5551] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting data at two different positions within an HTML document, related to STYLE elements and the CSS expression property, aka a "double injection."
9331| [CVE-2008-5446] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10 CU2 and 12.0.6 allows remote authenticated users to affect confidentiality via unknown vectors. NOTE: the previous information was obtained from the January 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is related to unrestricted guest access to the "About Us Page" in the Oracle Applications Framework (OAF), which allows attackers to obtain sensitive system and application environment information.
9332| [CVE-2008-5424] The MimeOleClearDirtyTree function in InetComm.dll in Microsoft Outlook Express 6.00.2900.5512 does not properly handle (1) multipart/mixed e-mail messages with many MIME parts and possibly (2) e-mail messages with many "Content-type: message/rfc822
9333| [CVE-2008-5402] Double free vulnerability in the XML parser in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a crafted XML expression, related to the "IMG SRC ID."
9334| [CVE-2008-5162] The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.
9335| [CVE-2008-5100] The strong name (SN) implementation in Microsoft .NET Framework 2.0.50727 relies on the digital signature Public Key Token embedded in the pathname of a DLL file instead of the digital signature of this file itself, which makes it easier for attackers to bypass Global Assembly Cache (GAC) and Code Access Security (CAS) protection mechanisms, aka MSRC ticket MSRC8566gs.
9336| [CVE-2008-5043] Multiple cross-site scripting (XSS) vulnerabilities in the web-based interface in IBM Metrica Service Assurance Framework allow remote authenticated users to inject arbitrary web script or HTML via (1) the elementid parameter in a generatedreportresults action to the ReportTree program, (2) the jnlpname parameter to the Launch program, or (3) the :tasklabel parameter to the ReportRequest program, related to the name of a report.
9337| [CVE-2008-4828] Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified "generic string handling function" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI.
9338| [CVE-2008-4630] Multiple unspecified vulnerabilities in Midgard Components (MidCOM) Framework before 8.09.1 have unknown impact and attack vectors.
9339| [CVE-2008-4563] Heap-based buffer overflow in adsmdll.dll 5.3.7.7296, as used by the daemon (dsmsvc.exe) in the backup server in IBM Tivoli Storage Manager (TSM) Express 5.3.7.3 and earlier and TSM 5.2, 5.3 before 5.3.6.0, and 5.4.0.0 through 5.4.4.0, allows remote attackers to execute arbitrary code via a crafted length value.
9340| [CVE-2008-4557] plugins/wacko/highlight/html.php in Strawberry in CuteNews.ru 1.1.1 (aka Strawberry) allows remote attackers to execute arbitrary PHP code via the text parameter, which is inserted into an executable regular expression.
9341| [CVE-2008-4502] Multiple PHP remote file inclusion vulnerabilities in DataFeedFile (DFF) PHP Framework API allow remote attackers to execute arbitrary PHP code via a URL in the DFF_config[dir_include] parameter to (1) DFF_affiliate_client_API.php, (2) DFF_featured_prdt.func.php, (3) DFF_mer.func.php, (4) DFF_mer_prdt.func.php, (5) DFF_paging.func.php, (6) DFF_rss.func.php, and (7) DFF_sku.func.php in include/.
9342| [CVE-2008-4471] Directory traversal vulnerability in the CExpressViewerControl class in the DWF Viewer ActiveX control (AdView.dll 9.0.0.96), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to overwrite arbitrary files via "..\" sequences in the argument to the SaveAS method.
9343| [CVE-2008-4033] Cross-domain vulnerability in Microsoft XML Core Services 3.0 through 6.0, as used in Microsoft Expression Web, Office, Internet Explorer, and other products, allows remote attackers to obtain sensitive information from another domain and corrupt the session state via HTTP request header fields, as demonstrated by the Transfer-Encoding field, aka "MSXML Header Request Vulnerability."
9344| [CVE-2008-4005] Unspecified vulnerability in the Oracle Application Express component in Oracle Database 11.1.0.6 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
9345| [CVE-2008-3993] Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2 and 12.0.4 allows remote authenticated users to affect integrity via unknown vectors.
9346| [CVE-2008-3843] Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework with the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a "<~/" (less-than tilde slash) sequence followed by a crafted STYLE element.
9347| [CVE-2008-3842] Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework without the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a "</" (less-than slash) sequence.
9348| [CVE-2008-3656] Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
9349| [CVE-2008-3443] The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
9350| [CVE-2008-3253] Cross-site scripting (XSS) vulnerability in the XenAPI HTTP interfaces in Citrix XenServer Express, Standard, and Enterprise Edition 4.1.0
9351| [CVE-2008-2930] Red Hat Directory Server 7.1 before SP7, Red Hat Directory Server 8, and Fedora Directory Server 1.1.1 allow remote attackers to cause a denial of service (CPU consumption and search outage) via crafted LDAP search requests with patterns, related to a single-threaded regular-expression subsystem.
9352| [CVE-2008-2929] Multiple cross-site scripting (XSS) vulnerabilities in the adminutil library in the Directory Server Administration Express and Directory Server Gateway (DSGW) web interface in Red Hat Directory Server 7.1 before SP7 and 8 EL4 and EL5, and Fedora Directory Server, allow remote attackers to inject arbitrary web script or HTML via input values that use % (percent) escaping.
9353| [CVE-2008-2640] Multiple cross-site scripting (XSS) vulnerabilities in the Flex 3 History Management feature in Adobe Flex 3.0.1 SDK and Flex Builder 3, and generated applications, allow remote attackers to inject arbitrary web script or HTML via the anchor identifier to (1) client-side-detection-with-history/history/historyFrame.html, (2) express-installation-with-history/history/historyFrame.html, or (3) no-player-detection-with-history/history/historyFrame.html in templates/html-templates/. NOTE: Firefox 2.0 and possibly other browsers prevent exploitation.
9354| [CVE-2008-2371] Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.
9355| [CVE-2008-1927] Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.
9356| [CVE-2008-1855] FrameworkService.exe in McAfee Common Management Agent (CMA) 3.6.0.574 Patch 3 and earlier, as used by ePolicy Orchestrator (ePO) and ProtectionPilot (PrP), allows remote attackers to corrupt memory and cause a denial of service (CMA Framework service crash) via a long invalid method in requests for the /spin//AVClient//AVClient.csp URI, a different vulnerability than CVE-2006-5274.
9357| [CVE-2008-1822] Unspecified vulnerability in the Oracle Application Express component in Oracle Application Express 3.0.1 has unknown impact and remote attack vectors, aka APEX02.
9358| [CVE-2008-1811] Unspecified vulnerability in Oracle Application Express 3.0.1 has unspecified impact and remote authenticated attack vectors related to flows_030000.wwv_execute_immediate, aka APEX01. NOTE: the previous information was obtained from the April 2008 CPU. Oracle has not commented on reliable researcher claims that APEX01 is for insufficient authorization checks for SQL commands in the run_ddl function in flows_030000.wwv_execute_immediate, allowing privilege escalation by certain non-DBA remote authenticated users.
9359| [CVE-2008-1734] Interpretation conflict in PHP Toolkit before 1.0.1 on Gentoo Linux might allow local users to cause a denial of service (PHP outage) and read contents of PHP scripts by creating a file with a one-letter lowercase alphabetic name, which triggers interpretation of a certain unquoted [a-z] argument as a matching shell glob for this name, rather than interpretation as the literal [a-z] regular-expression string, and consequently blocks the launch of the PHP interpreter within the Apache HTTP Server.
9360| [CVE-2008-1717] WoltLab Community Framework (WCF) 1.0.6 in WoltLab Burning Board 3.0.5 allows remote attackers to obtain the full path via invalid (1) page and (2) form parameters, which leaks the path from an exception handler when a valid class cannot be found.
9361| [CVE-2008-1716] Cross-site scripting (XSS) vulnerability in WoltLab Community Framework (WCF) 1.0.6 in WoltLab Burning Board 3.0.5 allows remote attackers to inject arbitrary web script or HTML via the (1) page and (2) form parameters, which are not properly handled when they are reflected back in an error message.
9362| [CVE-2008-1677] Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
9363| [CVE-2008-1676] Red Hat PKI Common Framework (rhpki-common) in Red Hat Certificate System (aka Certificate Server or RHCS) 7.1 through 7.3, and Netscape Certificate Management System 6.x, does not recognize Certificate Authority profile constraints on Extensions, which might allow remote attackers to bypass intended restrictions and conduct man-in-the-middle attacks by submitting a certificate signing request (CSR) and using the resulting certificate.
9364| [CVE-2008-1448] The MHTML protocol handler in a component of Microsoft Outlook Express 5.5 SP2 and 6 through SP1, and Windows Mail, does not assign the correct Internet Explorer Security Zone to UNC share pathnames, which allows remote attackers to bypass intended access restrictions and read arbitrary files via an mhtml: URI in conjunction with a redirection, aka "URL Parsing Cross-Domain Information Disclosure Vulnerability."
9365| [CVE-2008-1154] The Disaster Recovery Framework (DRF) master server in Cisco Unified Communications products, including Unified Communications Manager (CUCM) 5.x and 6.x, Unified Presence 1.x and 6.x, Emergency Responder 2.x, and Mobility Manager 2.x, does not require authentication for requests received from the network, which allows remote attackers to execute arbitrary code via unspecified vectors.
9366| [CVE-2008-1026] Integer overflow in the PCRE regular expression compiler (JavaScriptCore/pcre/pcre_compile.cpp) in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to execute arbitrary code via a regular expression with large, nested repetition counts, which triggers a heap-based buffer overflow.
9367| [CVE-2008-1010] Buffer overflow in WebKit, as used in Apple Safari before 3.1, allows remote attackers to execute arbitrary code via crafted regular expressions in JavaScript.
9368| [CVE-2008-0985] Heap-based buffer overflow in the GIF library in the WebKit framework for Google Android SDK m3-rc37a and earlier allows remote attackers to execute arbitrary code via a crafted GIF file whose logical screen height and width are different than the actual height and width.
9369| [CVE-2008-0938] Unspecified vulnerability in the dynamic tracing framework (DTrace) in Sun Solaris 10 allows local users with PRIV_DTRACE_USER or PRIV_DTRACE_PROC privileges to obtain sensitive kernel information via unspecified vectors, a different vulnerability than CVE-2007-4126.
9370| [CVE-2008-0920] SQL injection vulnerability in port/modifyportform.php in Open Source Security Information Management (OSSIM) 0.9.9 rc5 allows remote authenticated users to execute arbitrary SQL commands via the portname parameter, which is not properly handled by a validation regular expression.
9371| [CVE-2008-0903] Unspecified vulnerability in the BEA WebLogic Server and Express proxy plugin, as distributed before November 2007 and before 9.2 MP3 and 10.0 MP2, allows remote attackers to cause a denial of service (web server crash) via a crafted URL.
9372| [CVE-2008-0902] Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 6.1 through 10.0 MP1 allow remote attackers to inject arbitrary web script or HTML via unspecified samples. NOTE: this might be the same issue as CVE-2007-2694.
9373| [CVE-2008-0901] BEA WebLogic Server and Express 7.0 through 10.0 allows remote attackers to conduct brute force password guessing attacks, even when account lockout has been activated, via crafted URLs that indicate whether a guessed password is successful or not.
9374| [CVE-2008-0900] Session fixation vulnerability in BEA WebLogic Server and Express 8.1 SP4 through SP6, 9.2 through MP1, and 10.0 allows remote authenticated users to hijack web sessions via unknown vectors.
9375| [CVE-2008-0899] Cross-site scripting (XSS) vulnerability in the Administration Console in BEA WebLogic Server and Express 9.0 through 10.0 allows remote attackers to inject arbitrary web script or HTML via URLs that are not properly handled by the Unexpected Exception Page.
9376| [CVE-2008-0895] BEA WebLogic Server and WebLogic Express 6.1 through 10.0 allows remote attackers to bypass authentication for application servlets via crafted request headers.
9377| [CVE-2008-0869] Cross-site scripting (XSS) vulnerability in BEA WebLogic Workshop 8.1 through SP6 and Workshop for WebLogic 9.0 through 10.0 allows remote attackers to inject arbitrary web script or HTML via a "framework defined request parameter" when using WebLogic Workshop or Apache Beehive NetUI framework with page flows.
9378| [CVE-2008-0863] BEA WebLogic Server and WebLogic Express 9.0 and 9.1 exposes the web service's WSDL and security policies, which allows remote attackers to obtain sensitive information and potentially launch further attacks.
9379| [CVE-2008-0674] Buffer overflow in PCRE before 7.6 allows remote attackers to execute arbitrary code via a regular expression containing a character class with a large number of characters with Unicode code points greater than 255.
9380| [CVE-2008-0545] Multiple directory traversal vulnerabilities in Bubbling Library 1.32 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) uri parameter to (a) yui-menu.tpl.php, (b) simple.tpl.php, and (c) advanced.tpl.php in dispatcher/framework/
9381| [CVE-2008-0521] Multiple directory traversal vulnerabilities in Bubbling Library 1.32 allow remote attackers to read arbitrary files via a .. (dot dot) in the uri parameter to dispatcher.php in (1) examples/dispatcher/framework/, (2) examples/dispatcher/, (3) examples/wizard/, and (4) PHP/, different vectors than CVE-2008-0545.
9382| [CVE-2008-0247] Heap-based buffer overflow in the Express Backup Server service (dsmsvc.exe) in IBM Tivoli Storage Manager (TSM) Express 5.3 before 5.3.7.3 allows remote attackers to execute arbitrary code via a packet with a large length value.
9383| [CVE-2008-0202] CRLF injection vulnerability in index.php in ExpressionEngine 1.2.1 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the URL parameter.
9384| [CVE-2008-0201] Cross-site scripting (XSS) vulnerability in index.php in ExpressionEngine 1.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the URL parameter.
9385| [CVE-2008-0172] The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
9386| [CVE-2008-0171] regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (failed assertion and crash) via an invalid regular expression.
9387| [CVE-2008-0107] Integer underflow in SQL Server 7.0 SP4, 2000 SP4, 2005 SP1 and SP2, 2000 Desktop Engine (MSDE 2000) SP4, 2005 Express Edition SP1 and SP2, and 2000 Desktop Engine (WMSDE)
9388| [CVE-2008-0106] Buffer overflow in Microsoft SQL Server 2005 SP1 and SP2, and 2005 Express Edition SP1 and SP2, allows remote authenticated users to execute arbitrary code via a crafted insert statement.
9389| [CVE-2008-0086] Buffer overflow in the convert function in Microsoft SQL Server 2000 SP4, 2000 Desktop Engine (MSDE 2000) SP4, and 2000 Desktop Engine (WMSDE) allows remote authenticated users to execute arbitrary code via a crafted SQL expression.
9390| [CVE-2008-0085] SQL Server 7.0 SP4, 2000 SP4, 2005 SP1 and SP2, 2000 Desktop Engine (MSDE 2000) SP4, 2005 Express Edition SP1 and SP2, and 2000 Desktop Engine (WMSDE)
9391| [CVE-2008-0047] Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.
9392| [CVE-2007-6433] The getRenderedEjbql method in the org.jboss.seam.framework.Query class in JBoss Seam 2.x before 2.0.0.CR3 allows remote attackers to inject and execute arbitrary EJBQL commands via the order parameter.
9393| [CVE-2007-6408] IBM Tivoli Provisioning Manager Express provides unspecified information in error messages when (1) attempted duplication of a username occurs when creating an account or (2) when trying to login using a valid username, which makes it easier for remote attackers to enumerate usernames.
9394| [CVE-2007-6407] Multiple cross-site scripting (XSS) vulnerabilities in IBM Tivoli Provisioning Manager Express allow remote attackers to inject arbitrary web script or HTML via the (1) "assess modification," (2) user-id, and other unspecified fields to the /tpmx URI
9395| [CVE-2007-6345] SQL injection vulnerability in aurora framework before 20071208 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, possibly the value parameter to the pack_var function in module/db.lib/db_mysql.lib. NOTE: some of these details are obtained from third party information.
9396| [CVE-2007-6321] Cross-site scripting (XSS) vulnerability in RoundCube webmail 0.1rc2, 2007-12-09, and earlier versions, when using Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via style sheets containing expression commands.
9397| [CVE-2007-6067] Algorithmic complexity vulnerability in the regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (memory consumption) via a crafted "complex" regular expression with doubly-nested states.
9398| [CVE-2007-6018] IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) "purge" deleted emails via a crafted email message.
9399| [CVE-2007-5715] DenyHosts 2.6 processes OpenSSH sshd "not listed in AllowUsers" log messages with an incorrect regular expression that does not match an IP address, which might allow remote attackers to avoid detection and blocking when making invalid login attempts with a username not present in AllowUsers, as demonstrated by the root username, a different vulnerability than CVE-2007-4323.
9400| [CVE-2007-5712] The internationalization (i18n) framework in Django 0.91, 0.95, 0.95.1, and 0.96, and as used in other products such as PyLucid, when the USE_I18N option and the i18n component are enabled, allows remote attackers to cause a denial of service (memory consumption) via many HTTP requests with large Accept-Language headers.
9401| [CVE-2007-5470] Microsoft Expression Media stores the catalog password in cleartext in the catalog IVC file, which allows local users to obtain sensitive information and gain access to the catalog by reading the IVC file.
9402| [CVE-2007-5116] Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
9403| [CVE-2007-4772] The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
9404| [CVE-2007-4771] Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.
9405| [CVE-2007-4769] The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.
9406| [CVE-2007-4768] Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
9407| [CVE-2007-4767] Perl-Compatible Regular Expression (PCRE) library before 7.3 does not properly compute the length of (1) a \p sequence, (2) a \P sequence, or (3) a \P{x} sequence, which allows context-dependent attackers to cause a denial of service (infinite loop or crash) or execute arbitrary code.
9408| [CVE-2007-4766] Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library before 7.3 allow context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via unspecified escape (backslash) sequences.
9409| [CVE-2007-4763] PHP remote file inclusion vulnerability in dbmodules/DB_adodb.class.php in PHP Object Framework (PHPOF) 20040226 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the PHPOF_INCLUDE_PATH parameter.
9410| [CVE-2007-4607] Buffer overflow in the EasyMailSMTPObj ActiveX control in emsmtp.dll 6.0.1 in the Quiksoft EasyMail SMTP Object, as used in Postcast Server Pro 3.0.61, allows remote attackers to execute arbitrary code via a long argument to the SubmitToExpress method, a different vulnerability than CVE-2007-1029.
9411| [CVE-2007-4556] Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a "%{" sequence and ending with a "}" character.
9412| [CVE-2007-4472] Multiple buffer overflows in the Broderbund Expressit 3DGreetings Player ActiveX control could allow remote attackers to execute arbitrary code via unspecified vectors.
9413| [CVE-2007-4430] Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows context-dependent attackers to cause a denial of service (device restart and BGP routing table rebuild) via certain regular expressions in a "show ip bgp regexp" command. NOTE: unauthenticated remote attacks are possible in environments with anonymous telnet and Looking Glass access.
9414| [CVE-2007-4126] Unspecified vulnerability in the dynamic tracing framework (DTrace) on Sun Solaris 10 before 20070730 allows local users with PRIV_DTRACE_USER privileges to cause a denial of service (panic or hang) via unspecified use of certain DTrace programs.
9415| [CVE-2007-4040] Argument injection vulnerability involving Microsoft Outlook and Outlook Express, when certain URIs are registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in an unspecified URI, which are inserted into the command line when invoking the handling process, a similar issue to CVE-2007-3670.
9416| [CVE-2007-4026] epesi framework before 0.8.6 does not properly verify file extensions, which allows remote attackers to upload and execute arbitrary PHP code via unspecified vectors involving the gallery images upload feature. NOTE: some of these details are obtained from third party information.
9417| [CVE-2007-3992] SQL injection vulnerability in vir_login.asp in iExpress Property Pro allows remote attackers to execute arbitrary SQL commands via the Password parameter. NOTE: the Username parameter is covered by CVE-2006-6029. NOTE: the provenance of this information is unknown
9418| [CVE-2007-3944] Multiple heap-based buffer overflows in the Perl Compatible Regular Expressions (PCRE) library in the JavaScript engine in WebKit in Apple Safari 3 Beta before Update 3.0.3, and iPhone before 1.0.1, allow remote attackers to execute arbitrary code via certain JavaScript regular expressions. NOTE: this issue was originally reported only for MobileSafari on the iPhone. NOTE: it is not clear whether this stems from an issue in the original distribution of PCRE, which might already have a separate CVE identifier.
9419| [CVE-2007-3902] Use-after-free vulnerability in the CRecalcProperty function in mshtml.dll in Microsoft Internet Explorer 5.01 through 7 allows remote attackers to execute arbitrary code by calling the setExpression method and then modifying the outerHTML property of an HTML element, one variant of "Uninitialized Memory Corruption Vulnerability."
9420| [CVE-2007-3897] Heap-based buffer overflow in Microsoft Outlook Express 6 and earlier, and Windows Mail for Vista, allows remote Network News Transfer Protocol (NNTP) servers to execute arbitrary code via long NNTP responses that trigger memory corruption.
9421| [CVE-2007-3860] Unspecified vulnerability in Oracle Application Express (formerly Oracle HTML DB) 2.2.0.00.32 up to 3.0.0.00.20 allows developers to have an unknown impact via unknown attack vectors, aka APEX01. NOTE: a reliable researcher states that this is SQL injection in the wwv_flow_security.check_db_password function due to insufficient checks for '"' characters.
9422| [CVE-2007-3627] Multiple SQL injection vulnerabilities in PHP Lite Calendar Express 2.2 allow remote attackers to execute arbitrary SQL commands via the cid parameter to (1) login.php, (2) auth.php, and (3) subscribe.php. NOTE: the month.php, year.php, week.php, and day.php vectors are already covered by CVE-2005-4009. NOTE: the provenance of this information is unknown
9423| [CVE-2007-3578] PHPIDS before 20070703 does not properly handle (1) arithmetic expressions and (2) unclosed comments, which allows remote attackers to inject arbitrary web script.
9424| [CVE-2007-3555] Cross-site scripting (XSS) vulnerability in index.php in Moodle 1.7.1 allows remote attackers to inject arbitrary web script or HTML via a style expression in the search parameter, a different vulnerability than CVE-2004-1424.
9425| [CVE-2007-3495] Multiple cross-site scripting (XSS) vulnerabilities in the SAP Internet Communication Framework (BC-MID-ICF) in the SAP Basis component 700 before SP12, and 640 before SP20, allow remote attackers to inject arbitrary web script or HTML via certain parameters associated with the default login error page.
9426| [CVE-2007-3025] Unspecified vulnerability in libclamav/phishcheck.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1, when running on Solaris, allows remote attackers to cause a denial of service (hang) via unknown vectors related to the isURL function and regular expressions.
9427| [CVE-2007-2836] Directory traversal vulnerability in session.rb in Hiki 0.8.0 through 0.8.6 allows remote attackers to delete arbitrary files via directory traversal sequences in the session ID, which is matched against an insufficiently restrictive regular expression before it is used to construct a filename that is marked for deletion at logout.
9428| [CVE-2007-2765] blockhosts.py in BlockHosts before 2.0.3 does not properly parse daemon log files, which allows remote attackers to add arbitrary deny entries to the /etc/hosts.allow file and cause a denial of service by adding arbitrary IP addresses to a daemon log file, as demonstrated by logging in through ssh using a login name containing certain strings with an IP address, which is not properly handled by a regular expression, a related issue to CVE-2006-6301.
9429| [CVE-2007-2700] The WLST script generated by the configToScript command in BEA WebLogic Express and WebLogic Server 9.0 and 9.1 does not encrypt certain attributes in configuration files when creating a new domain, which allows remote authenticated users to obtain sensitive information.
9430| [CVE-2007-2699] The Administration Console in BEA WebLogic Express and WebLogic Server 9.0 and 9.1 does not properly enforce certain Domain Security Policies, which allows remote administrative users in the Deployer role to upload arbitrary files.
9431| [CVE-2007-2697] The embedded LDAP server in BEA WebLogic Express and WebLogic Server 7.0 through SP6, 8.1 through SP5, 9.0, and 9.1, when in certain configurations, does not limit or audit failed authentication attempts, which allows remote attackers to more easily conduct brute-force attacks against the administrator password, or flood the server with login attempts and cause a denial of service.
9432| [CVE-2007-2695] The HttpClusterServlet and HttpProxyServlet in BEA WebLogic Express and WebLogic Server 6.1 through SP7, 7.0 through SP7, 8.1 through SP5, 9.0, and 9.1, when SecureProxy is enabled, may process "external requests on behalf of a system identity," which allows remote attackers to access administrative data or functionality.
9433| [CVE-2007-2694] Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Express and WebLogic Server 6.1 through SP7, 7.0 through SP7, 8.1 through SP5, 9.0 GA, and 9.1 GA allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
9434| [CVE-2007-2636] Unspecified vulnerability in phpTodo before 0.8.1 allows remote attackers to have an unknown impact via newlines in regular expressions to (1) index.php, (2) feed.php, (3) prefs.php, and (4) todolist.php
9435| [CVE-2007-2592] Multiple cross-site scripting (XSS) vulnerabilities in Nokia Intellisync Mobile Suite 6.4.31.2, 6.6.0.107, and 6.6.2.2, possibly involving Novell Groupwise Mobile Server and Nokia Intellisync Wireless Email Express, allow remote attackers to inject arbitrary web script or HTML via the (1) username parameter to de/pda/dev_logon.asp and (2) multiple unspecified vectors in (a) usrmgr/registerAccount.asp, (b) de/create_account.asp, and other files.
9436| [CVE-2007-2591] usrmgr/userList.asp in Nokia Intellisync Mobile Suite 6.4.31.2, 6.6.0.107, and 6.6.2.2, possibly involving Novell Groupwise Mobile Server and Nokia Intellisync Wireless Email Express, allows remote attackers to modify user account details and cause a denial of service (account deactivation) via the userid parameter in an update action.
9437| [CVE-2007-2590] Nokia Intellisync Mobile Suite 6.4.31.2, 6.6.0.107, and 6.6.2.2, possibly involving Novell Groupwise Mobile Server and Nokia Intellisync Wireless Email Express, allows remote attackers to obtain user names and other sensitive information via a direct request to (1) usrmgr/userList.asp or (2) usrmgr/userStatusList.asp.
9438| [CVE-2007-2555] Unspecified vulnerability in Default.aspx in Podium CMS allows remote attackers to have an unknown impact, possibly session fixation, via a META HTTP-EQUIV Set-cookie expression in the id parameter, related to "cookie manipulation." NOTE: this issue might be cross-site scripting (XSS).
9439| [CVE-2007-2385] The Yahoo! UI framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
9440| [CVE-2007-2384] The Script.aculo.us framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
9441| [CVE-2007-2383] The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
9442| [CVE-2007-2382] The Moo.fx framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
9443| [CVE-2007-2381] The MochiKit framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
9444| [CVE-2007-2380] The Microsoft Atlas framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
9445| [CVE-2007-2379] The jQuery framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
9446| [CVE-2007-2378] The Google Web Toolkit (GWT) framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
9447| [CVE-2007-2377] The Getahead Direct Web Remoting (DWR) framework 1.1.4 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
9448| [CVE-2007-2376] The Dojo framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
9449| [CVE-2007-2227] The MHTML protocol handler in Microsoft Outlook Express 6 and Windows Mail in Windows Vista does not properly handle Content-Disposition "notifications," which allows remote attackers to obtain sensitive information from other Internet Explorer domains, aka "Content Disposition Parsing Cross Domain Information Disclosure Vulnerability."
9450| [CVE-2007-2225] A component in Microsoft Outlook Express 6 and Windows Mail in Windows Vista does not properly handle certain HTTP headers when processing MHTML protocol URLs, which allows remote attackers to obtain sensitive information from other Internet Explorer domains, aka "URL Parsing Cross Domain Information Disclosure Vulnerability."
9451| [CVE-2007-2164] Konqueror 3.5.5 release 45.4 allows remote attackers to cause a denial of service (browser crash or abort) via JavaScript that matches a regular expression against a long string, as demonstrated using /(.)*/.
9452| [CVE-2007-2163] Apple Safari allows remote attackers to cause a denial of service (browser crash) via JavaScript that matches a regular expression against a long string, as demonstrated using /(.)*/.
9453| [CVE-2007-2162] (1) Mozilla Firefox 2.0.0.3 and (2) GNU IceWeasel 2.0.0.3 allow remote attackers to cause a denial of service (browser crash or system hang) via JavaScript that matches a regular expression against a long string, as demonstrated using /(.)*/.
9454| [CVE-2007-2161] Microsoft Internet Explorer 7 allows remote attackers to cause a denial of service (browser hang) via JavaScript that matches a regular expression against a long string, as demonstrated using /(.)*/.
9455| [CVE-2007-2137] Heap-based buffer overflow in kde.dll in IBM Tivoli Monitoring Express 6.1.0 before Fix Pack 2, as used in Tivoli Universal Agent, Windows OS Monitoring agent, and Enterprise Portal Server, allows remote attackers to execute arbitrary code by sending a long string to a certain TCP port.
9456| [CVE-2007-2109] Multiple unspecified vulnerabilities in Oracle Database 10.2.0.3 have unknown impact and remote authenticated attack vectors related to (1) Rules Manager and Expression Filter components (DB02) and (2) Oracle Streams (DB06). Note: as of 20070424, Oracle has not disputed reliable claims that DB02 is for a race condition in the RLMGR_TRUNCATE_MAINT trigger in the Rules Manager and Expression Filter components changing the AUTHID of a package from DEFINER to CURRENT_USER after a TRUNCATE call, and DB06 is for SQL injection in the DBMS_APPLY_USER_AGENT.SET_REGISTRATION_HANDLER procedure, which is later passed to the DBMS_APPLY_ADM_INTERNAL.ALTER_APPLY procedure, aka "Oracle Streams".
9457| [CVE-2007-2026] The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which is not well handled by OS/2 REXX regular expressions that use wildcards, as originally reported for AMaViS.
9458| [CVE-2007-1982] Multiple PHP remote file inclusion vulnerabilities in Really Simple PHP and Ajax (RSPA) 2007-03-23 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) __IncludeFilePHPClass, (2) __ClassPath, and (3) __class parameters to (a) rspa/framework/Controller_v5.php, and (b) rspa/framework/Controller_v4.php.
9459| [CVE-2007-1900] CRLF injection vulnerability in the FILTER_VALIDATE_EMAIL filter in ext/filter in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to inject arbitrary e-mail headers via an e-mail address with a '\n' character, which causes a regular expression to ignore the subsequent part of the address string.
9460| [CVE-2007-1662] Perl-Compatible Regular Expression (PCRE) library before 7.3 reads past the end of the string when searching for unmatched brackets and parentheses, which allows context-dependent attackers to cause a denial of service (crash), possibly involving forward references.
9461| [CVE-2007-1661] Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matching certain input bytes against some regex patterns in non-UTF-8 mode, which allows context-dependent attackers to obtain sensitive information or cause a denial of service (crash), as demonstrated by the "\X?\d" and "\P{L}?\d" patterns.
9462| [CVE-2007-1660] Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
9463| [CVE-2007-1659] Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.
9464| [CVE-2007-1622] Cross-site scripting (XSS) vulnerability in wp-admin/vars.php in WordPress before 2.0.10 RC2, and before 2.1.3 RC2 in the 2.1 series, allows remote authenticated users with theme privileges to inject arbitrary web script or HTML via the PATH_INFO in the administration interface, related to loose regular expression processing of PHP_SELF.
9465| [CVE-2007-1493] nukesentinel.php in NukeSentinel 2.5.06 and earlier uses a permissive regular expression to validate an IP address, which allows remote attackers to execute arbitrary SQL commands via the Client-IP HTTP header, due to an incomplete patch for CVE-2007-1172.
9466| [CVE-2007-1474] Argument injection vulnerability in the cleanup cron script in Horde Project Horde and IMP before Horde Application Framework 3.1.4 allows local users to delete arbitrary files and possibly gain privileges via multiple space-delimited pathnames.
9467| [CVE-2007-1473] Cross-site scripting (XSS) vulnerability in framework/NLS/NLS.php in Horde Framework before 3.1.4 RC1, when the login page contains a language selection box, allows remote attackers to inject arbitrary web script or HTML via the new_lang parameter to login.php.
9468| [CVE-2007-1467] Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks and related products, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), and Wireless Control System (WCS) allow remote attackers to inject arbitrary web script or HTML via the text field of the search form.
9469| [CVE-2007-1349] PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
9470| [CVE-2007-1003] Integer overflow in ALLOCATE_LOCAL in the ProcXCMiscGetXIDList function in the XC-MISC extension in the X.Org X11 server (xserver) 7.1-1.1.0, and other versions before 20070403, allows remote authenticated users to execute arbitrary code via a large expression, which results in memory corruption.
9471| [CVE-2007-0995] Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 ignores trailing invalid HTML characters in attribute names, which allows remote attackers to bypass content filters that use regular expressions.
9472| [CVE-2007-0988] The zend_hash_init function in PHP 5 before 5.2.1 and PHP 4 before 4.4.5, when running on a 64-bit platform, allows context-dependent attackers to cause a denial of service (infinite loop) by unserializing certain integer expressions, which only cause 32-bit arguments to be used after the check for a negative value, as demonstrated by an "a:2147483649:{" argument.
9473| [CVE-2007-0918] The ATOMIC.TCP signature engine in the Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XA, 12.3YA, 12.3T, and other trains allows remote attackers to cause a denial of service (IPS crash and traffic loss) via unspecified manipulations that are not properly handled by the regular expression feature, as demonstrated using the 3123.0 (Netbus Pro Traffic) signature.
9474| [CVE-2007-0917] The Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XE to 12.3T allows remote attackers to bypass IPS signatures that use regular expressions via fragmented packets.
9475| [CVE-2007-0746] Heap-based buffer overflow in the VideoConference framework in Apple Mac OS X 10.3.9 through 10.4.9 allows remote attackers to execute arbitrary code via a "crafted SIP packet when initializing an audio/video conference".
9476| [CVE-2007-0742] The WebFoundation framework in Apple Mac OS X 10.3.9 and earlier allows subdomain cookies to be accessed by the parent domain, which allows remote attackers to obtain sensitive information.
9477| [CVE-2007-0677] PHP remote file inclusion vulnerability in fw/class.Quick_Config_Browser.php in Cadre PHP Framework 20020724 allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[config][framework_path] parameter.
9478| [CVE-2007-0614] The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428 in Apple Mac OS X 10.4.8 allows remote attackers to cause a denial of service (persistent application crash) via a crafted phsh hash attribute in a TXT key.
9479| [CVE-2007-0613] The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428 in Apple Mac OS X 10.4.8 does not check for duplicate entries when adding newly discovered available contacts, which allows remote attackers to cause a denial of service (disrupted communication) via a flood of duplicate _presence._tcp mDNS queries.
9480| [CVE-2007-0584] PHP remote file inclusion vulnerability in membres/membreManager.php in PhP Generic Library & Framework for comm (g-neric) allows remote attackers to execute arbitrary PHP code via a URL in the include_path parameter.
9481| [CVE-2007-0516] Yana Framework before 2.8.5a allows remote authenticated users with permissions to modify a guestbook profile to modify or delete arbitrary guestbook profiles via unspecified vectors. NOTE: The provenance of this information is unknown
9482| [CVE-2007-0162] Unsanity Application Enhancer (APE) 2.0.2 installs with insecure permissions for the (1) ApplicationEnhancer binary and the (2) /Library/Frameworks/ApplicationEnhancer.framework directory, which allows local users to gain privileges by modifying or replacing the binary or library files.
9483| [CVE-2007-0117] DiskManagementTool in the DiskManagement.framework 92.29 on Mac OS X 10.4.8 does not properly validate Bill of Materials (BOM) files, which allows attackers to gain privileges via a BOM file under /Library/Receipts/, which triggers arbitrary file permission changes upon execution of a diskutil permission repair operation.
9484| [CVE-2007-0043] The Just In Time (JIT) Compiler service in Microsoft .NET Framework 1.0, 1.1, and 2.0 for Windows 2000, XP, Server 2003, and Vista allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving an "unchecked buffer," probably a buffer overflow, aka ".NET JIT Compiler Vulnerability".
9485| [CVE-2007-0042] Interpretation conflict in ASP.NET in Microsoft .NET Framework 1.0, 1.1, and 2.0 for Windows 2000, XP, Server 2003, and Vista allows remote attackers to access configuration files and obtain sensitive information, and possibly bypass security mechanisms that try to constrain the final substring of a string, via %00 characters, related to use of %00 as a string terminator within POSIX functions but a data character within .NET strings, aka "Null Byte Termination Vulnerability."
9486| [CVE-2007-0041] The PE Loader service in Microsoft .NET Framework 1.0, 1.1, and 2.0 for Windows 2000, XP, Server 2003, and Vista allows remote attackers to execute arbitrary code via unspecified vectors involving an "unchecked buffer" and unvalidated message lengths, probably a buffer overflow.
9487| [CVE-2006-7230] Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
9488| [CVE-2006-7228] Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
9489| [CVE-2006-7227] Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to execute arbitrary code via a regular expression containing a large number of named subpatterns (name_count) or long subpattern names (max_name_size), which triggers a buffer overflow. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
9490| [CVE-2006-7226] Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash).
9491| [CVE-2006-7225] Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence.
9492| [CVE-2006-7158] Cross-site scripting (XSS) vulnerability in Oracle Application Express (APEX) before 2.2.1, aka Oracle HTML DB, allows remote attackers to inject arbitrary web script or HTML via the NOTIFICATION_MSG parameter. NOTE: it is likely that this issue overlaps one of the identifiers in CVE-2006-5351.
9493| [CVE-2006-6957] PHP remote file inclusion vulnerability in addons/mod_media/body.php in Docebo 3.0.3 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[where_framework] parameter. NOTE: this issue might be resultant from a global overwrite vulnerability. This issue is similar to CVE-2006-2576 and CVE-2006-3107, but the vectors are different.
9494| [CVE-2006-6749] Buffer overflow in the parse_expression function in parse_config in OpenSER 1.1.0 allows attackers to have an unknown impact via a long str parameter.
9495| [CVE-2006-6707] Stack-based buffer overflow in the NeoTraceExplorer.NeoTraceLoader ActiveX control (NeoTraceExplorer.dll) in NeoTrace Express 3.25 and NeoTrace Pro (aka McAfee Visual Trace) 3.25 allows remote attackers to execute arbitrary code via a long argument string to the TraceTarget method. NOTE: The provenance of this information is unknown
9496| [CVE-2006-6629] lib/WeBWorK/PG/Translator.pm in WeBWorK Program Generation (PG) Language before 2.3.1 uses an insufficiently restrictive regular expression to determine valid macro filenames, which allows attackers to load arbitrary macro files whose names contain the strings (1) dangerousMacros.pl, (2) PG.pl, or (3) IO.pl.
9497| [CVE-2006-6301] DenyHosts 2.5 does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a login name containing certain strings with an IP address, which is not properly handled by a regular expression.
9498| [CVE-2006-6015] Buffer overflow in the JavaScript implementation in Safari on Apple Mac OS X 10.4 allows remote attackers to cause a denial of service (application crash) via a long argument to the exec method of a regular expression.
9499| [CVE-2006-5936] SQL injection vulnerability in dept.asp in SiteXpress E-Commerce System allows remote attackers to execute arbitrary SQL commands via the id parameter.
9500| [CVE-2006-5900] Cross-site scripting (XSS) vulnerability in the incubator/tests/Zend/Http/_files/testRedirections.php sample code in Zend Framework Preview 0.2.0 allows remote attackers to inject arbitrary web script or HTML via arbitrary parameters.
9501| [CVE-2006-5712] Cross-site scripting (XSS) vulnerability in Mirapoint WebMail allows remote attackers to inject arbitrary web script via the expression Cascading Style Sheets (CSS) function, as demonstrated using the width style for an IMG element.
9502| [CVE-2006-5653] Cross-site scripting (XSS) vulnerability in the errorHTML function in the index script in Sun Java System Messenger Express 6 allows remote attackers to inject arbitrary web script or HTML via the error parameter. NOTE: this issue might be related to CVE-2006-5486, however due to the vagueness of the initial advisory and different researchers a new CVE was assigned.
9503| [CVE-2006-5652] Cross-site scripting (XSS) vulnerability in Sun iPlanet Messaging Server Messenger Express allows remote attackers to inject arbitrary web script via the expression Cascading Style Sheets (CSS) function, as demonstrated by setting the width style for an IMG element. NOTE: this issue might be related to CVE-2006-5486, however due to the vagueness of the initial advisory and different researchers, it has been assigned a new CVE.
9504| [CVE-2006-5599] Cross-site scripting (XSS) vulnerability in Oracle Application Express (formerly HTML DB) before 2.2.1 allows remote attackers to inject arbitrary HTML or web script via the WWV_FLOW_ITEM_HELP package. NOTE: it is likely that this issue overlaps one of the Oracle VulnIDs covered by CVE-2006-5351. Oracle has not publicly disputed claims by a reliable researcher that this has been fixed by the October 2006 CPU.
9505| [CVE-2006-5367] Multiple unspecified vulnerabilities in Oracle E-Business Suite 11.5.7 up to 11.5.10CU2 have unknown impact and remote authenticated attack vectors, aka Vuln# (1) APPS03 in Oracle Applications Framework, (2) APPS04 in Oracle Applications Technology Stack, and (3) APPS05 in Oracle Balanced Scorecard, (4) APPS09 in Oracle Scripting, and (5) APPS10 in Oracle Trading Community.
9506| [CVE-2006-5352] Multiple unspecified vulnerabilities in Oracle Application Express 1.5 up to 1.6.1 have unknown impact and remote attack vectors, aka Vuln# (1) APEX04, (2) APEX20, and (3) APEX21.
9507| [CVE-2006-5351] Multiple unspecified vulnerabilities in Oracle Application Express (formerly Oracle HTML DB) 1.5 up to 2.0 have unknown impact and remote attack vectors, aka Vuln# (1) APEX01, (2) APEX02, (3) APEX03, (4) APEX05, (5) APEX06, (6) APEX07, (7) APEX08, (8) APEX09, (9) APEX10, (10) APEX11, (11) APEX12, (12) APEX13, (13) APEX14, (14) APEX15, (15) APEX16, (16) APEX17, (17) APEX18, (18) APEX19, (19) APEX22, (20) APEX23, (21) APEX24, (22) APEX25, (23) APEX26, (24) APEX27, (25) APEX28, (26) APEX29, (27) APEX30, (28) APEX31, (29) APEX32, (30) APEX33, (31) APEX34, and (32) APEX35. NOTE: as of 20061027, it is likely that some of these identifiers are associated with cross-site scripting (XSS) in WWV_FLOW_ITEM_HELP and NOTIFICATION_MSG, but these have been provided separate identifiers.
9508| [CVE-2006-5274] Integer overflow in McAfee ePolicy Orchestrator 3.5 through 3.6.1, ProtectionPilot 1.1.1 and 1.5, and Common Management Agent (CMA) 3.5.5.438 allows remote attackers to cause a denial of service (CMA Framework service crash) and possibly execute arbitrary code via unspecified vectors.
9509| [CVE-2006-4859] Unrestricted file upload vulnerability in contact.html.php in the Contact (com_contact) component in Limbo (aka Lite Mambo) CMS 1.0.4.2L and earlier allows remote attackers to upload PHP code to the images/contact folder via a filename with a double extension in the contact_attach parameter in a contact option in index.php, which bypasses an insufficiently restrictive regular expression.
9510| [CVE-2006-4566] Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) via a malformed JavaScript regular expression that ends with a backslash in an unterminated character set ("[\\"), which leads to a buffer over-read.
9511| [CVE-2006-4565] Heap-based buffer overflow in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a JavaScript regular expression with a "minimal quantifier."
9512| [CVE-2006-4527] includes/content/gateway.inc.php in CubeCart 3.0.12 and earlier, when magic_quotes_gpc is disabled, uses an insufficiently restrictive regular expression to validate the gateway parameter, which allows remote attackers to conduct PHP remote file inclusion attacks.
9513| [CVE-2006-4410] The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not properly search certificate revocation lists (CRL), which allows remote attackers to access systems by using revoked certificates.
9514| [CVE-2006-4409] The Online Certificate Status Protocol (OCSP) service in the Security Framework in Apple Mac OS X 10.4 through 10.4.8 retrieve certificate revocation lists (CRL) when an HTTP proxy is in use, which could cause the system to accept certificates that have been revoked.
9515| [CVE-2006-4408] The Security Framework in Apple Mac OS X 10.4 through 10.4.8 allows remote attackers to cause a denial of service (resource consumption) via certain public key values in an X.509 certificate that requires extra resources during signature verification. NOTE: this issue may be similar to CVE-2006-2940.
9516| [CVE-2006-4407] The Security Framework in Apple Mac OS X 10.3.x up to 10.3.9 does not properly prioritize encryption ciphers when negotiating the strongest shared cipher, which causes Secure Transport to user a weaker cipher that makes it easier for remote attackers to decrypt traffic.
9517| [CVE-2006-4256] index.php in Horde Application Framework before 3.1.2 allows remote attackers to include web pages from other sites, which could be useful for phishing attacks, via a URL in the url parameter, aka "cross-site referencing." NOTE: some sources have referred to this issue as XSS, but it is different than classic XSS.
9518| [CVE-2006-4032] Unspecified vulnerability in Cisco IOS CallManager Express (CME) allows remote attackers to gain sensitive information (user names) from the Session Initiation Protocol (SIP) user directory via certain SIP messages, aka bug CSCse92417.
9519| [CVE-2006-3676] admin/gallery_admin.php in planetGallery before 14.07.2006 allows remote attackers to execute arbitrary PHP code by uploading files with a double extension and directly accessing the file in the images directory, which bypasses a regular expression check for safe file types.
9520| [CVE-2006-3623] Directory traversal vulnerability in Framework Service component in McAfee ePolicy Orchestrator agent 3.5.0.x and earlier allows remote attackers to create arbitrary files via a .. (dot dot) in the directory and filename in a PropsResponse (PackageType) request.
9521| [CVE-2006-3549] services/go.php in Horde Application Framework 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1 does not properly restrict its image proxy capability, which allows remote attackers to perform "Web tunneling" attacks and use the server as a proxy via (1) http, (2) https, and (3) ftp URL in the url parameter, which is requested from the server.
9522| [CVE-2006-3548] Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1 allow remote attackers to inject arbitrary web script or HTML via a (1) javascript URI or an external (2) http, (3) https, or (4) ftp URI in the url parameter in services/go.php (aka the dereferrer), (5) a javascript URI in the module parameter in services/help (aka the help viewer), and (6) the name parameter in services/problem.php (aka the problem reporting screen).
9523| [CVE-2006-3436] Cross-site scripting (XSS) vulnerability in Microsoft .NET Framework 2.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving "ASP.NET controls that set the AutoPostBack property to true".
9524| [CVE-2006-3107] Multiple PHP remote file inclusion vulnerabilities in Docebo 3.0.3 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in (1) GLOBALS[where_framework] to (a) admin/modules/news/news_class.php and (b) admin/modules/content/content_class.php, and (2) GLOBALS[where_cms] to (c) admin/modules/block_media/util.media.php. NOTE: this issue might be resultant from a global overwrite vulnerability. This issue is similar to CVE-2006-2576, but the vectors are different.
9525| [CVE-2006-2973] Multiple SQL injection vulnerabilities in month.php in PHP Lite Calendar Express 2.2 allow remote attackers to execute arbitrary SQL commands via the (1) catid and (2) cid parameter. NOTE: this might be a duplicate of CVE-2005-4009.c.
9526| [CVE-2006-2878] The spellchecker (spellcheck.php) in DokuWiki 2006/06/04 and earlier allows remote attackers to insert and execute arbitrary PHP code via "complex curly syntax" that is inserted into a regular expression that is processed by preg_replace with the /e (executable) modifier.
9527| [CVE-2006-2864] Multiple PHP remote file inclusion vulnerabilities in BlueShoes Framework 4.6 allow remote attackers to execute arbitrary PHP code via a URL in the (1) APP[path][applications] parameter to (a) Bs_Faq.class.php, (2) APP[path][core] parameter to (b) fileBrowserInner.php, (c) file.php, and (d) viewer.php, and (e) Bs_ImageArchive.class.php, (3) GLOBALS[APP][path][core] parameter to (f) Bs_Ml_User.class.php, or (4) APP[path][plugins] parameter to (g) Bs_Wse_Profile.class.php.
9528| [CVE-2006-2766] Buffer overflow in INETCOMM.DLL, as used in Microsoft Internet Explorer 6.0 through 6.0 SP2, Windows Explorer, Outlook Express 6, and possibly other programs, allows remote user-assisted attackers to cause a denial of service (application crash) via a long mhtml URI in the URL value in a URL file.
9529| [CVE-2006-2576] Multiple PHP remote file inclusion vulnerabilities in Docebo 3.0.3 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in (1) GLOBALS[where_framework] to (a) lib.simplesel.php, (b) lib.filelist.php, (c) tree.documents.php, (d) lib.repo.php, and (e) lib.php, and (2) GLOBALS[where_scs] to (f) lib.teleskill.php. NOTE: this issue might be resultant from a global overwrite vulnerability.
9530| [CVE-2006-2386] Unspecified vulnerability in Microsoft Outlook Express 6 and earlier allows remote attackers to execute arbitrary code via a crafted contact record in a Windows Address Book (WAB) file.
9531| [CVE-2006-2228] Cross-site scripting (XSS) vulnerability in w-Agora (aka Web-Agora) 4.2.0 allows remote attackers to inject arbitrary web script or HTML via a post with a BBCode tag that contains a JavaScript event name followed by whitespace before the '=' (equals) character, which bypasses a restrictive regular expression that attempts to remove onmouseover and other events.
9532| [CVE-2006-2168] FileProtection Express 1.0.1 and earlier allows remote attackers to bypass authentication via a cookie with an Admin value of 1.
9533| [CVE-2006-2166] Unspecified vulnerability in the HTTP management interface in Cisco Unity Express (CUE) 2.2(2) and earlier, when running on any CUE Advanced Integration Module (AIM) or Network Module (NM), allows remote authenticated attackers to reset the password for any user with an expired password.
9534| [CVE-2006-2111] A component in Microsoft Outlook Express 6 allows remote attackers to bypass domain restrictions and obtain sensitive information via redirections with the mhtml: URI handler, as originally reported for Internet Explorer 6 and 7, aka "URL Redirect Cross Domain Information Disclosure Vulnerability."
9535| [CVE-2006-2059] action_public/search.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote attackers to execute arbitrary PHP code via a search with a crafted value of the lastdate parameter, which alters the behavior of a regular expression to add a "#e" (execute) modifier.
9536| [CVE-2006-1961] Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13, Hosting Solution Engine (HSE) and User Registration Tool (URT) before 20060419, and all versions of Ethernet Subscriber Solution Engine (ESSE) and CiscoWorks2000 Service Management Solution (SMS) allow local users to gain Linux shell access via shell metacharacters in arguments to the "show" command in the application's command line interface (CLI), aka bug ID CSCsd21502 (WLSE), CSCsd22861 (URT), and CSCsd22859 (HSE). NOTE: other issues might be addressed by the Cisco advisory.
9537| [CVE-2006-1960] Cross-site scripting (XSS) vulnerability in the appliance web user interface in Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13 allows remote attackers to inject arbitrary web script or HTML, possibly via the displayMsg parameter to archiveApplyDisplay.jsp, aka bug ID CSCsc01095.
9538| [CVE-2006-1909] Directory traversal vulnerability in index.php in Coppermine 1.4.4 allows remote attackers to read arbitrary files via a .//./ (modified dot dot slash) in the file parameter, which causes a regular expression to collapse the sequences into standard "../" sequences.
9539| [CVE-2006-1895] Direct static code injection vulnerability in includes/template.php in phpBB allows remote authenticated users with write access to execute arbitrary PHP code by modifying a template in a way that (1) bypasses a loose ".*" regular expression to match BEGIN and END statements in overall_header.tpl, or (2) is used in an eval statement by includes/bbcode.php for bbcode.tpl.
9540| [CVE-2006-1885] Multiple unspecified vulnerabilities in the Reporting Framework component in Oracle Enterprise Manager 9.0.1.5 and 9.2.0.7 have unknown impact and attack vectors, aka Vuln# (1) EM01 and (2) EM02.
9541| [CVE-2006-1737] Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary bytecode via JavaScript with a large regular expression.
9542| [CVE-2006-1526] Buffer overflow in the X render (Xrender) extension in X.org X server 6.8.0 up to allows attackers to cause a denial of service (crash), as demonstrated by the (1) XRenderCompositeTriStrip and (2) XRenderCompositeTriFan requests in the rendertest from XCB xcb/xcb-demo, which leads to an incorrect memory allocation due to a typo in an expression that uses a "&" instead of a "*" operator. NOTE: the subject line of the original announcement used an incorrect CVE number for this issue.
9543| [CVE-2006-1520] Format string vulnerability in ANSI C Sender Policy Framework library (libspf) before 1.0.0-p5, when debugging is enabled, allows remote attackers to execute arbitrary code via format string specifiers, possibly in an e-mail address.
9544| [CVE-2006-1511] Buffer overflow in the ILASM assembler in the Microsoft .NET 1.0 and 1.1 Framework might allow user-assisted attackers to execute arbitrary code via a .il file that calls a function with a long name.
9545| [CVE-2006-1491] Eval injection vulnerability in Horde Application Framework versions 3.0 before 3.0.10 and 3.1 before 3.1.1 allows remote attackers to execute arbitrary code via the help viewer.
9546| [CVE-2006-1401] Multiple cross-site scripting (XSS) vulnerabilities in search.php in Calendar Express 2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) allwords or (2) oneword parameter. NOTE: the provenance of this information is unknown
9547| [CVE-2006-1352] BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and WebLogic Server 6.1 SP7 and earlier allow remote attackers to cause a denial of service (memory exhaustion) via crafted non-canonicalized XML documents.
9548| [CVE-2006-1300] Microsoft .NET framework 2.0 (ASP.NET) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1 allows remote attackers to bypass access restrictions via unspecified "URL paths" that can access Application Folder objects "explicitly by name."
9549| [CVE-2006-1260] Horde Application Framework 3.0.9 allows remote attackers to read arbitrary files via a null character in the url parameter in services/go.php, which bypasses a sanity check.
9550| [CVE-2006-1244] Unspecified vulnerability in certain versions of xpdf after 3.00, as used in various products including (a) pdfkit.framework, (b) gpdf, (c) pdftohtml, and (d) libextractor, has unknown impact and user-assisted attack vectors, possibly involving errors in (1) gmem.c, (2) SplashXPathScanner.cc, (3) JBIG2Stream.cc, (4) JPXStream.cc, and/or (5) Stream.cc. NOTE: this description is based on Debian advisory DSA 979, which is based on changes that were made after other vulnerabilities such as CVE-2006-0301 and CVE-2005-3624 through CVE-2005-3628 were fixed. Some of these newer fixes appear to be security-relevant, although it is not clear if they fix specific issues or are defensive in nature.
9551| [CVE-2006-0907] SQL injection vulnerability in PHP-Nuke before 7.8 Patched 3.2 allows remote attackers to execute arbitrary SQL commands via encoded /%2a (/*) sequences in the query string, which bypasses regular expressions that are intended to protect against SQL injection, as demonstrated via the kala parameter.
9552| [CVE-2006-0860] Multiple cross-site scripting (XSS) vulnerabilities in Michael Salzer Guestbox 0.6, and other versions before 0.8, allow remote attackers to inject arbitrary web script or HTML via (1) HTML tags that follow a "http://" string, which bypasses a regular expression check, and (2) other unspecified attack vectors.
9553| [CVE-2006-0758] Multiple cross-site scripting (XSS) vulnerabilities in HiveMail 1.3 and earlier allow remote attackers to inject arbitrary web script or HTML via a URL encoded expression in the query string in (1) index.php and (2) possibly certain other scripts, which is not properly cleansed when accessed from the $_SERVER['PHP_SELF'] variable.
9554| [CVE-2006-0635] Tiny C Compiler (TCC) 0.9.23 (aka TinyCC) evaluates the "i>sizeof(int)" expression to false when i equals -1, which might introduce integer overflow vulnerabilities into applications that could be exploited by context-dependent attackers.
9555| [CVE-2006-0634] Borland C++Builder 6 (BCB6) with Update Pack 4 Enterprise edition (ent_upd4) evaluates the "i>sizeof(int)" expression to false when i equals -1, which might introduce integer overflow vulnerabilities into applications that could be exploited by context-dependent attackers.
9556| [CVE-2006-0461] Cross-site scripting (XSS) vulnerability in core.input.php in ExpressionEngine 1.4.1 allows remote attackers to inject arbitrary web script or HTML via HTTP_REFERER (referer).
9557| [CVE-2006-0432] Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 9.0, when an Administrator uses the WebLogic Administration Console to add custom security policies, causes incorrect policies to be created, which prevents the server from properly protecting JNDI resources.
9558| [CVE-2006-0431] Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 8.1 SP5 allows untrusted applications to obtain the server's SSL identity via unknown attack vectors.
9559| [CVE-2006-0430] Certain configurations of BEA WebLogic Server and WebLogic Express 9.0, 8.1 through SP5, and 7.0 through SP6, when connection filters are enabled, cause the server to run more slowly, which makes it easier for remote attackers to cause a denial of service (server slowdown).
9560| [CVE-2006-0429] BEA WebLogic Server and WebLogic Express 9.0 causes new security providers to appear active even if they have not been activated by a server reboot, which could cause an administrator to perform inappropriate, security-relevant actions.
9561| [CVE-2006-0427] Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 9.0 and 8.1 through SP5 allows malicious EJBs or servlet applications to decrypt system passwords, possibly by accessing functionality that should have been restricted.
9562| [CVE-2006-0426] BEA WebLogic Server and WebLogic Express 8.1 through SP4, when configuration auditing is enabled and a password change occurs, stores the old and new passwords in cleartext in the DefaultAuditRecorder.log file, which could allow attackers to gain privileges.
9563| [CVE-2006-0424] BEA WebLogic Server and WebLogic Express 8.1 through SP4, 7.0 through SP6, and 6.1 through SP7 allows remote authenticated guest users to read the server log and obtain sensitive configuration information.
9564| [CVE-2006-0422] Multiple unspecified vulnerabilities in BEA WebLogic Server and WebLogic Express 8.1 through SP4, 7.0 through SP6, and 6.1 through SP7 allow remote attackers to access MBean attributes or cause an unspecified denial of service via unknown attack vectors.
9565| [CVE-2006-0421] By design, BEA WebLogic Server and WebLogic Express 7.0 and 6.1, when creating multiple domains from the same WebLogic instance on the same machine, allows administrators of any created domain to access other created domains, which could allow administrators to gain privileges that were not intended.
9566| [CVE-2006-0420] BEA WebLogic Server and WebLogic Express 8.1 through SP4 and 7.0 through SP6 does not properly handle when servlets use relative forwarding, which allows remote attackers to cause a denial of service (slowdown) via unknown attack vectors that cause "looping stack overflow errors."
9567| [CVE-2006-0419] BEA WebLogic Server and WebLogic Express 9.0, 8.1 through SP5, and 7.0 through SP6 allows anonymous binds to the embedded LDAP server, which allows remote attackers to read user entries or cause a denial of service (unspecified) via a large number of connections.
9568| [CVE-2006-0391] Directory traversal vulnerability in the BOM framework in Mac OS X 10.x before 10.3.9 and 10.4 before 10.4.5 allows user-assisted attackers to overwrite or create arbitrary files via an archive that is handled by BOMArchiveHelper.
9569| [CVE-2006-0301] Heap-based buffer overflow in Splash.cc in xpdf, as used in other products such as (1) poppler, (2) kdegraphics, (3) gpdf, (4) pdfkit.framework, and others, allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap.
9570| [CVE-2006-0046] squid_redirect script in adzapper before 2006-01-29 allows remote attackers to cause a denial of service (CPU consumption) via a URL with a large number of trailing / (forward slashes), which might produce inefficient regular expressions.
9571| [CVE-2006-0014] Buffer overflow in Microsoft Outlook Express 5.5 and 6 allows remote attackers to execute arbitrary code via a crafted Windows Address Book (WAB) file containing "certain Unicode strings" and modified length values.
9572| [CVE-2005-4872] Perl-Compatible Regular Expression (PCRE) library before 6.2 does not properly count the number of named capturing subpatterns, which allows context-dependent attackers to cause a denial of service (crash) via a regular expression with a large number of named subpatterns, which triggers a buffer overflow. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
9573| [CVE-2005-4840] The Outlook Express Address Book control, when using Internet Explorer 6, allows remote attackers to cause a denial of service (NULL dereference and browser crash) by creating the OutlookExpress.AddressBook COM object, which is not intended for use within Internet Explorer.
9574| [CVE-2005-4794] Cisco IP Phones 7902/7905/7912, ATA 186/188, Unity Express, ACNS, and Subscriber Edge Services Manager (SESM) allows remote attackers to cause a denial of service (crash or instability) via a compressed DNS packet with a label length byte with an incorrect offset.
9575| [CVE-2005-4767] BEA WebLogic Server and WebLogic Express 8.1 SP5 and earlier, and 7.0 SP6 and earlier, when using username/password authentication, does not lock out a username after the maximum number of invalid login attempts, which makes it easier for remote attackers to guess the password.
9576| [CVE-2005-4766] BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, and 7.0 SP5 and earlier, do not encrypt multicast traffic, which might allow remote attackers to read sensitive cluster synchronization messages by sniffing the multicast traffic.
9577| [CVE-2005-4765] BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier and 7.0 SP6 and earlier, when using the weblogic.Deployer command with the t3 protocol, does not use the secure t3s protocol even when an Administration port is enabled on the Administration server, which might allow remote attackers to sniff the connection.
9578| [CVE-2005-4764] BEA WebLogic Server and WebLogic Express 9.0, 8.1, and 7.0 lock out the admin user account after multiple incorrect password guesses, which allows remote attackers who know or guess the admin account name to cause a denial of service (blocked admin logins).
9579| [CVE-2005-4763] BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier, when Internet Inter-ORB Protocol (IIOP) is used, sometimes include a password in an exception message that is sent to a client or stored in a log file, which might allow remote attackers to perform unauthorized actions.
9580| [CVE-2005-4762] BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier sometimes stores the boot password in the registry in cleartext, which might allow local users to gain administrative privileges.
9581| [CVE-2005-4761] BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP5 and earlier, and 6.1 SP7 and earlier log the Java command line at server startup, which might include sensitive information (passwords or keyphrases) in the server log file when the -D option is used.
9582| [CVE-2005-4760] BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier, and 7.0 SP5 and earlier, when fullyDelegatedAuthorization is enabled for a servlet, does not cause servlet deployment to fail when failures occur in authorization or role providers, which might prevent the servlet from being "fully protected."
9583| [CVE-2005-4759] BEA WebLogic Server and WebLogic Express 8.1 and 7.0, during a migration across operating system platforms, do not warn the administrative user about platform differences in URLResource case sensitivity, which might cause local users to inadvertently lose protection of Web Application pages.
9584| [CVE-2005-4758] Unspecified vulnerability in the Administration server in BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier allows remote authenticated Admin users to read arbitrary files via unknown attack vectors related to an "internal servlet" accessed through HTTP.
9585| [CVE-2005-4757] BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier, and 7.0 SP5 and earlier, do not properly "constrain" a "/" (slash) servlet root URL pattern, which might allow remote attackers to bypass intended servlet protections.
9586| [CVE-2005-4756] BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, and 7.0 SP5 and earlier, do not properly validate derived Principals with multiple PrincipalValidators, which might allow attackers to gain privileges.
9587| [CVE-2005-4755] BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier (1) stores the private key passphrase (CustomTrustKeyStorePassPhrase) in cleartext in nodemanager.config
9588| [CVE-2005-4754] BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier allow remote attackers to obtain sensitive information (intranet IP addresses) via unknown attack vectors involving "network address translation."
9589| [CVE-2005-4753] BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, and 7.0 SP6 and earlier, in certain "heavy usage" scenarios, report incorrect severity levels for an audit event, which might allow attackers to perform unauthorized actions and avoid detection.
9590| [CVE-2005-4752] BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, and 7.0 SP6 and earlier, might allow local users to gain privileges by using the run-as deployment descriptor element to change the privileges of a web application or EJB from the Deployer security role to the Admin security role.
9591| [CVE-2005-4751] Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and WebLogic Express 9.0, 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier allow remote attackers to inject arbitrary web script or HTML and gain administrative privileges via unknown attack vectors.
9592| [CVE-2005-4750] BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP5 and earlier, and 6.1 SP7 and earlier allow remote attackers to cause a denial of service (server thread hang) via unknown attack vectors.
9593| [CVE-2005-4749] HTTP request smuggling vulnerability in BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier allows remote attackers to inject arbitrary HTTP headers via unspecified attack vectors.
9594| [CVE-2005-4705] BEA WebLogic Server and WebLogic Express 8.1 through SP4, 7.0 through SP6, and 6.1 through SP7, when a Java client application creates an SSL connection to the server after it has already created an insecure connection, will use the insecure connection, which allows remote attackers to sniff the connection.
9595| [CVE-2005-4704] Unspecified vulnerability in BEA WebLogic Server and WebLogic Express 8.1 through SP3, 7.0 through SP6, and 6.1 through SP7, when SSL is intended to be used, causes an unencrypted protocol to be used in certain unspecified circumstances, which causes user credentials to be sent across the network in cleartext and allows remote attackers to gain privileges.
9596| [CVE-2005-4373] Adaptive Website Framework (AWF) 2.10 and earlier allows remote attackers to obtain the full path of the application via an invalid mode parameter to community.html, which leaks the path in an error message.
9597| [CVE-2005-4372] Cross-site scripting (XSS) vulnerability in account.html in Adaptive Website Framework (AWF) 2.10 and earlier allows remote attackers to inject arbitrary web script or HTML via the page parameter.
9598| [CVE-2005-4260] Interpretation conflict in includes/mainfile.php in PHP-Nuke 7.9 and later allows remote attackers to perform cross-site scripting (XSS) attacks by replacing the ">" in the tag with a "<", which bypasses the regular expressions that sanitize the data, but is automatically corrected by many web browsers. NOTE: it could be argued that this vulnerability is due to a design limitation of many web browsers
9599| [CVE-2005-4190] Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework before 3.0.8 allow remote authenticated users to inject arbitrary web script or HTML via multiple vectors, as demonstrated by (1) the identity field, (2) Category and (3) Label search fields, (4) the Mobile Phone field, and (5) Date and (6) Time fields when importing CSV files, as exploited through modules such as (a) Turba Address Book, (b) Kronolith, (c) Mnemo, and (d) Nag.
9600| [CVE-2005-4178] Buffer overflow in Dropbear server before 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.
9601| [CVE-2005-4155] registration.PHP in ATutor 1.5.1 pl2 allows remote attackers to execute arbitrary SQL commands via an e-mail address that ends in a NULL character, which bypasses the PHP regular expression check. NOTE: it is possible that this is actually a bug in PHP code, in which case this should not be treated as a vulnerability in ATutor.
9602| [CVE-2005-4010] SQL injection vulnerability in KBase Express 1.0.0 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) id parameter to category.php and (2) search parameters to search.php.
9603| [CVE-2005-4009] Multiple SQL injection vulnerabilities in PHP Lite Calendar Express 2.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) cid and (2) catid parameters to (a) day.php, (b) week.php, (c) month.php, and (d) year.php.
9604| [CVE-2005-3714] The network interface for Apple AirPort Express 6.x before Firmware Update 6.3, and AirPort Extreme 5.x before Firmware Update 5.7, allows remote attackers to cause a denial of service (unresponsive interface) via malformed packets.
9605| [CVE-2005-3472] Unspecified vulnerability in Sun Java System Communications Express 2005Q1 and 2004Q2 allows local and remote attackers to read sensitive information from configuration files.
9606| [CVE-2005-3431] Absolute path traversal vulnerability in Rockliffe MailSite Express before 6.1.22 allows remote attackers to read arbitrary files via a full pathname in the AttachPath field of a mail message under composition.
9607| [CVE-2005-3430] Incomplete blacklist vulnerability in Rockliffe MailSite Express before 6.1.22 allows remote attackers to upload and execute arbitrary script files by giving the files specific extensions, such as (1) .unk, (2) .asa, and possibly (3) .htr and (4) .aspx, which are not filtered like the .asp extension.
9608| [CVE-2005-3429] Rockliffe MailSite Express before 6.1.22, with the option to save login information enabled, saves user passwords in plaintext in cookies, which allows local users to obtain passwords by reading the cookie file, or remote attackers to obtain the cookies via cross-site scripting (XSS) vulnerabilities.
9609| [CVE-2005-3428] Cross-site scripting (XSS) vulnerability in Rockliffe MailSite Express before 6.1.22 allows remote attackers to inject arbitrary web script or HTML via a message body.
9610| [CVE-2005-3420] usercp_register.php in phpBB 2.0.17 allows remote attackers to modify regular expressions and execute PHP code via the signature_bbcode_uid parameter, as demonstrated by injecting an "e" modifier into a preg_replace statement.
9611| [CVE-2005-3288] Mailsite Express allows remote attackers to upload and execute files with executable extensions such as ASP by attaching the file using the "compose page" feature, then accessing the file from the cache directory before saving or sending the message.
9612| [CVE-2005-3287] Incomplete blacklist vulnerability in Mailsite Express allows remote attackers to upload and possibly execute files via attachments with executable extensions such as ASPX, which are not converted to .TXT like other dangerous extensions, and which can be directly requested from the cache directory.
9613| [CVE-2005-3153] login.php in myBloggie 2.1.3 beta and earlier allows remote attackers to bypass a whitelist regular expression and conduct SQL injection attacks via a username parameter with SQL after a null character, which causes the whitelist check to succeed but injects the SQL into a query string, a different vulnerability than CVE-2005-2838. NOTE: it is possible that this is actually a bug in PHP code, in which case this should not be treated as a myBloggie vulnerability.
9614| [CVE-2005-2554] The web server for Network Associates ePolicy Orchestrator Agent 3.5.0 (patch 3) uses insecure permissions for the "Common Framework\Db" folder, which allows local users to read arbitrary files by creating a subfolder in the EPO agent web root directory.
9615| [CVE-2005-2491] Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
9616| [CVE-2005-2482] The StateToOptions function in msfweb in Metasploit Framework 2.4 and earlier, when running with the -D option (defanged mode), allows attackers to modify temporary environment variables before the "_Defanged" environment option is checked when processing the Exploit command.
9617| [CVE-2005-2368] vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.
9618| [CVE-2005-2226] Microsoft Outlook Express 6.0 leaks the default news server account when a user responds to a "watched" conversation thread, which could allow remote attackers to obtain sensitive information.
9619| [CVE-2005-2170] The LCF component (lcfd) in IBM Tivoli Management Framework Endpoint allows remote attackers to cause a denial of service (process exit and connection loss) by connecting to LCF and ending the connection without sending any data.
9620| [CVE-2005-2169] Directory traversal vulnerability in source.php in Quick & Dirty PHPSource Printer 1.1 and earlier allows remote attackers to read arbitrary files via ".../...//" sequences in the file parameter, which are reduced to "../" when PHPSource Printer uses a regular expression to remove "../" sequences.
9621| [CVE-2005-2151] spf.c in Courier Mail Server does not properly handle DNS failures when looking up Sender Policy Framework (SPF) records, which could allow attackers to cause memory corruption.
9622| [CVE-2005-1749] Buffer overflow in BEA WebLogic Server and WebLogic Express 6.1 Service Pack 4 allows remote attackers to cause a denial of service (CPU consumption from thread looping).
9623| [CVE-2005-1748] The embedded LDAP server in BEA WebLogic Server and Express 8.1 through Service Pack 4, and 7.0 through Service Pack 5, allows remote anonymous binds, which may allow remote attackers to view user entries or cause a denial of service.
9624| [CVE-2005-1747] Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 8.1 through Service Pack 4, and 7.0 through Service Pack 6, allow remote attackers to inject arbitrary web script or HTML, and possibly gain administrative privileges, via the (1) j_username or (2) j_password parameters in the login page (LoginForm.jsp), (3) parameters to the error page in the Administration Console, (4) unknown vectors in the Server Console while the administrator has an active session to obtain the ADMINCONSOLESESSION cookie, or (5) an alternate vector in the Server Console that does not require an active session but also leaks the username and password.
9625| [CVE-2005-1744] BEA WebLogic Server and WebLogic Express 7.0 through Service Pack 5 does not log out users when an application is redeployed, which allows those users to continue to access the application without having to log in again, which may be in violation of newly changed security constraints or role mappings.
9626| [CVE-2005-1743] BEA WebLogic Server and WebLogic Express 8.1 through Service Pack 3 and 7.0 through Service Pack 5 does not properly handle when a security provider throws an exception, which may cause WebLogic to use incorrect identity for the thread, or to fail to audit security exceptions.
9627| [CVE-2005-1742] BEA WebLogic Server and WebLogic Express 8.1 SP2 and SP3 allows users with the Monitor security role to "shrink or reset JDBC connection pools."
9628| [CVE-2005-1336] Buffer overflow in the Foundation framework for Mac OS X 10.3.9 allows local users to execute arbitrary code via a long environment variable.
9629| [CVE-2005-1213] Stack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.
9630| [CVE-2005-1061] The secure script in LogWatch before 2.6-2 allows attackers to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka "logwatch log processing regular expression DoS."
9631| [CVE-2005-0603] viewtopic.php in phpBB 2.0.12 and earlier allows remote attackers to obtain sensitive information via a highlight parameter containing invalid regular expression syntax, which reveals the path in a PHP error message.
9632| [CVE-2005-0576] Unknown vulnerability in Standard Type Services Framework (STSF) Font Server Daemon (stfontserverd) in Solaris 9 allows local users to modify or delete arbitrary files.
9633| [CVE-2005-0289] Apple AirPort Express prior to 6.1.1 and Extreme prior to 5.5.1, configured as a Wireless Data Service (WDS), allows remote attackers to cause a denial of service (device freeze) by connecting to UDP port 161 and before link-state change occurs.
9634| [CVE-2005-0202] Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via ".../....///" sequences, which are not properly cleansed by regular expressions that are intended to remove "../" and "./" sequences.
9635| [CVE-2005-0186] Cisco IOS 12.1YD, 12.2T, 12.3 and 12.3T, when configured for the IOS Telephony Service (ITS), CallManager Express (CME) or Survivable Remote Site Telephony (SRST), allows remote attackers to cause a denial of service (device reboot) via a malformed packet to the SCCP port.
9636| [CVE-2004-2741] Cross-site scripting (XSS) vulnerability in the "help window" (help.php) in Horde Application Framework 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) module, (2) topic, or (3) module parameters.
9637| [CVE-2004-2696] BEA WebLogic Server and WebLogic Express 6.1, 7.0, and 8.1, when using Remote Method Invocation (RMI) over Internet Inter-ORB Protocol (IIOP), does not properly handle when multiple logins for different users coming from the same client, which could cause an "unexpected user identity" to be used in an RMI call.
9638| [CVE-2004-2694] Microsoft Outlook Express 6.0 allows remote attackers to bypass intended access restrictions, load content from arbitrary sources into the Outlook context, and facilitate phishing attacks via a "BASE HREF" with the target set to "_top".
9639| [CVE-2004-2629] Multiple vulnerabilities in the H.323 protocol implementation for First Virtual Communications Click to Meet Express (when used with H.323 conferencing endpoints), Click to Meet Premier, Conference Server, and V-Gate allow remote attackers to cause a denial of service, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.
9640| [CVE-2004-2590] Unspecified vulnerability in meindlSOFT Cute PHP Library (aka cphplib) 0.46 has unknown impact and attack vectors, related to regular expressions.
9641| [CVE-2004-2452] Unknown vulnerability in Hitachi Cosminexus Portal Framework 01-00, 01-01, 01-02, 02-01, 02-02, 02-03, and other versions allows remote attackers to obtain sensitive information in the <ut:cache> tag library.
9642| [CVE-2004-2424] BEA WebLogic Server and WebLogic Express 8.1 through 8.1 SP2 allow remote attackers to cause a denial of service (network port comsumption) via unknown actions in HTTPS sessions, which prevents the server from releasing the network port when the session ends.
9643| [CVE-2004-2401] Stack-based buffer overflow in Ipswitch IMail Express Web Messaging before 8.05 might allow remote attackers to execute arbitrary code via an HTML message with long "tag text."
9644| [CVE-2004-2321] BEA WebLogic Server and Express 8.1 SP1 and earlier allows local users in the Operator role to obtain administrator passwords via MBean attributes, including (1) ServerStartMBean.Password and (2) NodeManagerMBean.CertificatePassword.
9645| [CVE-2004-2320] The default configuration of BEA WebLogic Server and Express 8.1 SP2 and earlier, 7.0 SP4 and earlier, 6.1 through SP6, and 5.1 through SP13 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.
9646| [CVE-2004-2210] Multiple cross-site scripting (XSS) vulnerabilities in Express-Web Content Management System (CMS) allow remote attackers to steal cookie-based authentication information and possibly perform other exploits via the (1) n, (2) b, (3) e, or (4) a parameters to default.asp, (5) the Referer header in an HTTP request to login.asp, or (6) the email parameter to subscribe/default.asp.
9647| [CVE-2004-2137] Outlook Express 6.0, when sending multipart e-mail messages using the "Break apart messages larger than" setting, leaks the BCC recipients of the message to the addresses listed in the To and CC fields, which may allow remote attackers to obtain sensitive information.
9648| [CVE-2004-2067] SQL injection vulnerability in controlpanel.php in Jaws Framework and Content Management System 0.4 allows remote attackers to execute arbitrary SQL and bypass authentication via the (1) user, (2) password, or (3) crypted_password parameters.
9649| [CVE-2004-1758] BEA WebLogic Server and WebLogic Express version 8.1 up to SP2, 7.0 up to SP4, and 6.1 up to SP6 may store the database username and password for an untargeted JDBC connection pool in plaintext in config.xml, which allows local users to gain privileges.
9650| [CVE-2004-1757] BEA WebLogic Server and Express 8.1, SP1 and earlier, stores the administrator password in cleartext in config.xml, which allows local users to gain privileges.
9651| [CVE-2004-1756] BEA WebLogic Server and WebLogic Express 8.1 SP2 and earlier, and 7.0 SP4 and earlier, when using 2-way SSL with a custom trust manager, may accept a certificate chain even if the trust manager rejects it, which allows remote attackers to spoof other users or servers.
9652| [CVE-2004-1755] The Web Services fat client for BEA WebLogic Server and Express 7.0 SP4 and earlier, when using 2-way SSL and multiple certificates to connect to the same URL, may use the incorrect identity after the first connection, which could allow users to gain privileges.
9653| [CVE-2004-1182] hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.
9654| [CVE-2004-1081] The Application Framework (AppKit) for Apple Mac OS X 10.2.8 and 10.3.6 does not properly restrict access to a secure text input field, which allows local users to read keyboard input from other applications within the same window session.
9655| [CVE-2004-0822] Buffer overflow in The Core Foundation framework (CoreFoundation.framework) in Mac OS X 10.2.8, 10.3.4, and 10.3.5 allows local users to execute arbitrary code via a certain environment variable.
9656| [CVE-2004-0821] The CFPlugIn in Core Foundation framework in Mac OS X allows user supplied libraries to be loaded, which could allow local users to gain privileges.
9657| [CVE-2004-0715] The WebLogic Authentication provider for BEA WebLogic Server and WebLogic Express 8.1 through SP2 and 7.0 through SP4 does not properly clear member relationships when a group is deleted, which can cause a new group with the same name to have the members of the old group, which allows group members to gain privileges.
9658| [CVE-2004-0713] The remove method in a stateful Enterprise JavaBean (EJB) in BEA WebLogic Server and WebLogic Express version 8.1 through SP2, 7.0 through SP4, and 6.1 through SP6, does not properly check EJB permissions before unexporting a bean, which allows remote authenticated users to remove EJB objects from remote views before the security exception is thrown.
9659| [CVE-2004-0672] Multiple cross-site scripting (XSS) vulnerabilities in the primary and management web interfaces in Netegrity IdentityMinder Web Edition 5.6 allows remote attackers to execute script as other users via (1) script that starts with %00 in the numOfExpressions parameter or (2) the mobjtype parameter.
9660| [CVE-2004-0652] BEA WebLogic Server and WebLogic Express 7.0 through 7.0 Service Pack 4, and 8.1 through 8.1 Service Pack 2, allows attackers to obtain the username and password for booting the server by directly accessing certain internal methods.
9661| [CVE-2004-0471] BEA WebLogic Server and WebLogic Express 7.0 through SP5 and 8.1 through SP2 does not enforce site restrictions for starting and stopping servers for users in the Admin and Operator security roles, which allows unauthorized users to cause a denial of service (service shutdown).
9662| [CVE-2004-0470] BEA WebLogic Server and WebLogic Express 7.0 through SP5 and 8.1 through SP2, when editing weblogic.xml using WebLogic Builder or the SecurityRoleAssignmentMBean.toXML method, inadvertently removes security-role-assignment tags when weblogic.xml does not have a principal-name tag, which can remove intended access restrictions for the associated web application.
9663| [CVE-2004-0380] The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."
9664| [CVE-2004-0215] Microsoft Outlook Express 5.5 and 6 allows attackers to cause a denial of service (application crash) via a malformed e-mail header.
9665| [CVE-2003-1572] Sun Java Media Framework (JMF) 2.1.1 through 2.1.1c allows unsigned applets to cause a denial of service (JVM crash) and read or write unauthorized memory locations via the ReadEnv class, as demonstrated by reading environment variables using modified .data and .size fields.
9666| [CVE-2003-1440] SpamProbe 0.8a allows remote attackers to cause a denial of service (crash) via HTML e-mail with newline characters within an href tag, which is not properly handled by certain regular expressions.
9667| [CVE-2003-1438] Race condition in BEA WebLogic Server and Express 5.1 through 7.0.0.1, when using in-memory session replication or replicated stateful session beans, causes the same buffer to be provided to two users, which could allow one user to see session data that was intended for another user.
9668| [CVE-2003-1437] BEA WebLogic Express and WebLogic Server 7.0 and 7.0.0.1, stores passwords in plaintext when a keystore is used to store a private key or trust certificate authorities, which allows local users to gain access.
9669| [CVE-2003-1419] Netscape 7.0 allows remote attackers to cause a denial of service (crash) via a web page with an invalid regular expression argument to the JavaScript reformatDate function.
9670| [CVE-2003-1378] Microsoft Outlook Express 6.0 and Outlook 2000, with the security zone set to Internet Zone, allows remote attackers to execute arbitrary programs via an HTML email with the CODEBASE parameter set to the program, a vulnerability similar to CAN-2002-0077.
9671| [CVE-2003-1290] BEA WebLogic Server and WebLogic Express 6.1, 7.0, and 8.1, with RMI and anonymous admin lookup enabled, allows remote attackers to obtain configuration information by accessing MBeanHome via the Java Naming and Directory Interface (JNDI).
9672| [CVE-2003-1226] BEA WebLogic Server and Express 7.0 and 7.0.0.1 stores certain secrets concerning password encryption insecurely in config.xml, filerealm.properties, and weblogic-rar.xml, which allows local users to learn those secrets and decrypt passwords.
9673| [CVE-2003-1225] The default CredentialMapper for BEA WebLogic Server and Express 7.0 and 7.0.0.1 stores passwords in cleartext on disk, which allows local users to extract passwords.
9674| [CVE-2003-1224] Weblogic.admin for BEA WebLogic Server and Express 7.0 and 7.0.0.1 displays the JDBCConnectionPoolRuntimeMBean password to the screen in cleartext, which allows attackers to read a user's password by physically observing ("shoulder surfing") the screen.
9675| [CVE-2003-1223] The Node Manager for BEA WebLogic Express and Server 6.1 through 8.1 SP 1 allows remote attackers to cause a denial of service (Node Manager crash) via malformed data to the Node Manager's port, as demonstrated by nmap.
9676| [CVE-2003-1222] BEA Weblogic Express and Server 8.0 through 8.1 SP 1, when using a foreign Java Message Service (JMS) provider, echoes the password for the foreign provider to the console and stores it in cleartext in config.xml, which could allow attackers to obtain the password.
9677| [CVE-2003-1221] BEA WebLogic Express and Server 7.0 through 8.1 SP 1, under certain circumstances when a request to use T3 over SSL (t3s) is made to the insecure T3 port, may use a non-SSL connection for the communication, which could allow attackers to sniff sessions.
9678| [CVE-2003-1220] BEA WebLogic Server proxy plugin for BEA Weblogic Express and Server 6.1 through 8.1 SP 1 allows remote attackers to cause a denial of service (proxy plugin crash) via a malformed URL.
9679| [CVE-2003-1113] The Session Initiation Protocol (SIP) implementation in IPTel SIP Express Router 0.8.9 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.
9680| [CVE-2003-1105] Unknown vulnerability in Internet Explorer 5.01 SP3 through 6.0 SP1 allows remote attackers to cause a denial of service (browser or Outlook Express crash) via HTML with certain input tags that are not properly rendered.
9681| [CVE-2003-1095] BEA WebLogic Server and Express 7.0 and 7.0.0.1, when using "memory" session persistence for web applications, does not clear authentication information when a web application is redeployed, which could allow users of that application to gain access without having to re-authenticate.
9682| [CVE-2003-1094] BEA WebLogic Server and Express version 7.0 SP3 may follow certain code execution paths that result in an incorrect current user, such as in the frequent use of JNDI initial contexts, which could allow remote authenticated users to gain privileges.
9683| [CVE-2003-0733] Multiple cross-site scripting (XSS) vulnerabilities in WebLogic Integration 7.0 and 2.0, Liquid Data 1.1, and WebLogic Server and Express 5.1 through 7.0, allow remote attackers to execute arbitrary web script and steal authentication credentials via (1) a forward instruction to the Servlet container or (2) other vulnerabilities in the WebLogic Server console application.
9684| [CVE-2003-0640] BEA WebLogic Server and Express, when using NodeManager to start servers, provides Operator users with privileges to overwrite usernames and passwords, which may allow Operators to gain Admin privileges.
9685| [CVE-2003-0542] Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache before 1.3.29 allow attackers to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.
9686| [CVE-2003-0301] The IMAP Client for Outlook Express 6.00.2800.1106 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors.
9687| [CVE-2003-0151] BEA WebLogic Server and Express 6.0 through 7.0 does not properly restrict access to certain internal servlets that perform administrative functions, which allows remote attackers to read arbitrary files or execute arbitrary code.
9688| [CVE-2002-2202] Outlook Express 6.0 does not delete messages from dbx files, even when a user empties the Deleted items folder, which allows local users to read other users email.
9689| [CVE-2002-2177] BEA WebLogic Server and Express 6.1 through 7.0.0.1 buffers HTTP requests in a way that can cause BEA to send the same response for two different HTTP requests, which could allow remote attackers to obtain sensitive information that was intended for other users.
9690| [CVE-2002-2175] phpSquidPass before 0.2 uses an incomplete regular expression to find a matching username in its database, which allows remote authenticated attackers to effectively delete other usernames via a short username that matches the end of the targeted username.
9691| [CVE-2002-2164] Buffer overflow in Microsoft Outlook Express 5.0, 5.5, and 6.0 allows remote attackers to cause a denial of service (crash) via a long <A HREF> link.
9692| [CVE-2002-2142] An undocumented extension for the Servlet mappings in the Servlet 2.3 specification, when upgrading to WebLogic Server and Express 7.0 Service Pack 1 from BEA WebLogic Server and Express 6.0 through 7.0.0.1, does not prepend a "/" character in certain URL patterns, which prevents the proper enforcement of role mappings and policies in applications that use the extension.
9693| [CVE-2002-2141] BEA WebLogic Server and Express 7.0 and 7.0.0.1, when running Servlets and Enterprise JavaBeans (EJB) on more than one server, will remove the security constraints and roles on all servers for any Servlets or EJB that are used by an application that is undeployed on one server, which could allow remote attackers to conduct unauthorized activities in violation of the intended restrictions.
9694| [CVE-2002-1527] emumail.cgi in EMU Webmail 5.0 allows remote attackers to determine the full pathname for emumail.cgi via a malformed string containing script, which generates a regular expression matching error that includes the pathname in the resulting error message.
9695| [CVE-2002-1179] Buffer overflow in the S/MIME Parsing capability in Microsoft Outlook Express 5.5 and 6.0 allows remote attackers to execute arbitrary code via a digitally signed email with a long "From" address, which triggers the overflow when the user views or previews the message.
9696| [CVE-2002-1169] IBM Web Traffic Express Caching Proxy Server 3.6 and 4.x before 4.0.1.26 allows remote attackers to cause a denial of service (crash) via an HTTP request to helpout.exe with a missing HTTP version number, which causes ibmproxy.exe to crash.
9697| [CVE-2002-1168] Cross-site scripting (XSS) vulnerability in IBM Web Traffic Express Caching Proxy Server 3.6 and 4.x before 4.0.1.26 allows remote attackers to execute script as other users via an HTTP request that contains an Location: header with a "%0a%0d" (CRLF) sequence, which echoes the Location as an HTTP header in the server response.
9698| [CVE-2002-1167] Cross-site scripting (XSS) vulnerability in IBM Web Traffic Express Caching Proxy Server 3.6 and 4.x before 4.0.1.26 allows remote attackers to execute script as other users via an HTTP GET request.
9699| [CVE-2002-1121] SMTP content filter engines, including (1) GFI MailSecurity for Exchange/SMTP before 7.2, (2) InterScan VirusWall before 3.52 build 1494, (3) the default configuration of MIMEDefang before 2.21, and possibly other products, do not detect fragmented emails as defined in RFC2046 ("Message Fragmentation and Reassembly") and supported in such products as Outlook Express, which allows remote attackers to bypass content filtering, including virus checking, via fragmented emails of the message/partial content type.
9700| [CVE-2002-1030] Race condition in Performance Pack in BEA WebLogic Server and Express 5.1.x, 6.0.x, 6.1.x and 7.0 allows remote attackers to cause a denial of service (crash) via a flood of data and connections.
9701| [CVE-2002-1012] Buffer overflow in web server for Tivoli Management Framework (TMF) ManagedNode 3.6.x through 3.7.1 allows remote attackers to cause a denial of service or execute arbitrary code via a long HTTP GET request.
9702| [CVE-2002-1011] Buffer overflow in web server for Tivoli Management Framework (TMF) Endpoint 3.6.x through 3.7.1, before Fixpack 2, allows remote attackers to cause a denial of service or execute arbitrary code via a long HTTP GET request.
9703| [CVE-2002-0896] The throttle capability in Swatch may fail to report certain events if (1) the same type of event occurs after the throttle period, or (2) when multiple events matching the same "watchfor" expression do not occur after the throttle period, which could allow attackers to avoid detection.
9704| [CVE-2002-0862] The (1) CertGetCertificateChain, (2) CertVerifyCertificateChainPolicy, and (3) WinVerifyTrust APIs within the CryptoAPI for Microsoft products including Microsoft Windows 98 through XP, Office for Mac, Internet Explorer for Mac, and Outlook Express for Mac, do not properly verify the Basic Constraints of intermediate CA-signed X.509 certificates, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack for SSL sessions, as originally reported for Internet Explorer and IIS.
9705| [CVE-2002-0637] InterScan VirusWall 3.52 build 1462 allows remote attackers to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka "space gap"), such as (1) Content-Type :", (2) "Content-Transfer-Encoding :", (3) no space before a boundary declaration, or (4) "boundary= ", which is processed by Outlook Express.
9706| [CVE-2002-0505] Memory leak in the Call Telephony Integration (CTI) Framework authentication for Cisco CallManager 3.0 and 3.1 before 3.1(3) allows remote attackers to cause a denial of service (crash and reload) via a series of authentication failures, e.g. via incorrect passwords.
9707| [CVE-2002-0339] Cisco IOS 11.1CC through 12.2 with Cisco Express Forwarding (CEF) enabled includes portions of previous packets in the padding of a MAC level packet when the MAC packet's length is less than the IP level packet length.
9708| [CVE-2002-0285] Outlook Express 5.5 and 6.0 on Windows treats a carriage return ("CR") in a message header as if it were a valid carriage return/line feed combination (CR/LF), which could allow remote attackers to bypass virus protection and or other filtering mechanisms via a mail message with headers that only contain the CR, which causes Outlook to create separate headers.
9709| [CVE-2002-0233] Directory traversal vulnerability in eshare Expressions 4 Web server allows remote attackers to read arbitrary files via a .. (dot dot) in an HTTP request.
9710| [CVE-2002-0152] Buffer overflow in various Microsoft applications for Macintosh allows remote attackers to cause a denial of service (crash) or execute arbitrary code by invoking the file:// directive with a large number of / characters, which affects Internet Explorer 5.1, Outlook Express 5.0 through 5.0.2, Entourage v. X and 2001, PowerPoint v. X, 2001, and 98, and Excel v. X and 2001 for Macintosh.
9711| [CVE-2001-1547] Outlook Express 6.0, with "Do not allow attachments to be saved or opened that could potentially be a virus" enabled, does not block email attachments from forwarded messages, which could allow remote attackers to execute arbitrary code.
9712| [CVE-2001-1325] Internet Explorer 5.0 and 5.5, and Outlook Express 5.0 and 5.5, allow remote attackers to execute scripts when Active Scripting is disabled by including the scripts in XML stylesheets (XSL) that are referenced using an IFRAME tag, possibly due to a vulnerability in Windows Scripting Host (WSH).
9713| [CVE-2001-1088] Microsoft Outlook 8.5 and earlier, and Outlook Express 5 and earlier, with the "Automatically put people I reply to in my address book" option enabled, do not notify the user when the "Reply-To" address is different than the "From" address, which could allow an untrusted remote attacker to spoof legitimate addresses and intercept email from the client that is intended for another user.
9714| [CVE-2001-1072] Apache with mod_rewrite enabled on most UNIX systems allows remote attackers to bypass RewriteRules by inserting extra / (slash) characters into the requested path, which causes the regular expression in the RewriteRule to fail.
9715| [CVE-2001-0999] Outlook Express 6.00 allows remote attackers to execute arbitrary script by embedding SCRIPT tags in a message whose MIME content type is text/plain, contrary to the expected behavior that text/plain messages will not run script.
9716| [CVE-2001-0945] Buffer overflow in Outlook Express 5.0 through 5.02 for Macintosh allows remote attackers to cause a denial of service via an e-mail message that contains a long line.
9717| [CVE-2001-0472] Hursley Software Laboratories Consumer Transaction Framework (HSLCTF) HTTP object allows remote attackers to cause a denial of service (crash) via an extremely long HTTP request.
9718| [CVE-2001-0145] Buffer overflow in VCard handler in Outlook 2000 and 98, and Outlook Express 5.x, allows an attacker to execute arbitrary commands via a malformed vCard birthday field.
9719| [CVE-2000-1239] The HTTP interface of Tivoli Lightweight Client Framework (LCF) in IBM Tivoli Management Framework 3.7.1 sets http_disable to zero at install time, which allows remote authenticated users to bypass file permissions on Tivoli Endpoint Configuration data files via an unspecified manipulation of log files.
9720| [CVE-2000-1238] BEA Systems WebLogic Express and WebLogic Server 5.1 SP1-SP6 allows remote attackers to bypass access controls for restricted JSP or servlet pages via a URL with multiple / (forward slash) characters before the restricted pages.
9721| [CVE-2000-0913] mod_rewrite in Apache 1.3.12 and earlier allows remote attackers to read arbitrary files if a RewriteRule directive is expanded to include a filename whose name contains a regular expression.
9722| [CVE-2000-0882] Intel Express 500 series switches allow a remote attacker to cause a denial of service via a malformed ICMP packet, which causes the CPU to crash.
9723| [CVE-2000-0764] Intel Express 500 series switches allow a remote attacker to cause a denial of service via a malformed IP packet.
9724| [CVE-2000-0653] Microsoft Outlook Express allows remote attackers to monitor a user's email by creating a persistent browser link to the Outlook Express windows, aka the "Persistent Mail-Browser Link" vulnerability.
9725| [CVE-2000-0621] Microsoft Outlook 98 and 2000, and Outlook Express 4.0x and 5.0x, allow remote attackers to read files on the client's system via a malformed HTML message that stores files outside of the cache, aka the "Cache Bypass" vulnerability.
9726| [CVE-2000-0567] Buffer overflow in Microsoft Outlook and Outlook Express allows remote attackers to execute arbitrary commands via a long Date field in an email header, aka the "Malformed E-mail Header" vulnerability.
9727| [CVE-2000-0524] Microsoft Outlook and Outlook Express allow remote attackers to cause a denial of service by sending email messages with blank fields such as BCC, Reply-To, Return-Path, or From.
9728| [CVE-2000-0451] The Intel express 8100 ISDN router allows remote attackers to cause a denial of service via oversized or fragmented ICMP packets.
9729| [CVE-2000-0415] Buffer overflow in Outlook Express 4.x allows attackers to cause a denial of service via a mail or news message that has a .jpg or .bmp attachment with a long file name.
9730| [CVE-2000-0115] IIS allows local users to cause a denial of service via invalid regular expressions in a Visual Basic script in an ASP page.
9731| [CVE-2000-0105] Outlook Express 5.01 and Internet Explorer 5.01 allow remote attackers to view a user's email messages via a script that accesses a variable that references subsequent email messages that are read by the client.
9732| [CVE-2000-0036] Outlook Express 5 for Macintosh downloads attachments to HTML mail without prompting the user, aka the "HTML Mail Attachment" vulnerability.
9733| [CVE-1999-1514] Buffer overflow in Celtech ExpressFS FTP server 2.x allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long USER command.
9734| [CVE-1999-1033] Microsoft Outlook Express before 4.72.3612.1700 allows a malicious user to send a message that contains a .., which can inadvertently cause Outlook to re-enter POP3 command mode and cause the POP3 session to hang.
9735| [CVE-1999-1016] Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell.
9736| [CVE-1999-1009] The Disney Go Express Search allows remote attackers to access and modify search information for users by connecting to an HTTP server on the user's system.
9737| [CVE-1999-0967] Buffer overflow in the HTML library used by Internet Explorer, Outlook Express, and Windows Explorer via the res: local resource protocol.
9738| [CVE-1999-0477] The Expression Evaluator in the ColdFusion Application Server allows a remote attacker to upload files to the server via openfile.cfm, which does not restrict access to the server properly.
9739| [CVE-1999-0455] The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.
9740|
9741| SecurityFocus - https://www.securityfocus.com/bid/:
9742| [49543] Spring Framework Expression Language JSP Attributes Handling Information Disclosure Vulnerability
9743| [104521] Cisco TelePresence Video Communication Server Expressway Denial of Service Vulnerability
9744| [104468] Node.js CVE-2018-7162 Denial of Service Vulnerability
9745| [104463] Node.js CVE-2018-7164 Denial of Service Vulnerability
9746| [104427] Node.js 'Forwarded' Module CVE-2017-16118 Denial of Service Vulnerability
9747| [104260] Spring Framework CVE-2018-1257 Denial-Of-Service Vulnerability
9748| [104222] Spring Security and Spring Framework CVE-2018-1258 Authorization Bypass Vulnerability
9749| [104072] Microsoft .NET Framework Device Guard CVE-2018-1039 Local Security Bypass Vulnerability
9750| [103771] Pivotal Spring Framework CVE-2018-1275 Incomplete Fix Remote Code Execution Vulnerability
9751| [103701] SAP Control Center and Cockpit Framework XML External Entity Injection Vulnerability
9752| [103699] Pivotal Spring Framework CVE-2018-1271 Directory Traversal Vulnerability
9753| [103697] Pivotal Spring Framework CVE-2018-1272 Remote Privilege Escalation Vulnerability
9754| [103696] Pivotal Spring Framework CVE-2018-1270 Remote Code Execution Vulnerability
9755| [103255] Google Android Media framework Multiple Remote Code Execution Vulnerabilities
9756| [103131] Cisco Data Center Analytics Framework CVE-2018-0145 Cross Site Scripting Vulnerability
9757| [103122] Cisco Data Center Analytics Framework CVE-2018-0146 Cross Site Request Forgery Vulnerability
9758| [103017] Google Android Media Framework CVE-2017-13241 Information Disclosure Vulnerability
9759| [103016] Google Android Media Framework CVE-2017-13229 Multiple Remote Code Execution Vulnerabilities
9760| [103012] Google Android Media Framework CVE-2017-13239 Information Disclosure Vulnerability
9761| [103011] Google Android Media Framework CVE-2017-13240 Information Disclosure Vulnerability
9762| [102976] Google Android Media Framework Component Multiple Security Vulnerabilities
9763| [102960] Cisco Data Center Analytics Framework CVE-2018-0128 HTML Injection Vulnerability
9764| [102959] Cisco Data Center Analytics Framework CVE-2018-0129 Cross Site Scripting Vulnerability
9765| [102839] Google Android Framework CVE-2017-0846 Information Disclosure Vulnerability
9766| [102761] Google Android Media Framework CVE-2017-13187 Information Disclosure Vulnerability
9767| [102683] Oracle Financial Services Analytical Applications Reconciliation Framework Security Vulnerability
9768| [102563] Oracle Application Express CVE-2018-2699 Remote Security Vulnerability
9769| [102529] Google Android Media Framework CVE-2017-13201 Information Disclosure Vulnerability
9770| [102526] Google Android Media Framework CVE-2017-13207 Information Disclosure Vulnerability
9771| [102524] Google Android Media Framework Denial of Service and Information Disclosure Vulnerabilities
9772| [102523] Google Android Media Framework CVE-2017-13206 Information Disclosure Vulnerability
9773| [102522] Google Android Media Framework Denial of Service and Information Disclosure Vulnerabilities
9774| [102521] Google Android Media Framework CVE-2017-13202 Information Disclosure Vulnerability
9775| [102421] Google Android Media Framework Component CVE-2017-13183 Local Privilege Escalation Vulnerability
9776| [102414] Google Android Media Framework Component Multiple Security Vulnerabilities
9777| [102387] Microsoft .NET Framework CVE-2018-0764 Remote Denial of Service Vulnerability
9778| [102380] Microsoft .NET Framework CVE-2018-0786 Security Bypass Vulnerability
9779| [102131] Google Android Framework Multiple Privilege Escalation Vulnerabilities
9780| [102126] Google Android Media Framework Components Multiple Security Vulnerabilities
9781| [101897] Node.js ejs Package 'ejs.renderFile()' Function Remote Code Execution Vulnerability
9782| [101893] Node.js ejs Package 'ejs.renderFile()' function Denial of Service Vulnerability
9783| [101889] Node.js ejs Package 'ejs.renderFile()' function Cross Site Scripting Vulnerability
9784| [101881] Node.js CVE-2017-14919 Denial of Service Vulnerability
9785| [101775] Google Android Framework Multiple Privilege Escalation Vulnerabilities
9786| [101717] Google Android Media Framework Multiple Security Vulnerabilities
9787| [101627] HP ArcSight ESM and ArcSight ESM Express CVE-2017-14356 SQL Injection Vulnerability
9788| [101525] Cisco Expressway Series and Cisco TelePresence VCS CVE-2017-12287 Denial of Service Vulnerability
9789| [101514] Cisco Unified Contact Center Express CVE-2017-12288 Cross Site Scripting Vulnerability
9790| [101260] Node.js CVE-2015-7384 Unspecified Denial of Service Vulnerability
9791| [101190] Google Android Media Framework Multiple Security Vulnerabilities
9792| [101185] Node.js 'tough-cookie' Module CVE-2017-15010 Denial of Service Vulnerability
9793| [101151] Google Android Media Framework Multiple Security Vulnerabilities
9794| [101088] Google Android Media Framework Components Multiple Security Vulnerabilities
9795| [101086] Google Android Framework CVE-2017-0806 Security Bypass Vulnerability
9796| [101056] Node.js CVE-2017-14849 Security Bypass Vulnerability
9797| [100935] HP ArcSight ESM and ArcSight ESM Express Multiple Security Vulnerabilities
9798| [100742] Microsoft Windows .NET Framework CVE-2017-8759 Remote Code Execution Vulnerability
9799| [100691] Node.js 'qs' Module CVE-2017-1000048 Denial of Service Vulnerability
9800| [100673] Google Android Framework CVE-2017-0752 Privilege Escalation Vulnerability
9801| [100649] Google Android Media Framework Multiple Security Vulnerabilities
9802| [100385] Cisco Ultra Services Framework CVE-2017-6771 Information Disclosure Vulnerability
9803| [100220] Google Android Framework CVE-2017-0712 Privilege Escalation Vulnerability
9804| [100204] Google Android Media Framework Multiple Security Vulnerabilities
9805| [100090] Microsoft Windows Express Compressed Fonts CVE-2017-8691 Remote Code Execution Vulnerability
9806| [100083] IBM Worklight Framework CVE-2017-1500 Cross Site Scripting Vulnerability
9807| [99959] Node.js CVE-2017-11499 Denial of Service Vulnerability
9808| [99512] Cisco Ultra Services Framework AutoVNF Symbolic Link Handling Information Disclosure Vulnerability
9809| [99478] Google Android Media Framework Multiple Security Vulnerabilities
9810| [99470] Google Android Framework Multiple Remote Code Execution Vulnerabilities
9811| [99440] Cisco Ultra Services Framework CVE-2017-6711 Unauthorized Access Vulnerability
9812| [99436] Cisco Ultra Services Framework Staging Server Arbitrary Command Execution Vulnerability
9813| [99242] ExpressionEngine CVE-2017-0897 Insufficient Entropy Weakness
9814| [99201] Cisco Unified Contact Center Express CVE-2017-6722 Access Bypass Vulnerability
9815| [99033] SAP NetWeaver Composite Application Framework and Business Cross Site Scripting Vulnerability
9816| [99001] Cisco Ultra Services Framework CVE-2017-6680 Remote Security Bypass Vulnerability
9817| [98990] Cisco Ultra Services Framework Staging Server Default Credentials Security Bypass Vulnerability
9818| [98988] Cisco Ultra Services Framework CVE-2017-6686 Default Credentials Security Bypass Vulnerability
9819| [98981] Cisco Ultra Services Framework Element Manager CVE-2017-6687 Insecure Default Password Vulnerability
9820| [98980] Cisco Ultra Services Framework CVE-2017-6692 Insecure Default Password Vulnerability
9821| [98977] Cisco Ultra Services Framework CVE-2017-6681 Information Disclosure Vulnerability
9822| [98868] Google Android Media Framework Multiple Memory Corruption Vulnerabilities
9823| [98133] Google Android Framework Apis CVE-2017-0598 Information Disclosure Vulnerability
9824| [98126] Google Android Framework Apis CVE-2017-0593 Privilege Escalation Vulnerability
9825| [98117] Microsoft .NET Framework CVE-2017-0248 Security Bypass Vulnerability
9826| [97576] SAP Composite Application Framework Authorization Tool XML External Entity Injection Vulnerability
9827| [97565] SAP NetWeaver Java Archiving Framework Unspecified Cross Site Scripting Vulnerability
9828| [97469] Cisco Mobility Express 2800 and 3800 Series CVE-2016-9197 Local Security Bypass Vulnerability
9829| [97447] Microsoft Windows .NET Framework CVE-2017-0160 Remote Code Execution Vulnerability
9830| [97422] Cisco Mobility Express Software CVE-2017-3834 Default Credentials Security Bypass Vulnerability
9831| [97167] Yii framework CVE-2017-7271 Cross Site Scripting Vulnerability
9832| [97102] Node.js CVE-2014-9772 Cross Site Scripting Vulnerability
9833| [97014] Cisco Application-Hosting Framework CVE-2017-3852 Arbitrary File Creation Vulnerability
9834| [97013] Cisco Application-Hosting Framework CVE-2017-3851 Directory Traversal Vulnerability
9835| [96909] Cisco Mobility Express 1800 Access Point Series CVE-2017-3831 Authentication Bypass Vulnerability
9836| [96496] Node.js Minimatch Package 'pattern' Parameter Denial of Service Vulnerability
9837| [96436] Node.js mustache.js Package CVE-2015-8862 Cross Site Scripting Vulnerability
9838| [96435] Node.js send Package CVE-2015-8859 Information Disclosure Vulnerability
9839| [96434] Node.js handlebars.js Package CVE-2015-8861 Cross Site Scripting Vulnerability
9840| [96410] Node.js uglify-js Package CVE-2015-8857 Security Bypass Vulnerability
9841| [96409] Node.js uglify-js Package CVE-2015-8858 Denial of Service Vulnerability
9842| [96392] Node.js CVE-2015-8856 Cross Site Scripting Vulnerability
9843| [96389] Node.js ms Package CVE-2015-8315 Denial of Service Vulnerability
9844| [96225] Node-serialize Package For Node.js 'unserialize()' Function Remote Code Execution Vulnerability
9845| [96223] Serialize-to-js For Node.js 'deserialize()' Function Arbitrary Code Execution Vulnerability
9846| [96096] Google Android Framework APIs CVE-2017-0421 Information Disclosure Vulnerability
9847| [96056] Google Android Framework APIs Multiple Privilege Escalation Vulnerabilities
9848| [95786] Cisco Expressway Series and Cisco TelePresence VCS CVE-2017-3790 Denial of Service Vulnerability
9849| [95633] Cisco Mobility Express 2800 and 3800 Access Points CVE-2016-9220 Denial of Service Vulnerability
9850| [95631] Cisco Mobility Express 2800 and 3800 Access Points CVE-2016-9221 Denial of Service Vulnerability
9851| [95243] Google Android Framework APIs CVE-2017-0383 Remote Privilege Escalation Vulnerability
9852| [95144] Zend Framework 'zend-mail' Component Remote Code Execution Vulnerability
9853| [95072] Spring Framework CVE-2016-9878 Directory Traversal Vulnerability
9854| [95069] NetApp Snap Creator Framework CVE-2016-7172 Local Information Disclosure Vulnerability
9855| [94741] Microsoft .NET Framework CVE-2016-7270 Information Disclosure Vulnerability
9856| [94702] Google Android Framework APIs CVE-2016-6770 Remote Privilege Escalation Vulnerability
9857| [94255] Teradata Studio Express CVE-2016-7490 Insecure Temporary File Creation Vulnerability
9858| [94173] Google Android Framework APIs CVE-2016-6715 Privilege Escalation Vulnerability
9859| [93483] Node.js CVE-2016-5325 CRLF Injection Vulnerability
9860| [93307] Google Android Framework Listener CVE-2016-3921 Privilege Escalation Vulnerability
9861| [93302] Google Android Framework APIs CVE-2016-3912 Privilege Escalation Vulnerability
9862| [93191] Node.js CVE-2016-7099 Security Bypass Vulnerability
9863| [92993] Zend Framework CVE-2016-4861 Multiple SQL Injection Vulnerabilities
9864| [92402] WebNMS Framework Multiple Security Vulnerabilities
9865| [92274] Cisco TelePresence Video Communication Server Expressway Command Injection Vulnerability
9866| [92249] Google Android Framework APIs CVE-2016-2497 Remote Privilege Escalation Vulnerability
9867| [91994] Oracle Siebel UI Framework CVE-2016-5464 Remote Security Vulnerability
9868| [91988] Oracle Siebel UI Framework CVE-2016-5463 Remote Security Vulnerability
9869| [91981] Oracle Siebel UI Framework CVE-2016-5450 Remote Security Vulnerability
9870| [91973] Oracle Siebel UI Framework CVE-2016-5468 Remote Security Vulnerability
9871| [91954] Oracle Siebel UI Framework CVE-2016-5451 Remote Security Vulnerability
9872| [91894] Oracle Application Express CVE-2016-3467 Remote Security Vulnerability
9873| [91885] Oracle Application Express CVE-2016-3448 Remote Security Vulnerability
9874| [91802] Zend Framework 'Zend_Db_Select' Multiple SQL Injection Vulnerabilities
9875| [91769] KDE Frameworks CVE-2016-3100 Weak Permissions Local Privilege Escalation Vulnerability
9876| [91753] IBM SDK for Node.js CVE-2014-9748 Local Denial of Service Vulnerability
9877| [91687] Spring Security and Spring Framework CVE-2016-5007 Security Bypass Vulnerability
9878| [91669] Cisco Video Communication Server and Expressway CVE-2016-1444 Authentication Bypass Vulnerability
9879| [91655] Google Android Framework APIs CVE-2016-3759 Remote Privilege Escalation Vulnerability
9880| [91644] Google Android Parcels Framework APIs CVE-2016-3750 Privilege Escalation Vulnerability
9881| [91601] Microsoft .NET Framework CVE-2016-3255 XML External Entity Information Disclosure Vulnerability
9882| [91388] NetApp Snap Creator Framework CVE-2016-5372 Unspecified Cross-Site Request Forgery Vulnerability
9883| [91385] NetApp Snap Creator Framework CVE-2016-5710 Clickjacking Vulnerability
9884| [91246] Play Framework Cross Site Request Forgery Vulnerability
9885| [91070] TERASOLUNA Server Framework for Java CVE-2016-1183 Information Disclosure Vulnerability
9886| [90853] Spring Framework CVE-2015-3192 Denial-Of-Service Vulnerability
9887| [90852] Spring Framework CVE-2015-5211 Arbitrary Command Execution Vulnerability
9888| [90644] IBM SDK for Node.js CVE-2015-8860 Insecure Temporary File Creation Vulnerability
9889| [90339] Outlook Express CVE-2004-2694 Security Bypass Vulnerability
9890| [90026] Microsoft .NET Framework CVE-2016-0149 Information Disclosure Vulnerability
9891| [89856] Node.js CVE-2016-3956 Security Bypass Vulnerability
9892| [89599] Outlook Express CVE-2002-2202 Local Security Vulnerability
9893| [89248] MailSite Express CVE-2005-3288 Remote Security Vulnerability
9894| [89246] MailSite Express CVE-2005-3287 Remote Security Vulnerability
9895| [88692] .NET Framework CVE-2002-0409 Remote Security Vulnerability
9896| [88602] Outlook Express Book Control CVE-2005-4840 Denial-Of-Service Vulnerability
9897| [88431] MailSite Express CVE-2005-3428 Cross-Site Scripting Vulnerability
9898| [88427] MailSite Express CVE-2005-3429 Cross-Site Scripting Vulnerability
9899| [88359] Go Express Search CVE-1999-1009 Remote Security Vulnerability
9900| [87999] Calendar Express CVE-2005-4009 SQL-Injection Vulnerability
9901| [87512] Tivoli Storage Manager Express CVE-2009-3854 Remote Security Vulnerability
9902| [87300] Tivoli Storage Manager Express CVE-2006-6309 Denial-Of-Service Vulnerability
9903| [87122] Microsoft Outlook Express CVE-2003-0301 Denial-Of-Service Vulnerability
9904| [86957] Semver CVE-2015-8855 Regular Expression Denial of Service Vulnerability
9905| [86956] Node.js Marked Package CVE-2015-8854 Denial of Service Vulnerability
9906| [86716] Yana Framework CVE-2007-0516 Remote Security Vulnerability
9907| [86526] Zend Framework Multiple Insufficient Entropy Vulnerabilities
9908| [86214] Microsoft Atlas framework CVE-2007-2380 Denial-Of-Service Vulnerability
9909| [86201] Prototype Framework CVE-2007-2383 Denial-Of-Service Vulnerability
9910| [86200] Mochikit Framework CVE-2007-2381 Denial-Of-Service Vulnerability
9911| [85842] Google Android Framework CVE-2016-2426 Information Disclosure Vulnerability
9912| [85699] WordPress Titan Framework Plugin CVE-2014-6444 Multiple Cross Site Scripting Vulnerabilities
9913| [85515] Outlook Express CVE-2007-4040 Remote Security Vulnerability
9914| [84743] .NET Framework CVE-2008-5100 Security Bypass Vulnerability
9915| [84596] HP ArcSight ESM and ESM Express CVE-2016-1990 Unspecified Local Privilege Escalation Vulnerability
9916| [84492] HP ArcSight ESM and ArcSight ESM Express CVE-2016-1992 Information Disclosure Vulnerability
9917| [84357] HP ArcSight ESM and ArcSight ESM Express CVE-2016-1991 Arbitrary File Download Vulnerability
9918| [84075] Microsoft .NET Framework CVE-2016-0132 Security Bypass Vulnerability
9919| [83697] Application Framework CVE-2006-4256 Cross-Site Scripting Vulnerability
9920| [83619] Zend Framework Preview CVE-2006-5900 Cross-Site Scripting Vulnerability
9921| [83282] Node.js CVE-2016-2086 HTTP Request Smuggling Vulnerability
9922| [83141] Node.js CVE-2016-2216 HTTP Response Splitting Vulnerability
9923| [83046] Outlook Express CVE-1999-0967 Remote Security Vulnerability
9924| [82918] Outlook Express CVE-2001-1547 Remote Security Vulnerability
9925| [82738] Microsoft .NET Framework CVE-2016-0047 Information Disclosure Vulnerability
9926| [82717] Microsoft .NET Framework CVE-2016-0033 Stack Overflow Denial of Service Vulnerability
9927| [82421] .NET Framework CVE-2005-0509 Cross-Site Scripting Vulnerability
9928| [82400] Cisco Finesse Desktop and Unified Contact Center Express Unauthorized Access Vulnerability
9929| [82334] Tivoli Storage Manager Express CVE-2009-3854 Remote Security Vulnerability
9930| [82242] EXPRESSCLUSTER X CVE-2016-1145 Directory Traversal Vulnerability
9931| [82008] Cisco Unity Connection Web Framework CVE-2016-1300 Cross Site Scripting Vulnerability
9932| [81798] Cisco Unified Contact Center Express CVE-2016-1298 Cross Site Scripting Vulnerability
9933| [81525] Tivoli Provisioning Manager Express CVE-2007-6407 Cross-Site Scripting Vulnerability
9934| [80955] .NET Framework CVE-2008-3842 Cross-Site Scripting Vulnerability
9935| [80929] .NET Framework CVE-2008-3843 Cross-Site Scripting Vulnerability
9936| [80625] Java System Communications Express CVE-2009-0877 Cross-Site Scripting Vulnerability
9937| [80462] Horde Application Framework CVE-2009-3237 Cross-Site Scripting Vulnerability
9938| [80247] Tivoli Storage Manager Express CVE-2010-4604 Local Security Vulnerability
9939| [79312] Tivoli Storage Manager Express CVE-2009-3855 Remote Security Vulnerability
9940| [79197] Joomla! Framework Session Package CVE-2015-8566 Remote Code Execution Vulnerability
9941| [79185] Framework CVE-2009-4417 Remote Security Vulnerability
9942| [79088] Cisco TelePresence Video Communication Server Expressway Unauthorized Access Vulnerability
9943| [78817] Cisco Emergency Responder Web Framework CVE-2015-6407 Arbitrary File Upload Vulnerability
9944| [78701] Google Android Media Framework CVE-2015-6628 Remote Privilege Escalation Vulnerability
9945| [78698] Google Android Native Frameworks Library CVE-2015-6622 Multiple Privilege Escalation Vulnerabilities
9946| [78589] Metasploit Framework CVE-2011-1056 Local Security Vulnerability
9947| [78476] Unified Contact Center Express (CCX) CVE-2011-2583 Denial-Of-Service Vulnerability
9948| [78464] Tivoli Management Framework CVE-2011-2330 Remote Security Vulnerability
9949| [78209] Node.js CVE-2015-6764 Out of Bounds Denial of Service Vulnerability
9950| [78207] Node.js CVE-2015-8027 Unspecified Denial of Service Vulnerability
9951| [78090] Payflow Pro Express Checkout CVE-2012-5798 Remote Security Vulnerability
9952| [78088] Paypal Express Module CVE-2012-5795 Remote Security Vulnerability
9953| [77998] Spring Framework CVE-2013-7315 Denial-Of-Service Vulnerability
9954| [77975] Spring Framework CVE-2014-3625 Directory Traversal Vulnerability
9955| [77690] Zend Framework CAPTCHA Challenge Insufficient Entropy Vulnerability
9956| [77688] Zend Framework CVE-2015-7503 Information Disclosure Vulnerability
9957| [77482] Microsoft .NET Framework CVE-2015-6115 ASLR Security Bypass Vulnerability
9958| [77479] Microsoft .NET Framework CVE-2015-6099 Cross Site Scripting Vulnerability
9959| [77474] Microsoft .NET Framework CVE-2015-6096 XML Handling Information Disclosure Vulnerability
9960| [77056] Cisco TelePresence Video Communication Server Expressway Local Security Bypass Vulnerability
9961| [77054] Cisco TelePresence Video Communication Server Expressway Local Privilege Escalation Vulnerability
9962| [76901] TYPO3 Zend Framework Integration Extension File Disclosure Vulnerability
9963| [76784] Zend Framework MsSql and SQLite Multiple SQL Injection Vulnerabilities
9964| [76777] VBox Satellite Express CVE-2015-6923 Arbitrary Memory Write Privilege Escalation Vulnerability
9965| [76567] Microsoft .NET Framework Model View Controller CVE-2015-2526 Remote Denial of Service Vulnerability
9966| [76560] Microsoft .NET Framework CVE-2015-2504 Remote Privilege Escalation Vulnerability
9967| [76534] Cisco TelePresence Video Communication Server Expressway Local Command Injection Vulnerability
9968| [76481] Cisco TelePresence Video Communication Server Expressway Information Disclosure Vulnerability
9969| [76408] Cisco TelePresence Video Communication Server Expressway Arbitrary Code Execution Vulnerability
9970| [76399] Cisco TelePresence Video Communication Server Expressway Command Execution Vulnerability
9971| [76395] Cisco TelePresence Video Communication Server Expressway Command Injection Vulnerability
9972| [76366] Cisco TelePresence Video Communication Server Expressway Unauthorized Access Vulnerability
9973| [76353] Cisco TelePresence Video Communication Server Expressway Unauthorized Access Vulnerability
9974| [76352] Cisco TelePresence Video Communication Server Expressway Denial of Service Vulnerability
9975| [76351] Cisco TelePresence Video Communication Server Expressway Denial of Service Vulnerability
9976| [76350] Cisco TelePresence Video Communication Server Expressway Information Disclosure Vulnerability
9977| [76347] Cisco TelePresence Video Communication Server Expressway Denial of Service Vulnerability
9978| [76326] Cisco TelePresence Video Communication Server Expressway Information Disclosure Vulnerability
9979| [76270] Microsoft .NET Framework CVE-2015-2481 Privilege Escalation Vulnerability
9980| [76269] Microsoft .NET Framework CVE-2015-2480 Privilege Escalation Vulnerability
9981| [76268] Microsoft .NET Framework CVE-2015-2479 Privilege Escalation Vulnerability
9982| [76187] PCRE Regular Expression Handling Heap Buffer Overflow Vulnerability
9983| [76063] RETIRED: Microsoft .NET Framework Integer Overflow Vulnerability
9984| [75891] Oracle Agile PLM Framework CVE-2015-2644 Remote Security Vulnerability
9985| [75876] Oracle Siebel UI Framework CVE-2015-2587 Remote Security Vulnerability
9986| [75875] Oracle Siebel UI Framework CVE-2015-2649 Remote Security Vulnerability
9987| [75865] Oracle Application Express CVE-2015-2586 Remote Security Vulnerability
9988| [75864] Oracle Application Express CVE-2015-2655 HTML Injection Vulnerability
9989| [75845] Oracle Application Express CVE-2015-2585 Remote Security Vulnerability
9990| [75556] Node.js 'unicode.cc' Denial of Service Vulnerability
9991| [75349] Cisco Data Center Analytics Framework CVE-2015-4189 Cross Site Request Forgery Vulnerability
9992| [74704] Netty and Play Framework CVE-2015-2156 Session Hijacking Vulnerability
9993| [74663] Yii framework CVE-2015-3397 Cross Site Scripting Vulnerability
9994| [74626] SAP Business Rules Framework CVE-2015-3979 Unspecified Arbitrary Code Execution Vulnerability
9995| [74487] Microsoft .NET Framework CVE-2015-1673 Remote Privilege Escalation Vulnerability
9996| [74482] Microsoft .NET Framework CVE-2015-1672 Remote Denial of Service Vulnerability
9997| [74205] HotspotExpress HotExBilling Manager CVE-2015-3319 Information Disclosure Vulnerability
9998| [74054] HP Support Solution Framework CVE-2015-2114 Unspecified Remote Information Disclosure Vulnerability
9999| [74010] Microsoft .NET Framework CVE-2015-1648 Information Disclosure Vulnerability
10000| [73941] HotspotExpress HotExBilling Manager 'hotspotlogin.cgi' Cross Site Scripting Vulnerability
10001| [73036] Spring Framework CVE-2015-0201 Predictable Session ID Generation Weakness
10002| [72807] Drupal SMS Framework Module Cross Site Scripting Vulnerability
10003| [72270] Zend Framework Session Validators Security Bypass Vulnerability
10004| [72211] Oracle Siebel CVE-2015-0417 Remote Siebel UI Framework Vulnerability
10005| [72209] Oracle Siebel CVE-2015-0388 Remote Siebel UI Framework Vulnerability
10006| [72197] Oracle Siebel CVE-2015-0419 Remote Siebel UI Framework Vulnerability
10007| [72195] Oracle Siebel CVE-2014-6596 Remote Siebel UI Framework Vulnerability
10008| [72192] Oracle Siebel CVE-2015-0369 Remote Siebel UI Framework Vulnerability
10009| [72064] Node.js 'serve-static' Module Open Redirection Vulnerability
10010| [72057] Cisco TelePresence Video Communication Server and Expressway Remote Denial of Service Vulnerability
10011| [71431] Yii framework CmsInput Extension 'CmsInput.php' Cross Site Scripting Vulnerability
10012| [71054] Node.js dns-sync Library Arbitrary Command Execution Vulnerability
10013| [70979] Microsoft .NET Framework CVE-2014-4149 Remote Privilege Escalation Vulnerability
10014| [70875] EllisLab ExpressionEngine Core CVE-2014-5387 Multiple SQL Injection Vulnerabilities
10015| [70592] Cisco TelePresence VCS and Expressway CVE-2014-3370 Denial of Service Vulnerability
10016| [70590] Cisco TelePresence VCS and Expressway CVE-2014-3369 Remote Denial of Service Vulnerability
10017| [70589] Cisco TelePresence Video Communication Server (VCS) and Expressway Denial of Service Vulnerability
10018| [70378] Zend Framework CVE-2014-8088 Authentication Bypass Vulnerability
10019| [70351] Microsoft .NET Framework 'iriParsing' Remote Code Execution Vulnerability
10020| [70313] Microsoft .NET Framework ClickOnce CVE-2014-4073 Remote Privilege Escalation Vulnerability
10021| [70312] Microsoft .NET Framework CVE-2014-4122 ASLR Security Bypass Vulnerability
10022| [70115] Node.js qs Module Denial of Service Vulnerability
10023| [70113] Node.js qs Module Denial of Service Vulnerability
10024| [70105] Node.js syntax-error module 'eval()' Function Arbitrary Code Execution Vulnerability
10025| [70100] Node.js 'lib/send.js' Directory Traversal Vulnerability
10026| [70087] Slim PHP Framework 'SessionCookie.php' PHP Object Injection Vulnerability
10027| [70011] Zend Framework Sqlsrv Driver Multiple SQL Injection Vulnerabilities
10028| [69739] Cisco Unified Communications Manager Web Framework Cross Site Scripting Vulnerability
10029| [69659] Python robotframework-pabot Insecure Temporary File Creation Vulnerability
10030| [69603] Microsoft .NET Framework CVE-2014-4072 Remote Denial of Service Vulnerability
10031| [69462] RETIRED: IBM SDK for Node.js CVE-2014-5256 Remote Denial of Service Vulnerability
10032| [69145] Microsoft .NET Framework CVE-2014-4062 ASLR Security Bypass Vulnerability
10033| [68877] Cisco Security Manager Web Framework CVE-2014-3326 SQL Injection Vulnerability
10034| [68625] Oracle Siebel UI Framework CVE-2014-2491 Remote Security Vulnerability
10035| [68614] Oracle Siebel UI Framework CVE-2014-4205 Remote Security Vulnerability
10036| [68604] Oracle Siebel UI Framework CVE-2014-4230 Remote Security Vulnerability
10037| [68395] Yii Framework 'CDetailView' Attribute Arbitrary PHP Code Execution Vulnerability
10038| [68095] Spring Framework CVE-2014-0225 Remote Information Disclosure Vulnerability
10039| [68042] Spring Framework Unspecified Directory Traversal Vulnerability
10040| [68031] Zend Framework 'Zend_Db_Select::order()' Function SQL Injection Vulnerability
10041| [67902] DevExpress ASP.NET File Manager CVE-2014-2575 Directory Traversal Vulnerability
10042| [67677] NICE Recording eXpress Multiple Security Vulnerabilities
10043| [67624] TYPO3 Extbase Framework Information Disclosure Vulnerability
10044| [67569] Cisco Security Manager Web Framework Cross Site Scripting Vulnerability
10045| [67555] Cisco Identity Services Engine Web Framework CVE-2014-3275 SQL Injection Vulnerability
10046| [67286] Microsoft .NET Framework TypeFilterLevel CVE-2014-1806 Remote Privilege Escalation Vulnerability
10047| [67269] Red Hat JBoss Web Framework Kit Multiple Cross Site Scripting Vulnerabilities
10048| [67102] Cisco Unified Contact Center Express CVE-2014-2180 Arbitrary File Upload Vulnerability
10049| [67011] SAP Business Object Processing Framework for ABAP Security Bypass Vulnerability
10050| [66971] Zend Framework HTML Attributes Multiple Cross Site Scripting Vulnerabilities
10051| [66869] Oracle Agile PLM Framework CVE-2014-2445 Remote Security Vulnerability
10052| [66867] Oracle Agile PLM Framework CVE-2014-2464 Remote Security Vulnerability
10053| [66861] Oracle Agile PLM Framework CVE-2014-2466 Remote Security Vulnerability
10054| [66855] Oracle Agile PLM Framework CVE-2014-2467 Remote Security Vulnerability
10055| [66848] Oracle Siebel UI Framework CVE-2014-2468 Remote Security Vulnerability
10056| [66834] Oracle Agile PLM Framework CVE-2014-2465 Remote Security Vulnerability
10057| [66362] IBM Cognos Express CVE-2013-5444 Local Information Disclosure Vulnerability
10058| [66361] IBM Cognos Express CVE-2013-5445 Information Disclosure Vulnerability
10059| [66358] Zend Framework Multiple Information Disclosure and Security Bypass Vulnerabilities
10060| [66357] IBM Cognos Express CVE-2013-5443 Cross Site Request Forgery Vulnerability
10061| [66148] Spring Framework CVE-2014-0054 Multiple XML External Entity Injection Vulnerabilities
10062| [66137] Spring Framework 'FormTag.java' Cross Site Scripting Vulnerability
10063| [65802] Cisco Unified Contact Center Express CVE-2014-0746 Information Disclosure Vulnerability
10064| [65798] Cisco Unified Contact Center Express CVE-2014-0745 Cross Site Request Forgery Vulnerability
10065| [65797] Cisco Unified Contact Center Express CVE-2014-2102 Information Disclosure Vulnerability
10066| [65617] IBM WebSphere Dashboard Framework Security Bypass Vulnerability
10067| [65574] Restlet Framework XML Entity Expansion Denial of Service Vulnerability
10068| [65418] Microsoft .NET Framework CVE-2014-0295 ASLR Security Bypass Vulnerability
10069| [65417] Microsoft .NET Framework CVE-2014-0257 Remote Privilege Escalation Vulnerability
10070| [65415] Microsoft .NET Framework CVE-2014-0253 Remote Denial of Service Vulnerability
10071| [65101] Cisco TelePresence Video Communication Server Expressway Man in the Middle Vulnerability
10072| [65062] NCH Software Express Burn Plus '.EBP' File Handling Buffer Overflow Vulnerability
10073| [65051] Red Hat JBoss Web Framework Kit Information Disclosure Vulnerability
10074| [65049] Red Hat JBoss Web Framework Kit XML External Entity Information Disclosure Vulnerability
10075| [64948] Spring Framework 'JavaScriptUtils.javaScriptEscape()' Method Cross Site Scripting Vulnerability
10076| [64947] Spring Framework CVE-2013-6429 Multiple XML External Entity Injection Vulnerabilities
10077| [64417] IBM FileNet Business Process Framework XML Entity Parsing Information Disclosure Vulnerability
10078| [64208] Google Android Framework Fragment Injection Local Security Bypass Vulnerability
10079| [64028] Spring Framework 'JavaScriptUtils.javaScriptEscape()' Function Security Bypass Vulnerability
10080| [63928] Apache Roller CVE-2013-4212 OGNL Expression Injection Remote Code Execution Vulnerability
10081| [63771] Limonade framework 'limonade.php' Local File Disclosure Vulnerability
10082| [63747] ZK Framework CVE-2013-5966 Cross Site Scripting Vulnerability
10083| [63486] Zend Framework IP Address Spoofing Multiple Security Vulnerabilities
10084| [63440] Horde Application Framework Cross Site Request Forgery Vulnerability
10085| [63229] Node.js CVE-2013-4450 Denial of Service Vulnerability
10086| [63186] Zikula Application Framework CVE-2013-6168 'returnpage' Parameter Cross Site Scripting Vulnerability
10087| [63045] Oracle Siebel CRM Siebel UI Framework CVE-2013-5768 Remote Security Vulnerability
10088| [63042] Oracle Siebel CRM Siebel UI Framework CVE-2013-5835 Remote Security Vulnerability
10089| [62820] Microsoft .NET Framework CVE-2013-3860 Remote Denial of Service Vulnerability
10090| [62807] Microsoft .NET Framework CVE-2013-3861 Remote Denial of Service Vulnerability
10091| [62785] McAfee Managed Agent 'FrameworkService.exe' Remote Denial of Service Vulnerability
10092| [62352] Play Framework XML External Entities Information Disclosure Vulnerability
10093| [62000] Restlet Framework Object Deserialization Remote Code Execution Vulnerability
10094| [61951] Spring Framework CVE-2013-4152 Multiple XML External Entity Injection Vulnerabilities
10095| [61787] Play Framework Session Encoding Spoofing Security Vulnerability
10096| [61741] Tridium Niagara AX Framework CVE-2012-3025 Information Disclosure Vulnerability
10097| [61694] Restlet Framework XML Deserialization Remote Code Execution Vulnerability
10098| [61369] Apache OFBiz Nested Expression Remote Code Execution Vulnerability
10099| [61237] Oracle Agile PLM Framework CVE-2013-3823 Remote Security Vulnerability
10100| [61216] Oracle Agile Collaboration Framework CVE-2013-3824 Remote Security Vulnerability
10101| [61208] Oracle Agile PLM Framework CVE-2013-3822 Remote Security Vulnerability
10102| [61147] BMC Service Desk Express (SDE) Multiple SQL Injection and Cross Site Scripting Vulnerabilities
10103| [60937] Microsoft .NET Framework CVE-2013-3171 Remote Privilege Escalation Vulnerability
10104| [60935] Microsoft .NET Framework CVE-2013-3134 Remote Code Execution Vulnerability
10105| [60934] Microsoft .NET Framework CVE-2013-3133 Remote Privilege Escalation Vulnerability
10106| [60933] Microsoft .NET Framework CVE-2013-3132 Remote Privilege Escalation Vulnerability
10107| [60346] Apache Struts CVE-2013-2134 OGNL Expression Injection Vulnerability
10108| [60345] Apache Struts CVE-2013-2135 OGNL Expression Injection Vulnerability
10109| [59790] Microsoft .NET Framework CVE-2013-1337 Authentication Bypass Vulnerability
10110| [59789] Microsoft .NET Framework XML Digital Signature CVE-2013-1336 Security Bypass Vulnerability
10111| [59358] Cisco Unified Contact Center Express CVE-2013-1214 Information Disclosure Vulnerability
10112| [59134] Oracle Siebel CRM Siebel UI Framework CVE-2013-1510 Remote Vulnerability
10113| [59117] Oracle Siebel CRM Siebel UI Framework CVE-2013-2398 Remote Security Vulnerability
10114| [59098] Oracle Siebel CRM Siebel UI Framework CVE-2013-1543 Remote Security Vulnerability
10115| [59041] Hero Framework CVE-2013-2649 Multiple Cross-Site Scripting Vulnerabilities
10116| [58530] Zend Framework Multiple Security Vulnerabilities
10117| [57980] Zend Framework CVE-2012-6531 Multiple Remote Arbitrary File Access Vulnerabilities
10118| [57977] Zend Framework CVE-2012-6532 Multiple Remote Denial of Service Vulnerabilities
10119| [57847] Microsoft .NET Framework CVE-2013-0073 Remote Privilege Escalation Vulnerability
10120| [57678] Cisco Unity Express CVE-2013-1120 Cross Site Request Forgery Vulnerability
10121| [57677] Cisco Unity Express CVE-2013-1114 Cross Site Scripting Vulnerability
10122| [57656] SAP NetWeaver J2EE AdapterFramework Servlet Information Disclosure Vulnerability
10123| [57409] Oracle Agile PLM Framework CVE-2013-0370 Remote Security Vulnerability
10124| [57126] Microsoft .NET Framework CVE-2013-0002 Remote Privilege Escalation Vulnerability
10125| [57124] Microsoft .NET Framework CVE-2013-0001 Information Disclosure Vulnerability
10126| [57114] Microsoft .NET Framework CVE-2013-0003 Remote Privilege Escalation Vulnerability
10127| [57113] Microsoft .NET Framework CVE-2013-0004 Remote Privilege Escalation Vulnerability
10128| [57035] Hero Framework Cross Site Scripting and Cross Site Request Forgery Vulnerabilities
10129| [57008] IBM Rational Automation Framework Security Bypass Vulnerability
10130| [56982] Zend Framework 'Zend_Feed' Component Information Disclosure Vulnerabilities
10131| [56881] Smartphone Pentest Framework Multiple Remote Command Execution Vulnerabilities
10132| [56707] Smartphone Pentest Framework CVE-2012-5697 Local Insecure File Permissions Vulnerability
10133| [56705] Smartphone Pentest Framework Multiple Security Vulnerabilities
10134| [56620] Yii Framework 'Search' Form Field SQL Injection Vulnerability
10135| [56464] Microsoft .NET Framework CVE-2012-4777 Remote Privilege Escalation Vulnerability
10136| [56463] Microsoft .NET Framework CVE-2012-4776 Remote Code Execution Vulnerability
10137| [56462] Microsoft .NET Framework CVE-2012-2519 DLL Loading Arbitrary Code Execution Vulnerability
10138| [56456] Microsoft .NET Framework CVE-2012-1896 Information Disclosure Vulnerability
10139| [56455] Microsoft .NET Framework CVE-2012-1895 Security Bypass Vulnerability
10140| [56333] TomatoCart PayPal Express Checkout Module Security Bypass Vulnerability
10141| [56030] Oracle Siebel UI Framework CVE-2012-3230 Remote Security Vulnerability
10142| [56014] Oracle Siebel UI Framework CVE-2012-3229 Remote Security Vulnerability
10143| [55978] Oracle E-Business Suite CVE-2012-3162 Local Oracle Applications Framework Vulnerability
10144| [55976] Oracle Agile PLM Framework CVE-2012-3154 Remote Security Vulnerability
10145| [55971] Oracle Agile PLM Framework CVE-2012-3161 Remote Security Vulnerability
10146| [55636] Zend Framework Multiple Cross Site Scripting Vulnerabilities
10147| [55254] Atlassian Bamboo OGNL Expression Injection Vulnerability
10148| [55242] Express Burn Project File Heap Based Buffer Overflow Vulnerability
10149| [55108] Atlassian JIRA FishEye and Crucible Plugins 'Third Party Frameworks' Security Bypass Vulnerability
10150| [55042] Niagara Framework Session Hijacking Vulnerability
10151| [54498] Oracle Application Express CVE-2012-1740 Remote Security Vulnerability
10152| [54472] MetaSploit Framework 'pcap_log' Plugin Local Privilege Escalation Vulnerability
10153| [54454] Niagara Framework Directory Traversal Vulnerability
10154| [54192] Zend Framework 'Zend_XmlRpc' Class Information Disclosure Vulnerability
10155| [53861] Microsoft .NET Framework Function Pointer Execution Remote Code Execution Vulnerability
10156| [53713] Restlet Framework XML External Entity Information Disclosure Vulnerability
10157| [53674] Yellow Duck Framework Local File Disclosure Vulnerability
10158| [53500] Travelon Express CMS Multiple Remote Vulnerabilities
10159| [53416] Node.js HTTP Parser Information Disclosure Vulnerability
10160| [53363] Microsoft .NET Framework Index Comparison Denial Of Service Vulnerability
10161| [53358] Microsoft .NET Framework Serialization CVE-2012-0162 Remote Code Execution Vulnerability
10162| [53357] Microsoft .NET Framework Serialization CVE-2012-0161 Remote Code Execution Vulnerability
10163| [53356] Microsoft .NET Framework Input Serialization CVE-2012-0160 Remote Code Execution Vulnerability
10164| [53204] Microsoft .NET Framework Parameter Validation Remote Integer Overflow Vulnerability
10165| [53104] Oracle Database Server CVE-2012-1708 Remote Application Express Vulnerability
10166| [53039] Joomla! JA T3 Framework Component Directory Traversal Vulnerability
10167| [52921] Microsoft .NET Framework Parameter Validation Remote Code Execution Vulnerability
10168| [52431] HP Data Protector Express Multiple Remote Code Execution Vulnerabilities
10169| [52375] Microsoft Expression 'wintab32.dll' DLL Loading Arbitrary Code Execution Vulnerability
10170| [52252] IBM Tivoli Provisioning Manager Express ActiveX Control Remote Code Execution Vulnerability
10171| [52248] Tivoli Provisioning Manager Express for Software Distribution Multiple SQL Injection Vulnerabilities
10172| [52121] SystemTap DWARF Expression Local Denial of Service Vulnerability
10173| [51940] Microsoft Silverlight & .NET Framework Heap Corruption Remote Code Execution Vulnerability
10174| [51938] Microsoft Silverlight & .NET Framework Unmanaged Objects Remote Code Execution Vulnerability
10175| [51762] FishEye and Crucible Webwork 2 Framework Remote Code Injection Vulnerability
10176| [51367] ExpressView Browser Plug-in Multiple Integer Overflow and Remote Code Execution Vulnerabilities
10177| [51203] Microsoft .NET Framework ASP.NET Forms CVE-2011-3417 Security Bypass Vulnerability
10178| [51202] Microsoft .NET Framework CVE-2011-3415 Form Authentication URI Open Redirection Vulnerability
10179| [51201] Microsoft .NET Framework CVE-2011-3416 ASP.NET Forms Authentication Bypass Vulnerability
10180| [50971] ISC DHCP Regular Expressions Denial of Service Vulnerability
10181| [50848] Apache MyFaces EL Expression Evaluation Security Bypass Vulnerability
10182| [50846] Oracle Mojarra EL Expression Evaluation Security Bypass Vulnerability
10183| [50799] IBM System Storage TS3100 and TS3200 Tape Library Express Security Bypass Vulnerability
10184| [50714] JRuby Regular Expression Engine Cross Site Scripting Vulnerability
10185| [50363] Novell XTier Framework HTTP Header Remote Integer Overflow Vulnerability
10186| [50315] MetaSploit Framework 'project[name]' Field HTML Injection Vulnerability
10187| [50233] Oracle E-Business Suite CVE-2011-3519 Remote Oracle Applications Framework Vulnerability
10188| [50197] Oracle Database CVE-2011-3525 Remote Application Express Vulnerability
10189| [50110] Microsoft .NET Framework 'SaveAs()' Function Security Bypass Vulnerability
10190| [49999] Microsoft Silverlight & .NET Framework Inheritance Restriction Remote Code Execution Vulnerability
10191| [49728] Apache Struts Conversion Error OGNL Expression Evaluation Vulnerability
10192| [49637] Microsoft .NET Framework ASP.NET '__VIEWSTATE' Replay Security Bypass Vulnerability
10193| [49536] Spring Framework and Spring Security Remote Security Bypass Vulnerability
10194| [49518] Microsoft Excel Conditional Expression CVE-2011-1989 Remote Code Execution Vulnerability
10195| [49491] Zikula Application Framework 'themename' Parameter Cross Site Scripting Vulnerability
10196| [48991] Microsoft .NET Framework 'System.Net.Sockets' Namespace Security Bypass Vulnerability
10197| [48985] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability
10198| [48742] Oracle Database Server and Enterprise Manager Grid CVE-2011-2244 Security Framework Vulnerability
10199| [48739] Oracle Enterprise Manager Grid Control Security Framework Session Modification Vulnerability
10200| [48716] JBoss Seam Expression Language (EL) CVE-2011-2196 Remote Code Execution Vulnerability
10201| [48212] Microsoft Silverlight & .NET Framework Invalid Array Offset Remote Code Execution Vulnerability
10202| [48191] Horde Authentication Framework Composite Driver Authentication Bypass Vulnerability
10203| [48049] IBM Tivoli Management Framework 'opts' Argument Stack Buffer Overflow Vulnerability
10204| [47934] SystemTap DWARF Expression Handling Two Divide-By-Zero Denial of Service Vulnerabilities
10205| [47919] Zend Framework 'PDO_MySql' Security Bypass Vulnerability
10206| [47902] CiscoWorks Common Services Framework Help Servlet Cross Site Scripting Vulnerability
10207| [47834] Microsoft .NET Framework JIT Compiler Optimization NULL String Remote Code Execution Vulnerability
10208| [47783] Kay Framework Attribute Exchange Remote Security Bypass Vulnerability
10209| [47516] JBoss Seam Expression Language (EL) Remote Code Execution Vulnerability
10210| [47444] Oracle Sun Solaris 11 Express CVE-2011-0841 Remote Vulnerability
10211| [47223] Microsoft .NET Framework x86 JIT compiler Stack Corruption Remote Code Execution Vulnerability
10212| [46848] Zend Framework 'Zend_Tool_Project_Context_Zf_ViewScriptFile' Cross Site Scripting Vulnerability
10213| [46300] MetaSploit Framework Inherited Permission File Overwrite Local Privilege Escalation Vulnerability
10214| [45896] Oracle Sun Java System Communications Express CVE-2010-4456 Remote Web Mail Vulnerability
10215| [45864] Oracle Solaris 11 Express CVE-2010-4457 Remote CIFS Vulnerability
10216| [45830] SmoothWall Express 'ipinfo.cgi' Cross Site Scripting Vulnerability
10217| [45765] Cisco IOS CallManager Express (CME) (CVE-2009-5040) Denial of Service Vulnerability
10218| [45740] Macro Express Pro '.mxe' File Buffer Overflow Vulnerability
10219| [45617] libxml2 'XPATH' Expressions Memory Corruption Vulnerability
10220| [45391] IBM ENOVIA 'emxFramework.FilterParameterPattern' Cross Site Scripting Vulnerability
10221| [44799] Apple Mobile OfficeImport Framework Excel Record Memory Corruption Vulnerability
10222| [43910] Backbone Technology Expression Cross Site Scripting Vulnerabilities
10223| [43880] WebNMS Framework 'ReportViewAction.do' Cross Site Scripting Vulnerability
10224| [43781] Microsoft .NET Framework JIT Compiler Optimization Remote Code Execution Vulnerability
10225| [43316] Microsoft .NET Framework ASP.NET Padding Oracle Information Disclosure Vulnerability
10226| [43113] HP Data Protector Express (CVE-2010-3008) Local Privilege Escalation Vulnerability
10227| [43105] HP Data Protector Express Local Privilege Escalation Vulnerability
10228| [43017] RocketTheme Gantry Joomla! Framework 'moduleid' Parameter SQL Injection Vulnerability
10229| [43001] Horde Application Framework 'icon_browser.php' Cross-Site Scripting Vulnerability
10230| [42340] Play! Framework Directory Traversal Vulnerability
10231| [42295] Microsoft Silverlight & .NET Framework CLR Virtual Method Delegate Code Execution Vulnerability
10232| [42042] WebKit Regular Expression Handling Remote Memory Corruption Vulnerability
10233| [41994] JBoss Seam Parameterized EL Expressions Remote Code Execution Vulnerability
10234| [41887] EasyMail Objects 'SubmitToExpress()' Method Remote Stack Buffer Overflow Vulnerability
10235| [41625] Oracle E-Business Suite CVE-2010-0909 Remote Oracle Applications Framework Vulnerability
10236| [41621] Oracle Application Express CVE-2010-0892 Remote Vulnerability
10237| [41605] Oracle E-Business Suite CVE-2010-0908 Remote Oracle Applications Framework Vulnerability
10238| [41604] Oracle E-Business Suite CVE-2010-0912 Remote Oracle Applications Framework Vulnerability
10239| [41340] Open Text ECM 'Expression Builder' Cross Site Scripting Vulnerability
10240| [40954] Spring Framework 'class.classLoader' Code Injection Vulnerability
10241| [40684] Cisco Unified Contact Center Express CTI Messages Denial of Service Vulnerability
10242| [40680] Cisco Unified Contact Center Express Bootstrap Service Directory Traversal Vulnerability
10243| [40487] Microsoft Internet Explorer CSS 'expression' Remote Denial of Service Vulnerability
10244| [40052] RETIRED: Microsoft Windows Outlook Express and Windows Mail Integer Overflow Vulnerability
10245| [39974] PCRE Regular Expression Compiling Workspace Buffer Overflow Vulnerability
10246| [39927] Microsoft Outlook Express And Windows Mail Common Library Integer Overflow Vulnerability
10247| [39793] TaskFreak! Tirzen Framework 'LoadByKey()' SQL Injection Vulnerability
10248| [39717] Zikula Application Framework 'lang' Parameter Cross Site Scripting Vulnerability
10249| [39461] Oracle Sun Java System Communications Express CVE-2010-0885 Remote Address Book Vulnerability
10250| [39053] ViewVC Regular Expression Search Cross Site Scripting Vulnerability
10251| [38940] Cisco IOS For Communication Manager Express SCCP (CVE-2010-0586) Denial of Service Vulnerability
10252| [38936] Cisco IOS For Communication Manager Express SCCP (CVE-2010-0585) Denial of Service Vulnerability
10253| [38786] PostNuke FormExpress Module 'form_id' Parameter SQL Injection Vulnerability
10254| [38765] Trouble Ticket Express File Attachment Module Arbitrary Command Execution Vulnerability
10255| [38434] Website Baker 'framework/class.wb.php' Security Bypass Vulnerability
10256| [38084] IBM Cognos Express Hardcoded Credentials Security Bypass Vulnerability
10257| [37809] Zend Framework Multiple Input Validation Vulnerabilities and Security Bypass Weakness
10258| [37735] Oracle Application Express CVE-2010-0076 Remote Application Express Application Builder Vulnerabilit
10259| [37490] Calendar Express 'catid' Parameter SQL Injection Vulnerability
10260| [37351] Horde Application Framework Administration Interface 'PHP_SELF' Cross-Site Scripting Vulnerability
10261| [36926] Prototype JavaScript Framework Cross-Site Ajax Request Vulnerability
10262| [36812] Perl UTF-8 Regular Expression Processing Remote Denial of Service Vulnerability
10263| [36764] Oracle E-Business Suite CVE-2009-3402 Remote Oracle Applications Framework Vulnerability
10264| [36759] Oracle Database CVE-2009-1993 Application Express Unspecified Vulnerability
10265| [36648] Microsoft GDI+ .NET Framework Remote Code Execution Vulnerability
10266| [36618] Microsoft Silverlight and .NET Framework CLR Interface Handling Remote Code Execution Vulnerability
10267| [36617] Microsoft .NET Framework Type Verification Remote Code Execution Vulnerability
10268| [36611] Microsoft .NET Framework Pointer Verification Remote Code Execution Vulnerability
10269| [36571] Symantec SecurityExpressions Audit and Compliance Server Error Message HTML Injection Vulnerability
10270| [36570] Symantec SecurityExpressions Audit and Compliance Server Cross Site Scripting Vulnerability
10271| [36562] Sun Solaris IP(7P) Module and STREAMS Framework Local Denial Of Service Vulnerability
10272| [36498] Cisco Unified Communications Manager Express Extension Mobility Buffer Overflow Vulnerability
10273| [36346] Symantec Altiris eXpress NS SC Download ActiveX Control Arbitrary File Download Vulnerability
10274| [35924] PHP Fuzzer Framework Default Location Insecure Temporary File Creation Vulnerability
10275| [35891] Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability
10276| [35722] Google Chrome JavaScript Regular Expression Handling Remote Code Execution Vulnerability
10277| [35706] Cisco Unified Contact Center Express CRS Administration Interface Directory Traversal Vulnerability
10278| [35705] Cisco Unified Contact Center Express (CCX) Arbitrary Script Injection Vulnerability
10279| [35693] Oracle E-Business Suite CVE-2009-1982 Remote Oracle Applications Framework Vulnerability
10280| [35393] Zend Framework 'Zend_View::render()' Directory Traversal Vulnerability
10281| [34955] HP Data Protector Express 'dpwinsup.dll' Privilege Escalation Vulnerability
10282| [34702] Scorpio Framework 'baseAdminSite' Security Bypass Vulnerability
10283| [34314] Hitachi uCosminexus Portal Framework Multiple Vulnerabilities
10284| [34193] ExpressionEngine Avtaar Name HTML Injection Vulnerability
10285| [34155] Sun Java System Communications Express 'UWCMain' Cross Site Scripting Vulnerability
10286| [34154] Sun Java System Communications Express 'search.xml' Cross Site Scripting Vulnerability
10287| [34140] Sun Java System Messenger Express 'error' Parameter Cross-Site Scripting Vulnerability
10288| [34083] Sun Java System Communications Express Multiple HTML Injection Vulnerabilities
10289| [34077] IBM Tivoli Storage Manager Express and Enterprise Server Remote Buffer Overflow Vulnerability
10290| [33972] MySQL XPath Expression Remote Denial Of Service Vulnerability
10291| [33631] htmLawed CSS Expressions Unspecified Cross-Site Scripting Vulnerability
10292| [32780] Internet Explorer 8 CSS 'expression' Property Cross Site Scripting Filter Bypass Weakness
10293| [32702] Microsoft Outlook Express Malformed MIME Message Denial Of Service Vulnerability
10294| [32672] Kalptaru Infotech Product Sale Framework 'forum_topic_id' Parameter SQL Injection Vulnerability
10295| [31971] Extrakt Framework 'index.php' Cross Site Scripting Vulnerability
10296| [31829] Midgard Components Framework Multiple Unspecified Vulnerabilities
10297| [31644] DFFFrameworkAPI 'DFF_config[dir_include]' Parameter Multiple Remote File Include Vulnerabilities
10298| [31107] Horde Application Framework Forward Slash Insufficient Filtering Cross-Site Scripting Vulnerability
10299| [30585] Microsoft Outlook Express And Windows Mail MHTML Handler Information Disclosure Vulnerability
10300| [30263] Spring Framework Multiple Remote Vulnerabilities
10301| [30087] PCRE Regular Expression Heap Based Buffer Overflow Vulnerability
10302| [29476] Kaya CGI Framework HTTP Header Cross Site Scripting Vulnerability
10303| [28928] Perl Unicode '\Q...\E' Quoting Construct Regular Expression Buffer Overflow Vulnerability
10304| [28815] Apple Safari WebKit JavaScript Regular Expression Repetition Counts Buffer Overflow Vulnerability
10305| [28692] Wayport CyberCenter Express Authentication Bypass Vulnerability
10306| [28649] Sun Java System Messenger Express 'sid' Cross-Site Scripting Vulnerability
10307| [28591] Cisco Unified Communications Disaster Recovery Framework Remote Command Execution Vulnerability
10308| [28573] McAfee Common Management Agent 'FrameworkService.exe' Remote Denial of Service Vulnerability
10309| [28338] Apple Safari WebKit JavaScript Regular Expression Handling Buffer Overflow Vulnerability
10310| [28228] McAfee Framework ePolicy Orchestrator '_naimcomn_Log' Remote Format String Vulnerability
10311| [28153] Horde Framework Theme File Include Vulnerability
10312| [27942] Sun Solaris DTrace Dynamic Tracing Framework Information Disclosure Vulnerability
10313| [27325] Boost Library Regular Expression Remote Denial of Service Vulnerabilities
10314| [27235] IBM Tivoli Storage Manager Express Remote Heap Overflow Vulnerability
10315| [27128] ExpressionEngine HTTP Response Splitting and Cross Site Scripting Vulnerabilities
10316| [26898] PHP Security Framework Multiple Input Validation Vulnerabilities
10317| [26829] aurora framework Db_mysql.LIB SQL Injection Vulnerability
10318| [26800] Roundcube Webmail CSS Expression Input Validation Vulnerability
10319| [26727] PCRE Perl Compatible Regular Expression Subpattern Memory Allocation Denial Of Service Vulnerability
10320| [26725] PCRE Perl Compatible Regular Expressions Library POSIX Denial Of Service Vulnerability
10321| [26724] IBM Tivoli Provisioning Manager Express Username User Enumeration Weakness
10322| [26715] IBM Tivoli Provisioning Manager Express Multiple Cross Site Scripting Vulnerabilities
10323| [26550] PCRE Regular Expression Library UTF-8 Options Multiple Remote Denial of Service Vulnerabilities
10324| [26462] PCRE Regular Expression Library Multiple Integer and Buffer Overflow Vulnerabilities
10325| [26350] Perl Unicode Regular Expression Buffer Overflow Vulnerability
10326| [26346] PCRE Regular Expression Library Multiple Security Vulnerabilities
10327| [26194] Phpbasic basicFramework Includes.PHP Remote File Include Vulnerability
10328| [25996] Microsoft Expression Media Plaintext Password Storage Weakness
10329| [25908] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability
10330| [24993] iExpress Munch Pro Login SQL Injection Vulnerability
10331| [24992] iExpress Property Pro Vir_Login.ASP SQL Injection Vulnerability
10332| [24811] Microsoft .NET Framework JIT Compiler Remote Buffer Overflow Vulnerability
10333| [24791] Microsoft .Net Framework Multiple Null Byte Injection Vulnerabilities
10334| [24778] Microsoft .NET Framework PE Loader Remote Buffer Overflow Vulnerability
10335| [24674] SAP Internet Communication Framework Multiple Cross-Site Scripting Vulnerabilities
10336| [24480] Apache MyFaces Tomahawk JSF Framework Autoscroll Parameter Cross Site Scripting Vulnerability
10337| [24444] Microsoft Windows CE .NET Compact Framework Components Multiple Vulnerabilities
10338| [24410] Microsoft Outlook Express Content Disposition Parsing Information Disclosure Vulnerability
10339| [24392] Microsoft Outlook Express MHTML URL Parsing Information Disclosure Vulnerability
10340| [23928] PHP Todo List Manager Regular Expressions Multiple Security Bypass Vulnerabilities
10341| [23558] IBM Tivoli Monitoring Express Universal Agent Multiple Heap Buffer Overflow Vulnerabilities
10342| [22985] Horde Framework and IMP Cleanup Cron Script Arbitrary File Deletion Vulnerability
10343| [22984] Horde Framework Login.PHP Cross-Site Scripting Vulnerability
10344| [22578] Calendar Express Search.PHP Cross-Site Scripting Vulnerability
10345| [22178] Yana Framework Guestbook Unspecified Security Bypass Vulnerability
10346| [21899] Apple DiskManagement Framework BOM Local Privilege Escalation Vulnerability
10347| [21706] OpenSER Parse_Expression Remote Buffer Overflow Vulnerability
10348| [21501] Microsoft Outlook Express Windows Address Book Contact Record Remote Code Execution Vulnerability
10349| [21059] SiteXpress E-Commerce System Dept.ASP SQL Injection Vulnerability
10350| [21053] Apple Safari JavaScript Regular Expression Match Remote Denial of Service Vulnerability
10351| [20840] Mirapoint Web Mail Expression() HTML Injection Vulnerability
10352| [20838] iPlanet Messaging Server Messenger Express Expression() HTML Injection Vulnerability
10353| [20832] Sun Java System Messenger Express Cross-Site Scripting Vulnerability
10354| [20753] Microsoft .NET Framework Request Filtering Bypass Vulnerability
10355| [20450] BlueShoes Framework GoogleSearch.PHP Remote File Include Vulnerability
10356| [19309] Cisco CallManager Express SIP User Directory Information Disclosure Vulnerability
10357| [19302] G3 Content Management Framework HTML Injection Vulnerability
10358| [18979] McAfee EPolicy Orchestrator Framework Service Directory Traversal Vulnerability
10359| [18845] Horde Application Framework Services Multiple Cross-Site Scripting Vulnerabilities
10360| [18771] Microsoft Internet Explorer OutlookExpress.AddressBook Denial of Service Vulnerability
10361| [18436] Horde Application Framework Multiple Cross-Site Scripting Vulnerabilities
10362| [18386] Adaptive Website Framework Remote File Include Vulnerability
10363| [18314] Calendar Express Month.PHP SQL Injection Vulnerability
10364| [18261] BlueShoes Framework Multiple Remote File Include Vulnerabilities
10365| [17786] FileProtection Express Authentication Bypass Vulnerability
10366| [17775] Cisco Unity Express Expired Password Privilege Escalation Vulnerability
10367| [17717] Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability
10368| [17459] Microsoft Outlook Express Windows Address Book File Parsing Buffer Overflow Vulnerability
10369| [17243] Microsoft .NET Framework SDK MSIL Tools Buffer Overflow Vulnerabilities
10370| [17240] Calendar Express Multiple Cross-Site Scripting Vulnerabilities
10371| [17168] WebLogic Server and WebLogic Express Invalid Login Attempts Weakness
10372| [17163] BEA WebLogic Server and WebLogic Express HTTP Response Splitting Vulnerability
10373| [17117] Horde Application Framework Go.PHP Information Disclosure Vulnerability
10374| [17085] IBM Tivoli Lightweight Client Framework Information Disclosure Vulnerability
10375| [16377] PMachine ExpressionEngine HTTP Referrer HTML Injection Vulnerability
10376| [16215] BEA WebLogic Server and WebLogic Express MBean Remote Information Disclosure Vulnerability
10377| [15937] Adaptive Website Framework Cross-Site Scripting Vulnerability
10378| [15810] Horde Application Framework CSV File Upload Code Execution Vulnerability
10379| [15806] Horde Application Framework Input Validation Vulnerabilities
10380| [15635] KBase Express Multiple SQL Injection Vulnerabilities
10381| [15271] Sun Java System Communications Express Information Disclosure Vulnerability
10382| [15231] Rockliffe MailSite Express Information Disclosure Vulnerability
10383| [15230] Rockliffe MailSite Express Arbitrary Script File Upload Vulnerability
10384| [15229] Rockliffe MailSite Express Message Body HTML Injection Vulnerability
10385| [15129] Rockliffe MailSite Express Arbitrary File Upload Vulnerability
10386| [15052] BEA WebLogic Server and WebLogic Express Multiple Vulnerabilities
10387| [14620] PCRE Regular Expression Heap Overflow Vulnerability
10388| [14505] Calendar Express Search.PHP Cross-Site Scripting Vulnerability
10389| [14504] Calendar Express Multiple SQL Injection Vulnerabilities
10390| [14455] Metasploit Framework MSFWeb Defanged Mode Restriction Bypass Vulnerability
10391| [14225] Microsoft Outlook Express Multiple Vulnerabilities
10392| [14194] IBM Tivoli Management Framework Endpoint Remote Denial Of Service Vulnerability
10393| [14075] Adobe Acrobat/Adobe Reader Safari Frameworks Folder Permission Escalation Vulnerability
10394| [13951] Microsoft Outlook Express NNTP Response Parsing Buffer Overflow Vulnerability
10395| [13837] Microsoft Outlook Express Attachment Processing File Extension Obfuscation Vulnerability
10396| [13717] BEA WebLogic Server and WebLogic Express Multiple Remote Vulnerabilities
10397| [13400] BEA WebLogic Server And WebLogic Express Administration Console Cross-Site Scripting Vulnerability
10398| [13202] Apple WebCore Framework XMLHttpRequests Remote Code Execution Vulnerability
10399| [12943] Horde Application Framework Parent Page Title Cross-Site Scripting Vulnerability
10400| [12548] BEA WebLogic Server And WebLogic Express Authentication Failure Information Disclosure Weakness
10401| [11546] Horde Application Framework Help Window Unspecified Cross-Site Scripting Vulnerability
10402| [11447] Microsoft Outlook Express Plaintext Email Security Policy Bypass Vulnerability
10403| [11426] Express-Web Content Management System Unspecified Cross-Site Scripting Vulnerability
10404| [11128] Cosminexus Portal Framework Information Disclosure Vulnerability
10405| [11040] Microsoft Outlook Express BCC Field Information Disclosure Vulnerability
10406| [10711] Microsoft Outlook Express Malformed Email Header Denial Of Service Vulnerability
10407| [10692] Microsoft Outlook Express Message Window Script Execution Vulnerability
10408| [10624] BEA WebLogic Server And WebLogic Express Application Role Unauthorized Access Vulnerability
10409| [10545] BEA WebLogic Server And WebLogic Express Java RMI Incorrect Session Inheritance Vulnerability
10410| [10544] BEA WebLogic Server And WebLogic Express Remote Denial of Service Vulnerability
10411| [10345] Microsoft Outlook Express URI Obfuscation Vulnerability
10412| [10328] BEA WebLogic Server And WebLogic Express Lowered Security Settings Vulnerability
10413| [10327] BEA WebLogic Server and WebLogic Express Denial of Service Vulnerability
10414| [10188] BEA WebLogic Server And WebLogic Express Configuration Log Files Plain Text Password Vulnerability
10415| [10185] BEA WebLogic Server/Express EJB Object Removal Denial Of Service Vulnerability
10416| [10184] BEA WebLogic Server and WebLogic Express Illegal URI Pattern Potential Bypass Vulnerability
10417| [10144] Microsoft Outlook/Outlook Express Remote Denial Of Service Vulnerability
10418| [10132] BEA WebLogic Server and WebLogic Express Certificate Chain User Impersonation Vulnerability
10419| [10131] BEA WebLogic Server/Express Potential Password Disclosure Weakness
10420| [10106] Ipswitch IMail Express Web Messaging Buffer Overrun Vulnerability
10421| [10098] Microsoft Outlook Express Malformed EML File Denial of Service Vulnerability
10422| [9709] Multiple Outlook/Outlook Express Predictable File Location Weaknesses
10423| [9673] Microsoft Outlook Express Arbitrary Program Execution Vulnerability
10424| [9506] WebLogic Server and Express HTTP TRACE Credential Theft Vulnerability
10425| [9503] BEA WebLogic Server/Express Potential Administrator Password Disclosure Weakness
10426| [9502] BEA WebLogic Server and Express SSL Client Privilege Escalation Vulnerability
10427| [9107] Microsoft Outlook Express MHTML Redirection Local File Parsing Vulnerability
10428| [9105] Microsoft Outlook Express MHTML Forced File Execution Vulnerability
10429| [9034] Multiple BEA WebLogic Server/Express Denial of Service and Information Disclosure Vulnerabilities
10430| [8760] SquirrelMail CSS JavaScript Expression MSIE Script Code Injection Vulnerability
10431| [8399] Horde Application Framework Account Hijacking Vulnerability
10432| [8320] BEA WebLogic Server and WebLogic Express User Impersonation Vulnerability
10433| [8281] Microsoft Outlook Express Script Execution Weakness
10434| [8143] Multiple BEA WebLogic Server/Express Vulnerabilities
10435| [8056] Zope Error-Handling Framework Cross-Site Scripting Vulnerability
10436| [7612] Sun Java Media Framework Unspecified Denial of Service Vulnerability
10437| [6959] Netscape JavaScript Regular Expression Denial Of Service Vulnerability
10438| [6923] Microsoft Outlook and Outlook Express Arbitrary Program Execution Vulnerability
10439| [6717] BEA Systems WebLogic Server and Express Session Sharing Vulnerability
10440| [5971] BEA WebLogic Server/Express/Integration Application Migration Security Policy Weakness
10441| [5944] Microsoft Outlook Express S/MIME Buffer Overflow Vulnerability
10442| [5846] BEA WebLogic Server and Express Inadvertent Security Removal Weakness
10443| [5819] BEA WebLogic Server and Express HTTP Response Information Disclosure Vulnerability
10444| [5682] Alleged Outlook Express Link Denial of Service Vulnerability
10445| [5473] Microsoft Outlook Express MHTML URL Handler File Rendering Vulnerability
10446| [5350] Microsoft Outlook Express XML File Attachment Script Execution Vulnerability
10447| [5277] Microsoft Outlook Express Spoofable File Extensions Vulnerability
10448| [5274] Microsoft Outlook Express SMTP Over TLS Information Disclosure Vulnerability
10449| [5235] IBM Tivoli Management Framework Endpoint Buffer Overflow Vulnerability
10450| [5233] IBM Tivoli Management Framework ManagedNode Buffer Overrun Vulnerability
10451| [5224] Pingtel Expressa Arbitrary Application Installation Vulnerability
10452| [5223] Pingtel Expressa Arbitrary Firmware Upgrade Vulnerability
10453| [5221] Pingtel Expressa Admin Account Login Session Timeout Vulnerability
10454| [5220] Pingtel Expressa Web Server Cross-Site Scripting Vulnerability
10455| [5214] Pingtel Expressa Default Blank Administrator Password Vulnerability
10456| [5159] BEA Systems WebLogic Server and Express Race Condition Denial of Service Vulnerability
10457| [4734] BEA WebLogic Server and Express File Disclosure Vulnerability
10458| [4733] BEA Systems WebLogic Server and Express Password Disclosure Vulnerability
10459| [4653] Microsoft Internet Explorer/Outlook Express XBM Handling DoS Vulnerability
10460| [4646] BEA Systems WebLogic Server and Express Null Character DOS Device Denial of Service Vulnerability
10461| [4645] BEA Systems WebLogic Server and Express URL Parsing Source Code Disclosure Vulnerability
10462| [4643] BEA Systems WebLogic Server and Express URL Parsing Path Disclosure Vulnerability
10463| [4584] Microsoft Outlook Express DOS Device Denial of Service Vulnerability
10464| [4191] Cisco IOS Cisco Express Forwarding Session Information Leakage Vulnerability
10465| [4092] Outlook Express Attachment Carriage Return/Linefeed Encapsulation Filtering Bypass Vulnerability
10466| [4029] eshare Expressions Directory Traversal Vulnerability
10467| [3611] Microsoft Outlook Express for Macintosh Buffer Overflow Vulnerability
10468| [3334] Microsoft Outlook Express 6 Plain Text Message Script Execution Vulnerability
10469| [3271] Outlook Express 6 Attachment Security Bypass Vulnerability
10470| [2823] Microsoft Outlook Express Address Book Spoofing Vulnerability
10471| [1647] Intel Express Switch 500 Series Malformed ICMP Packet DoS Vulnerability
10472| [1609] Intel Express Switch 500 series DoS
10473| [1502] Microsoft Outlook Express Persistent Mail-Browser Link Vulnerability
10474| [1501] Microsoft Outlook / Outlook Express Cache Bypass Vulnerability
10475| [1481] Microsoft Outlook / Outlook Express GMT Field Buffer Overflow Vulnerability
10476| [1394] Microsoft Internet Explorer and Outlook/Outlook Express Remote File Write Vulnerability
10477| [1378] BEA Systems WebLogic Server and Express Source Code Disclosure Vulnerability
10478| [1228] Intel Express 8100 ISDN Router Fragmented ICMP Vulnerability
10479| [1195] Microsoft Outlook 98 / Outlook Express 4.x Long Filename Vulnerability
10480| [962] MS Outlook Express 5 Javascript Email Access Vulnerability
10481| [883] Microsoft Outlook Express for MacOS HTML Attachment Automatic Download Vulnerability
10482| [800] Microsoft Outlook Express For Mac Download Vulnerability
10483| [749] Celtech ExpressFS USER Buffer Overflow Vulnerability
10484| [533] Microsoft Outlook Express for MacOS Change Current User Vulnerability
10485| [252] Outlook Express POP Denial of Service Vulnerability
10486|
10487| IBM X-Force - https://exchange.xforce.ibmcloud.com:
10488| [69688] Spring Framework expression information disclosure
10489| [86322] Restlet Framework XML deserialization code execution
10490| [86122] Multiple Cisco content network and video delivery products framework command execution
10491| [86121] Cisco Wide Area Application Services framework code execution
10492| [85756] Apache Struts OGNL expression command execution
10493| [85690] Oracle Solaris Kernel/STREAMS framework denial of service
10494| [85677] Oracle Agile PLM Framework Security information disclosure
10495| [85676] Oracle Agile Product Framework Folders & Files Attachment information disclosure
10496| [85675] Oracle Agile Collaboration Framework Manufacturing/Mfg Parts unspecified
10497| [85674] Oracle Agile PLM Framework Web Client (CS) unspecified
10498| [85666] Oracle Enterprise Manager Grid Control User Interface Framework unspecified
10499| [85635] BMC Service Desk Express multiple cross-site scripting
10500| [85634] BMC Service Desk Express multiple SQL injection
10501| [85242] Microsoft .NET Framework and Microsoft Silverlight privilege escalation
10502| [85241] Microsoft .NET Framework and Microsoft Silverlight code execution
10503| [85240] Microsoft .NET Framework and Microsoft Silverlight code execution
10504| [85239] Microsoft .NET Framework and Microsoft Silverlight privilege escalation
10505| [85238] Microsoft .NET Framework and Microsoft Silverlight privilege escalation
10506| [85237] Microsoft .NET Framework and Microsoft Silverlight code execution
10507| [84725] Horde Application Framework unspecified cross-site scripting
10508| [83879] Microsoft .NET Framework security bypass
10509| [83878] Microsoft .NET Framework spoofing
10510| [83685] Cisco Unified Contact Center Express information disclosure
10511| [83488] Oracle Siebel CRM Siebel UI Framework information disclosure
10512| [83484] Oracle Siebel CRM Siebel UI Framework information disclosure
10513| [83483] Oracle Siebel CRM Siebel UI Framework unspecified
10514| [83442] Oracle Database Application Express unspecified
10515| [83401] Hero Framework login and forgot_password pages cross-site scripting
10516| [82894] Zend Framework Zend\Db SQL injection
10517| [82893] Zend Framework Zend\Validate\Csrf component information disclosure
10518| [82892] Zend Framework Zend\Mvc data manipulation
10519| [82216] Fluid Extbase Development Framework extension for TYPO3 unserialize() code execution
10520| [82215] Fluid Extbase Development Framework extension for TYPO3 unspecified command execution
10521| [82103] Zend Framework SimpleXMLElement classes information disclosure
10522| [82102] Zend Framework circular references denial of service
10523| [81806] Cisco Unity Express unspecified cross-site request forgery
10524| [81805] Cisco Unity Express unspecified cross-site scripting
10525| [81751] Vaadin Framework Map parameter cross-site scripting
10526| [81667] Microsoft .NET Framework WinForms privilege escalation
10527| [81587] Kohana Framework Filebrowser.php directory traversal
10528| [81300] Oracle Siebel CRM Siebel UI Framework information disclosure
10529| [81277] Oracle Agile PLM Framework Security information disclosure
10530| [81276] Oracle E-Business Applications Framework unspecified
10531| [81273] Oracle E-Business Applications Framework unspecified
10532| [81268] Oracle E-Business Applications Framework security bypass
10533| [81267] Oracle Enterprise Manager User Interface Framework unspecified
10534| [81264] Oracle Enterprise Manager Policy Framework unspecified
10535| [80871] Microsoft .NET Framework permission privilege escalation
10536| [80870] Microsoft .NET Framework S.D.S.P. privilege escalation
10537| [80869] Microsoft .NET Framework Windows Forms privilege escalation
10538| [80868] Microsoft .NET Framework information disclosure
10539| [80866] Microsoft .NET Framework OData denial of service
10540| [80797] Hero Framework unspecified cross-site request forgery
10541| [80796] Hero Framework login and search pages cross-site scripting
10542| [80718] Zend Framework Zend_Feed information disclosure
10543| [80605] Smartphone Pentest Framework command execution
10544| [80315] Smartphone Pentest Framework btinstall privilege escalation
10545| [80314] Smartphone Pentest Framework config information disclosure
10546| [80313] Smartphone Pentest Framework guessPassword.pl cross-site request forgery
10547| [80312] Smartphone Pentest Framework multiple SQL injections
10548| [80311] Smartphone Pentest Framework frameworkgui command execution
10549| [80277] JRuby expression engine cross-site scripting
10550| [80266] Prado PHP Framework functional_tests.php directory traversal
10551| [80265] Yii Framework search form SQL injection
10552| [79956] PayPal Express module in osCommerce SSL spoofing
10553| [79735] IBM WebSphere Commerce Web Services framework denial of service
10554| [79692] Microsoft .NET Framework reflection privilege escalation
10555| [79691] Microsoft .NET Framework Web proxy code execution
10556| [79690] Microsoft .NET Framework DLL code execution
10557| [79689] Microsoft .NET Framework output information disclosure
10558| [79688] Microsoft .NET Framework reflection privilege escalation
10559| [79346] Oracle Siebel UI Framework Siebel Documentation information disclosure
10560| [79345] Oracle Siebel UI Framework Portal Framework information disclosure
10561| [79332] Oracle Agile PLM Framework ROLESPRV information disclosure
10562| [79331] Oracle Agile PLM Framework ATTACH information disclosure
10563| [79330] Oracle Agile PLM Framework Web Client (CS) unspecified
10564| [79326] Oracle E-Business Applications Framework information disclosure
10565| [79202] vOlk-Botnet Framework multiple cross-site scripting
10566| [79200] vOlk Botnet Framework pag and pais parameter SQL injection
10567| [78761] Zend Framework multiple scripts cross-site scripting
10568| [78379] IBM Rational Automation Framework Environment Wizard security bypass
10569| [78056] Express Burn .ebp file buffer overflow
10570| [77877] FishEye and Crucible third-party frameworks security bypass
10571| [77789] Niagara Framework information disclosure
10572| [77294] IBM WebSphere Commerce REST services framework security bypass
10573| [77149] Tridium Niagara AX Framework security bypass
10574| [77039] Oracle Siebel CRM UI Framework information disclosure
10575| [77038] Oracle Siebel CRM UI Framework information disclosure
10576| [77037] Oracle Siebel CRM UI Framework unspecified
10577| [77036] Oracle Siebel CRM UI Framework denial of service
10578| [77035] Oracle Siebel CRM UI Framework denial of service
10579| [77034] Oracle Siebel CRM Portal Framework unspecified
10580| [76992] Oracle Application Express APEX Listener information disclosure
10581| [76969] Metasploit Framework pcap_log privilege escalation
10582| [76947] Niagara Framework URL directory traversal
10583| [76743] Microsoft .NET Framework tilde denial of service
10584| [76533] Zend Framework Zend_XmlRpc class information disclosure
10585| [75941] Microsoft .NET Framework function code execution
10586| [75935] Restlet Framework XML entities unspecified
10587| [75865] Yellow Duck Framework index.php information disclosure
10588| [75674] WEB MART Internet Explorer CSS expressions cross-site scripting
10589| [75542] Travelon Express multiple file upload
10590| [75541] Travelon Express holiday_add.php and holiday_view.php cross-site scripting
10591| [75540] Travelon Express multiple scripts SQL injection
10592| [75493] Apple Mac OS X Security framework integer overflow
10593| [75487] Apple Mac OS X LoginUIFramework security bypass
10594| [75437] Node.js HTTP parser information disclosure
10595| [75339] Cisco Unified Contact Center Express network traffic denial of service
10596| [75134] Microsoft .NET Framework index denial of service
10597| [75133] Microsoft .NET Framework buffer code execution
10598| [75098] Microsoft .NET Framework EncoderParameter buffer overflow
10599| [74942] Oracle Database Application Express unspecified
10600| [74909] JA T3-Framework component for Joomla! index.php directory traversal
10601| [74527] TYPO3 Extbase framework unserialize() code execution
10602| [74377] Microsoft .NET Framework parameter code execution
10603| [74376] Microsoft .NET Framework input code execution
10604| [74375] Microsoft .NET Framework serialization code execution
10605| [73948] HP Data Protector Express code execution
10606| [73947] HP Data Protector Express code execution
10607| [73946] HP Data Protector Express code execution
10608| [73945] HP Data Protector Express code execution
10609| [73905] Jam Trax Express DLL code execution
10610| [73535] Microsoft Expression Design code execution
10611| [73034] IBM Tivoli Provisioning Manager Express for Software Distribution multiple SQL injection
10612| [73033] IBM Tivoli Provisioning Manager Express for Software Distribution ActiveX control (Isig.isigCtl.1) buffer overflow
10613| [72878] FishEye and Crucible Webwork 2 framework code injection
10614| [72848] Microsoft .NET Framework buffer overflow
10615| [72847] Microsoft .NET Framework and Microsoft Silverlight unmanaged objects code execution
10616| [72395] ExpressView Browser Plug-in SID file code execution
10617| [72394] ExpressView Browser Plug-in npexview.dll buffer overflow
10618| [71808] Microsoft .NET Framework SaveAs() security bypass
10619| [71711] Apache Struts OGNL expression code execution
10620| [71587] Hero Framework events script cross-site scripting
10621| [71577] CodeIgniter and ExpressionEngine xss_clean() cross-site scripting
10622| [71026] IBM TS3100 and TS3200 Tape Library Express Web management console authentication bypass
10623| [70976] Novell XTier Framework HTTP Header integer overflow
10624| [70799] Oracle Database Server Application Express APEX developer user unspecified
10625| [70795] Oracle E-Business Suite Oracle Applications Framework REST Services unspecified
10626| [70309] Zend Framework in Zend Server CE Validate.php path disclosure
10627| [70136] Mozilla Firefox, Thunderbird, and SeaMonkey YARR regular expression library denial of service
10628| [69687] Spring Framework and Spring Security object security bypass
10629| [69644] Zikula Application Framework index.php cross-site scripting
10630| [69496] Microsoft Excel expression code execution
10631| [68828] Microsoft .NET Framework socket information disclosure
10632| [68732] JBoss Seam Expression Language code execution
10633| [68212] Apple Mac OS X CoreFoundation framework buffer overflow
10634| [67959] Horde_Auth Framework composite authentication driver security bypass
10635| [67896] Google Chrome extension framework code execution
10636| [67858] IBM Tivoli Management Framework Tivoli Endpoint code execution
10637| [67752] Microsoft .NET Framework and Microsoft Silverlight XAML code execution
10638| [67539] Zend Framework MySQL PDO security bypass
10639| [67523] Cisco Unified Operations Manager Common Services Framework Help Servlet cross-site scripting
10640| [67411] Microsoft .NET Framework JIT compiler code execution
10641| [67360] Kay Framework Attribute Exchange (AX) security bypass
10642| [67269] Horde Application Framework Sql.php security bypass
10643| [67268] Horde Application Framework xss.php cross-site scripting
10644| [66951] Oracle Solaris Express TCP/IP unspecified
10645| [66949] Oracle Solaris Express LOFS unspecified
10646| [66944] Oracle Solaris Express Kernel/SPARC unspecified
10647| [66936] Oracle Solaris Express Kernel unspecified
10648| [66933] Oracle Solaris Express Kernel unspecified
10649| [66932] Oracle Solaris Express Kernel unspecified
10650| [66088] Zend Framework view script cross-site scripting
10651| [66010] Linux SCSI target framework (tgt) iscsi_rx_handler() denial of service
10652| [65171] Qcodo Development Framework unspecified path disclosure
10653| [64908] Microsoft .NET Framework JIT code execution
10654| [64815] Sun Java System Communications Express Web Mail unauthorized access
10655| [64729] SmoothWall Express reboot cross-site request forgery
10656| [64728] SmoothWall Express ipinfo.cgi cross-site scripting
10657| [64681] Cisco IOS CallManager Express denial of service
10658| [64562] Macro Express MXE buffer overflow
10659| [64311] Dassault Systemes ENOVIA emxFramework.FilterParameterPattern cross-site scripting
10660| [62493] Backbone Technology Expression section_copy_id parameter cross-site scripting
10661| [62265] MySQL expression values denial of service
10662| [62146] Microsoft .NET Framework JIT compiler code execution
10663| [62100] Horde Application Framework icon_browser.php cross-site request forgery
10664| [62099] Horde Application Framework icon_browser.php cross-site scripting
10665| [61869] OTRS regular expression denial of service
10666| [61711] HP Data Protector Express and HP Data Protector Express Single Server Edition DtbClsLogin buffer overflow
10667| [61710] HP Data Protector Express and HP Data Protector Express Single Server Edition PrvRecvRqu() denial of service
10668| [61625] Horde Application Framework subdir cross-site scripting
10669| [61470] Seagull PHP Framework multiple file include
10670| [61469] Seagull PHP Framework index.php SQL injection
10671| [61038] Play! Framework public directory traversal
10672| [60794] JBoss Seam expressions code execution
10673| [60766] Apple Safari regular expressions code execution
10674| [60735] Microsoft .NET Framework CLR code execution
10675| [60366] Diem Content Management Framework article_form_filter[name][text] parameter cross-site scripting
10676| [60364] Diem Content Management Framework value parameter cross-site scripting
10677| [60363] Diem Content Management Framework text parameter cross-site scripting
10678| [60319] Oracle E-Business Suite Oracle Applications Framework component unspecified
10679| [60316] Oracle E-Business Suite Oracle Applications Framework component unspecified
10680| [60314] Oracle E-Business Suite Oracle Applications Framework component unspecified
10681| [60298] Oracle Database Server Application Express component unspecified
10682| [60159] Open Text ECM Expression Builder cross-site scripting
10683| [59573] Spring Framework WebappClassLoader code execution
10684| [59415] ardeaCore PHP Framework ardeaInit.php file include
10685| [59277] Cisco Unified Contact Center Express bootstrap directory traversal
10686| [59276] Cisco Unified Contact Center Express CTI denial of service
10687| [59069] Microsoft Internet Explorer CSS expression denial of service
10688| [58334] Zikula Application Framework index.php cross-site request forgery
10689| [58224] Zikula Application Framework index.php cross-site scripting
10690| [58172] Microsoft Outlook Express and Windows Mail client integer overflow
10691| [58045] Perl regular expression engine integer overflow
10692| [57987] Sun Java System Communications Express subject cross-site request forgery
10693| [57749] Oracle Sun Product Suite Sun Java System Communications Express unspecified
10694| [57496] Linux SCSI Target Framework isns.c format string
10695| [57402] ViewVC regular expression search cross-site scripting
10696| [57054] Trouble Ticket Express ttx.cgi directory traversal
10697| [56989] ContentExpress module for PHP-Nuke index.php SQL injection
10698| [56884] Trouble Ticket Express ttx.cgi code execution
10699| [56883] Trouble Ticket Express ttx.cgi directory traversal
10700| [56549] Hitachi Cosminexus products Portal Framework cross-site scripting
10701| [56401] IBM Cognos Express Tomcat default password
10702| [56086] IBM Cognos Express Tomcat Manager default password
10703| [55782] SAP BusinessObjects framework cross-site scripting
10704| [55656] Zend Framework Zend_Json_Encoder cross-site scripting
10705| [55655] Zend Framework Zend_Json_Encoder cross-site scripting
10706| [55654] Zend Framework Zend_Service_ReCaptcha_MailHide cross-site scripting
10707| [55653] Zend Framework Zend_File_Transfer weak security
10708| [55646] Zend Framework Zend_Filter_StripTags cross-site scripting
10709| [55644] Zend Framework Zend_Dojo_View_Helper_Editor cross-site scripting
10710| [55643] Zend Framework multiple components cross-site scripting
10711| [55592] Oracle Database Application Express Application Builder information disclosure
10712| [55558] Calendar Express search.php cross-site scripting
10713| [55312] My Book express.php path disclosure
10714| [55187] Zend Framework Zend_Log_Writer_Mail weak security
10715| [55083] Calendar Express year.php SQL injection
10716| [53939] Perl UTF-8 expressions denial of service
10717| [53861] Oracle E-Business Suite Applications Framework component unspecified
10718| [53842] Oracle Database Application Express component unspecified
10719| [53669] Symantec SecurityExpressions Audit and Compliance Server error response cross-site scripting
10720| [53668] Symantec SecurityExpressions Audit and Compliance Server console cross-site scripting
10721| [53652] Prototype JavaScript framework (prototypejs) AJAX unspecified
10722| [53529] Microsoft Windows GDI+ .NET Framework API code execution
10723| [53448] Cisco IOS Communications Manager Express (CME) extension buffer overflow
10724| [53202] Horde Application Framework form library file overwrite
10725| [53179] Altirix eXpress NS SC Download ActiveX control code execution
10726| [53106] obophix FrameWork fonctions_racine.php file include
10727| [52784] Simple CMS FrameWork index.php SQL injection
10728| [52780] Microsoft .NET Framework CLR code execution
10729| [52254] PHP Fuzzer Framework output file code execution
10730| [52113] ASP.NET Framework component of Microsoft Windows HTTP denial of service
10731| [51890] Credit Card Number Pattern Found (American Express)
10732| [51765] Oracle E-Business Suite Applications Framework component unspecified
10733| [51731] Cisco Unified Contact Center Express (Cisco Unified CCX) server administration interface directory traversal
10734| [51730] Cisco Unified Contact Center Express (Cisco Unified CCX) server administrative interface cross-site scripting
10735| [51306] Zend Framework Zend_View::render() directory traversal
10736| [51250] WebNMS Framework report/ReportViewAction.do cross-site scripting
10737| [50965] IBM FileNet Content Manager Web Services Extensible Authentication Framework (WSEAF) security bypass
10738| [50689] Novell GroupWise WebAccess style expressions cross-site scripting
10739| [50658] Sun Java System Communications Express search.html and UWCMain cross-site scripting
10740| [50114] Scorpio Framework baseAdminSite security bypass
10741| [50083] Spring Framework data denial of service
10742| [50043] Oracle E-Business Suite Applications Framework unspecified system integrity
10743| [49951] Apache Tiles Expression Language (EL) expressions cross-site scripting
10744| [49359] ExpressionEngine avatar cross-site scripting
10745| [49287] Sun Java System Messenger Express error cross-site scripting
10746| [49197] Sun Java System Communications Express message cross-site scripting
10747| [49188] IBM Tivoli Storage Manager Express adsmdll.dll buffer overflow
10748| [48517] htmLawed CSS expressions cross-site scripting
10749| [48294] Microsoft .NET Framework Type check code execution
10750| [48293] Microsoft .NET Framework CAS verification code execution
10751| [47992] Oracle E-Business Suite Applications Framework About Us Page information disclosure
10752| [47277] Microsoft Internet Explorer CSS expression property XSS filter bypass
10753| [47144] Product Sale Framework customer.forumtopic.php SQL injection
10754| [46695] Microsoft .NET Framework SN weak security
10755| [46499] IBM Metrica Service Assurance Framework ReportRequest cross-site scripting
10756| [46495] IBM Metrica Service Assurance Framework ReportTree and Launch cross-site scripting
10757| [46186] Extrakt Framework index.php cross-site scripting
10758| [45962] Midgard Components Framework multiple unspecified vulnerabilities
10759| [45907] Oracle Database Application Express component privilege escalation
10760| [45897] Oracle E-Business Suite Applications Framework component unspecified
10761| [45764] DFFFrameworkAPI DFF_config[dir_include] file include
10762| [44737] Red Hat Directory Server Directory Server Administration Express and Directory Server Gateway cross-site scripting
10763| [44281] BEA WebLogic Server and WebLogic Express LDAP denial of service
10764| [43778] Firebird expression denial of service
10765| [43411] Seagull PHP Framework config.php file upload
10766| [42774] Kaya CGI framework header injection
10767| [42679] Microsoft Outlook Express MHTML information disclosure
10768| [42332] Red Hat Directory Server and Fedora Directory Server regular expression buffer overflow
10769| [42054] Oracle E-Business Suite Applications Framework component unspecified information disclosure
10770| [42041] Oracle Application Express unspecified unauthorized access
10771| [41988] Oracle Application Express privilege escalation
10772| [41714] WoltLab Burning Board WoltLab Community Framework page and form parameters cross-site scripting
10773| [41713] WoltLab Burning Board WoltLab Community Framework exception handling information disclosure
10774| [41632] Multiple Cisco Devices Disaster Recovery Framework (DRF) command execution
10775| [41597] McAfee Common Management Agent FrameworkService.exe denial of service
10776| [41321] Apple Safari WebKit JavaScript regular expressions buffer overflow
10777| [41178] McAfee ePolicy Orchestrator Framework Service format string
10778| [40992] WebKit regular expression code execution
10779| [40772] Sun Solaris DTrace dynamic tracing framework information disclosure
10780| [40707] BEA WebLogic Server and WebLogic Express WSDL information disclosure
10781| [40702] BEA WebLogic and WebLogic Express servlet unauthorized access
10782| [40700] BEA WebLogic Server and WebLogic Express JMS messages security bypass
10783| [40697] BEA WebLogic Server and WebLogic Express login page session hijacking
10784| [40696] BEA WebLogic Server and WebLogic Express administration console cross-site scripting
10785| [40695] BEA WebLogic Server and WebLogic Express account lockout security bypass
10786| [40694] BEA WebLogic Server and WebLogic Express HttpClusterServlet and HttpProxyServlet privilege escalation
10787| [40692] BEA WebLogic Server and WebLogic Express proxy plugin denial of service
10788| [39663] ExpressionEngine index.php CRLF header injection
10789| [39604] IBM Tivoli Storage Manager (TSM) Express server buffer overflow
10790| [39498] PostgreSQL complex regular expressions denial of service
10791| [39497] PostgreSQL regular expressions denial of service
10792| [39442] ExpressionEngine index.php cross-site scripting
10793| [39084] PHPSecurityFramework multiple SQL injection
10794| [39083] PHPSecurityFramework base.inc.php remote file include
10795| [38999] aurora framework db_mysql.lib SQL injection
10796| [38866] IBM Tivoli Provisioning Manager Express username information disclosure
10797| [38864] IBM Tivoli Provisioning Manager Express multiple cross-site scripting
10798| [38713] Microsoft Internet Explorer ActiveX setExpression code execution
10799| [38582] PCRE regular expressions UTF-8 denial of service
10800| [38581] PCRE malformed regular expression multiple integer overflows
10801| [38426] PCRE malformed regular expression multiple integer overflows
10802| [38324] Microsoft Outlook and Outlook Express URI handling command execution
10803| [38274] PCRE non-UTF-8 regular expressions denial of service
10804| [38272] PCRE \Q\E regular expressions code execution
10805| [38270] Perl Unicode regular expressions buffer overflow
10806| [37396] php basic basicFramework id SQL injection
10807| [37395] php basic basicFramework includes file include
10808| [37044] Microsoft Expression Media password information disclosure
10809| [36811] Microsoft Outlook Express and Windows Mail NNTP response code execution
10810| [36472] Broderbund Expressit 3DGreetings Player ActiveX control buffer overflow
10811| [36321] BEA Weblogic Server and WebLogic Express headers denial of service
10812| [36319] BEA Weblogic Server and WebLogic Express unspecified denial of service
10813| [36307] Quiksoft EasyMail Objects ActiveX SubmitToExpress buffer overflow
10814| [35596] epesi framework upload feature file upload
10815| [35519] PHPIDS arithmetic expression and unclosed comment cross-site scripting
10816| [35499] Oracle Application Express CHECK_DB_PASSWORD SQL injection
10817| [35107] SAP Internet Communication Framework multiple cross-site scripting
10818| [34755] Microsoft Internet Explorer Outlook Express Address Book object denial of service
10819| [34639] Microsoft .NET Framework JIT Compiler service buffer overflow
10820| [34638] Microsoft .NET Framework NULL byte termination information disclosure
10821| [34637] Microsoft .NET Framework PE Loader service buffer overflow
10822| [34365] BEA Weblogic Server and WebLogic Express unspecified cross-site scripting
10823| [34291] BEA Weblogic Server and WebLogic Express LDAP brute force
10824| [34289] BEA WebLogic Server and WebLogic Express Administration Console insecure permissions
10825| [34288] BEA Weblogic Server and WebLogic Express configToScript information disclosure
10826| [34286] BEA WebLogic Server and WebLogic Express configuration information disclosure
10827| [34282] BEA WebLogic Server and WebLogic Express HttpProxyServlet and HttpClusterServlet unauthorized access
10828| [34278] BEA WebLogic Server and WebLogic Express SSL port denial of service
10829| [34275] phpTodo multiple .php scripts regular expressions security bypass
10830| [33800] Apple Mac OS X VideoConference framework buffer overflow
10831| [33013] Horde Application Framework login.php cross-site scripting
10832| [32005] Cadre PHP Web Framework class.Quick_Config_Browser.php file include
10833| [31895] PhP Generic Library and Framework membreManager.php file include
10834| [31837] Apple Mac OS X CFNetwork framework denial of service
10835| [31671] Yana Framework Guestbook unspecified security bypass
10836| [31603] BEA WebLogic Server and WebLogic Express proxy plug-in for Netscape Enterprise Server denial of service
10837| [31596] BEA WebLogic Server, WebLogic Express, WebLogic Platform, and BEA JRockit return address buffer overflow
10838| [31588] BEA WebLogic Server and WebLogic Express on Solaris 9 socket denial of service
10839| [31586] BEA WebLogic Server and WebLogic Express malformed header denial of service
10840| [31585] BEA WebLogic Server and WebLogic Express HTTP request information disclosure
10841| [31579] BEA WebLogic Server and WebLogic Express EJB security bypass
10842| [31578] BEA WebLogic Server and WebLogic Express EJB privilege escalation
10843| [31577] BEA WebLogic Server and WebLogic Express WSEE runtime security bypass
10844| [31576] BEA WebLogic Server and WebLogic Express jar update privilege escalation
10845| [31574] BEA WebLogic Server and WebLogic Express web.xml denial of service
10846| [31571] BEA WebLogic Server and WebLogic Express config.xml weak security
10847| [31569] BEA WebLogic Server and WebLogic Express .ear information disclosure
10848| [31563] BEA WebLogic Server and WebLogic Express WS-Security man-in-the-middle
10849| [31557] BEA WebLogic Server and WebLogic Express Apache proxy plug-in denial of service
10850| [31035] OpenSER parse_expression buffer overflow
10851| [30770] Publicera Php5 Framework InputFilter::getString() function cross-site scripting
10852| [30769] Publicera Php5 Framework database classes SQL injection
10853| [30632] Apple Mac OS X Security Framework X.509 public key denial of service
10854| [30630] Apple Mac OS X Security Framework Secure Transport weak security
10855| [30265] SiteXpress E-commerce System dept.asp SQL injection
10856| [30108] Oracle Application Express WWV_FLOW_ITEM_HELP cross-site scripting
10857| [30107] Oracle Application Express NOTIFICATION_MSG cross-site scripting
10858| [30106] Oracle Application Express WWV_FLOW_UTILITIES SQL injection
10859| [30071] Zend Framework Preview testRedirections.php cross-site scripting
10860| [29929] Sun iPlanet Messaging Server Messenger Express expression cross-site scripting
10861| [29928] Mirapoint Web Mail expression() cross-site scripting
10862| [29860] Microsoft .NET Framework request filtering insecure
10863| [29429] BlueShoes Framework GoogleSearch.php file include
10864| [29227] Microsoft Outlook Express Windows Address Book (WAB) buffer overflow
10865| [28955] Mozilla Firefox, Thunderbird, and SeaMonkey JavaScript expression buffer overflow
10866| [28878] AIM Express detected
10867| [28658] Microsoft ASP.NET Framework HTTP cross-site scripting
10868| [28411] Horde Application Framework and Horde IMP index.php cross-site scripting
10869| [28409] Horde Application Framework and Horde IMP search.php cross-site scripting
10870| [28185] Cisco CallManager Express SIP information disclosure
10871| [27738] McAfee ePolicy Orchestrator EPO Framework service directory traversal
10872| [27599] Microsoft Internet Explorer OutlookExpress.AddressBook ActiveX object denial of service
10873| [27590] Horde Application Framework HTTP GET request tunneling cross-site scripting
10874| [27589] Horde Application Framework dereferrer, help, and problem reporting functions cross-site scripting
10875| [27586] BEA WebLogic Server or BEA WebLogic Express is running
10876| [27168] Horde Application Framework test.php and problem.inc cross-site scripting
10877| [26908] BlueShoes Framework multiple scripts file include
10878| [26802] Microsoft ASP.NET Framework App_Code folder information disclosure
10879| [26225] FileProtection Express authentication bypass
10880| [26165] Cisco Unity Express (CUE) expired account privilege escalation
10881| [26056] Oracle Enterprise Manager Reporting Framework unauthorized access
10882| [25808] Multiple Mozilla products JavaScript regular expression memory corruption
10883| [25535] Microsoft Outlook Express Windows Address Book file buffer overflow
10884| [25516] Horde Application Framework help viewer command execution
10885| [25467] Calendar Express search.php cross-site scripting
10886| [25348] BEA WebLogic Server and Express XML parser denial of service
10887| [25239] Horde Application Framework services/go.php information disclosure
10888| [24302] BEA WebLogic Server and Express SSL identity exposure
10889| [24301] BEA WebLogic Server and Express connection filter denial of service
10890| [24296] ExpressionEngine core.input.php cross-site scripting
10891| [24295] BEA WebLogic Server and Express log file information disclosure
10892| [24294] BEA WebLogic Server and Express Java MBean unauthorized access
10893| [24290] BEA WebLogic Server and Express password information disclosure
10894| [24011] Apple AirPort Express and Extreme network interface denial of service
10895| [23309] KBase Express multiple scripts allow SQL injection
10896| [23205] Horde Application Framework MIME viewer cross-site scripting
10897| [23129] Microsoft Outlook Express news server information disclosure
10898| [23061] Horde Application Framework error message cross-site scripting
10899| [22941] Sun Java Communications Express configuration file information disclosure
10900| [22908] Rockliffe`s MailSite Express AttachPath obtain information
10901| [22907] Rockliffe`s MailSite Express attachment script execution
10902| [22906] Rockliffe`s MailSite Express cookie plaintext password
10903| [22770] MailSite Express allows attached file to be uploaded
10904| [22719] BEA WebLogic Server and Express invalid login brute force
10905| [22718] BEA WebLogic Server and Express servlet relative forwarding denial of service
10906| [22716] BEA WebLogic Server and Express HTTP request smuggling
10907| [22595] BEA WebLogic Server and Express MBean file audits may fail
10908| [22593] BEA WebLogic Server and Express multicast message information disclosure
10909| [22592] BEA WebLogic Server and Express weblogic.Deployer information disclosure
10910| [22591] BEA WebLogic Server and Express allows admin user to be locked out
10911| [22590] BEA WebLogic Server and Express IIOP protocol information disclosure
10912| [22588] BEA WebLogic Server and Express password disclosure
10913| [22586] BEA WebLogic Server and Express system properties disclosure
10914| [22584] BEA WebLogic Server and Express fullyDelegateAuthorization could allow access to servlet
10915| [22582] BEA WebLogic Server and Express Configuration Wizard information disclosure
10916| [22579] BEA WebLogic Server and Express security policy import
10917| [22577] BEA WebLogic Server and Express restriction of servlet allows access to files
10918| [22575] BEA WebLogic Server and Express internal servlet allows unauthorized access
10919| [22574] BEA WebLogic Server and Express privilege escalation
10920| [22573] BEA WebLogic Server and Express passphrase in plain text
10921| [22572] BEA WebLogic Server and Express IP address disclosure
10922| [22571] BEA WebLogic Server and Express audit events allow security bypass
10923| [22569] BEA WebLogic Server and Express Deployer allows elevated privileges
10924| [22568] BEA WebLogic Server and Express connection disclosure
10925| [22567] BEA WebLogic Server and Express SSL password disclosure
10926| [22563] BEA WebLogic Server and Express thread handling denial of service
10927| [22041] BEA WebLogic Server and Express LDAP anonymous bind information disclosure
10928| [21984] BEA WebLogic Server and Express View Error Log cross-site scripting
10929| [21744] Calendar Express allwords parameter cross-site scripting
10930| [21741] PHP Lite Calendar Express multiple scripts SQL injection
10931| [21351] IBM Tivoli Management Framework endpoint denial of service
10932| [20830] Microsoft Outlook Express NNTP Response Parsing buffer overflow
10933| [20802] BEA WebLogic Server and Express login page cross-site scripting
10934| [20793] BEA WebLogic Server and Express Web application allows unauthorized access
10935| [20769] BEA WebLogic Server and Express loop denial of service
10936| [20708] BEA WebLogic Server and Express error page cross-site scripting
10937| [20706] BEA WebLogic Server and Express incorrect cookie parsing
10938| [20704] BEA WebLogic Server and Express identity thread manipulation
10939| [20703] BEA WebLogic Server and Express JDBC pool modification
10940| [20693] Microsoft ASP.NET Framework SQL injection
10941| [20692] Microsoft ASP.NET Framework full path disclosure
10942| [20409] Microsoft ASP.NET Framework ViewState replay
10943| [20408] Microsoft ASP.NET Framework _VIEWSTATE denial of service
10944| [20390] Apple Mac OS X Foundation Framework buffer overflow
10945| [19539] BEA WebLogic Server and Express banner has been enabled
10946| [19373] Microsoft Internet Explorer and Outlook Express status bar spoofing
10947| [19321] BEA Web Logic Server and Express authentication disclosure
10948| [19190] PhxStudent15.ocx ActiveX control can be used to modify Outlook Express accounts
10949| [18865] Apple AirPort Extreme and Express WDS denial of service
10950| [17881] Horde Application Framework help window cross-site scripting
10951| [17737] Express-Web cross-site scripting
10952| [17644] Microsoft ASP.NET Framework bypass security
10953| [17360] BEA WebLogic Server and Express allow access to restricted URLs
10954| [17359] BEA WebLogic Server and Express RMI admin command execute
10955| [17358] BEA WebLogic Server and Express utilities and tasks plaintext password
10956| [17357] BEA WebLogic Server and Express password disclosure
10957| [17356] BEA WebLogic Server and Express HTTP version disclosure
10958| [17354] BEA WebLogic Server and Express errors result in incomplete security
10959| [17352] BEA WebLogic Server and Express Active Directory LDAP fails to remove admin privileges
10960| [17350] BEA WebLogic Server and Express JNDI unbinding objects to obtain information
10961| [17348] BEA WebLogic Server and Express administration port plaintext information
10962| [17278] Hitachi Cosminexus Portal Framework information disclosure
10963| [17098] Microsoft Outlook Express address information disclosure
10964| [16708] Microsoft Outlook Express code execution
10965| [16585] Microsoft Outlook Express malformed email header denial of service
10966| [16534] BEA WebLogic Server and Express bypass asterisk role
10967| [16421] BEA WebLogic Server and Express allows unexpected user identity
10968| [16419] BEA WebLogic Server and Express SSL denial of service
10969| [16168] Microsoft Outlook Express SMTP usernames and passwords disclosure
10970| [16123] BEA WebLogic Server and Express unauthorized access to Web applications
10971| [16121] BEA WebLogic Server and Express bypass server policy
10972| [16102] Microsoft Internet Explorer and Outlook Express A HREF URL spoofing
10973| [15928] BEA WebLogic Server and Express allows EJB object deletion
10974| [15927] BEA WebLogic Server and Express URL pattern syntax information disclosure
10975| [15865] BEA WebLogic Server and Express allows administrator or operator privileges
10976| [15862] BEA WebLogic Server and Express custom trust manager certificate spoofing
10977| [15861] BEA WebLogic Server and Express Authentication provider allows elevated privileges
10978| [15860] BEA WebLogic Server and Express config.xml files stores usernames and passwords in plain text
10979| [15841] Ipswitch IMail Express HTML message buffer overflow
10980| [15809] Microsoft Outlook Express MS04-013 patch is not installed
10981| [15705] Microsoft Outlook Express MHTML URL allows execution of code
10982| [15698] Microsoft Internet Explorer and Outlook Express URL FORM spoofing
10983| [14962] BEA WebLogic Server and Express users with Operator permissions information disclosure
10984| [14961] BEA WebLogic Server and Express config.xml file stores password in plain text
10985| [14959] BEA WebLogic Server and Express HTTP TRACE cross-site scripting
10986| [14957] BEA WebLogic Server and Express managed server password disclosure
10987| [14364] HelpExpress opens advertisements and obtains information
10988| [14142] SIP Express Router REGISTERs denial of service
10989| [13747] BEA WebLogic Server and Express using the T3S protocol allows network monitoring to obtain information
10990| [12947] Horde Application Framework could disclose session ID
10991| [12920] BEA WebLogic Server and Express, WebLogic Integration, and Liquid Data console application cross-site scripting
10992| [12799] BEA WebLogic Server and Express could allow an attacker to gain elevated privileges
10993| [12020] Sun Java Media Framework Java Virtual Machine could allow unauthorized privileges
10994| [11632] MyTaxexpress .ret file could allow an attacker to obtain sensitive information
10995| [10947] monopd messaging framework buffer overflow
10996| [10500] Microsoft Outlook Express fails to delete messages from dbx files
10997| [10454] IBM Web Traffic Express (WTE) HTTP header injection cross-site scripting
10998| [10453] IBM Web Traffic Express (WTE) HTML tag cross-site scripting
10999| [10452] IBM Web Traffic Express (WTE) /cgi-bin/helpout.exe denial of service
11000| [10338] Microsoft Outlook Express S/MIME certificate buffer overflow
11001| [10067] Microsoft Outlook Express "
11002| [10033] Microsoft Outlook Express S/MIME spoofed CA certificate man-in-the-middle attack
11003| [9724] Microsoft Outlook Express could allow the execution of XML files within the Temporary Internet File (TIF) directory
11004| [9643] Microsoft Outlook Express malformed MIME headers could allow file type, size, and icon spoofing
11005| [9556] IBM Tivoli Management Framework TMR ManagedNode buffer overflow
11006| [9555] IBM Tivoli Management Framework TMR Endpoint buffer overflow
11007| [9089] Microsoft Internet Explorer and Outlook Express BGSOUND tag could allow an attacker to obtain sensitive information
11008| [9088] Microsoft Internet Explorer and Outlook Express IFRAME tag could allow attacker to send data to a DOS device
11009| [9087] Microsoft Internet Explorer and Outlook Express BGSOUND DOS device reference could cause a denial of service
11010| [8969] Microsoft Internet Explorer and Outlook Express malformed XBM file denial of service
11011| [8926] Microsoft Outlook Express POP3 message containing two "
11012| [8808] Microsoft Outlook Express allows attacker to create false attachment by changing icon
11013| [8296] Cisco IOS using Cisco Express Forwarding could allow an attacker to obtain sensitive information
11014| [8198] Microsoft Outlook Express <
11015| [8079] eShare Expressions "
11016| [7670] Microsoft Outlook Express allows blocked attachments to be opened when the message is forwarded
11017| [7648] Microsoft Outlook Express for Macintosh long message line buffer overflow
11018| [7118] Microsoft Outlook Express "
11019| [7052] Microsoft Outlook Express 6 file attachment security feature bypass
11020| [6655] Microsoft Outlook and Outlook Express Address Book allows attacker to spoof emails
11021| [5588] BEA WebLogic Server and Express could allow users to bypass authentication
11022| [5490] Intel Express Switch 500 series malformed ICMP packet denial of service
11023| [5175] Microsoft Outlook and Outlook Express vCards buffer overflow
11024| [5154] Intel Express Switch 550F malformed IP header denial of service
11025| [5013] Microsoft Outlook and Outlook Express cache bypass
11026| [4818] Intel Express 8100 ISDN Router remote denial of service
11027| [4446] Microsoft Outlook Express filename overflow could allow attacker to execute files
11028| [3955] Disney`s Go Express search program could expose the user`s privacy
11029| [2685] Microsoft Outlook Express long file name patch not applied
11030| [1740] ColdFusion Expression Evaluator allows remote file manipulation
11031| [1627] Squid regular expression ACLs can be bypassed
11032|
11033| Exploit-DB - https://www.exploit-db.com:
11034| [30983] ExpressionEngine 1.2.1 HTTP Response Splitting and Cross Site Scripting Vulnerabilities
11035| [30893] PHP Security Framework Multiple Input Validation Vulnerabilities
11036| [30877] Roundcube Webmail 0.1 CSS Expression Input Validation Vulnerability
11037| [30707] Phpbasic basicFramework 1.0 Includes.PHP Remote File Include Vulnerability
11038| [30281] Microsoft .Net Framework <= 2.0 - Multiple Null Byte Injection Vulnerabilities
11039| [30191] Apache MyFaces Tomahawk JSF Framework 1.1.5 Autoscroll Parameter Cross Site Scripting Vulnerability
11040| [29921] Zend-Framework - Full Info Disclosure
11041| [29746] Horde Framework and IMP 2.x/3.x Cleanup Cron Script Arbitrary File Deletion Vulnerability
11042| [29745] Horde Framework <= 3.1.3 Login.PHP Cross-Site Scripting Vulnerability
11043| [29606] Calendar Express Search.PHP Cross-Site Scripting Vulnerability
11044| [29010] SiteXpress E-Commerce System Dept.ASP SQL Injection Vulnerability
11045| [29007] Apple Safari 2.0.4 JavaScript Regular Expression Match Remote Denial of Service Vulnerability
11046| [28891] Mirapoint Web Mail Expression() HTML Injection Vulnerability
11047| [28890] iPlanet Messaging Server Messenger Express Expression() HTML Injection Vulnerability
11048| [28887] Sun Java System 6.x Messenger Express Cross-Site Scripting Vulnerability
11049| [28781] BlueShoes Framework 4.6 GoogleSearch.PHP Remote File Include Vulnerability
11050| [28144] Microsoft Internet Explorer 6.0 OutlookExpress.AddressBook Denial of Service Vulnerability
11051| [28008] Adaptive Website Framework 1.11 Remote File Include Vulnerability
11052| [27990] Calendar Express 2.2 Month.PHP SQL Injection Vulnerability
11053| [27745] Outlook Express 5.5/6.0,Windows Mail MHTML URI Handler Information Disclosure Vulnerability
11054| [27476] Microsoft .NET Framework SDK 1.0/1.1 MSIL Tools Buffer Overflow Vulnerabilities
11055| [27127] PMachine ExpressionEngine 1.4.1 HTTP Referrer HTML Injection Vulnerability
11056| [26806] BMC Service Desk Express 10.2.1.95 - Multiple Vulnerabilities
11057| [26654] KBase Express 1.0 - Multiple SQL Injection Vulnerabilities
11058| [26115] Calendar Express 2.2 Search.PHP Cross-Site Scripting Vulnerability
11059| [26114] PHP Lite Calendar Express 2.2 subscribe.php cid Parameter SQL Injection
11060| [26113] PHP Lite Calendar Express 2.2 auth.php cid Parameter SQL Injection
11061| [26112] PHP Lite Calendar Express 2.2 login.php cid Parameter SQL Injection
11062| [25784] Microsoft Outlook Express 4.x/5.x/6.0 Attachment Processing File Extension Obfuscation Vulnerability
11063| [25546] BEA WebLogic Server 8.1 And WebLogic Express Administration Console Cross-Site Scripting Vulnerability
11064| [24687] Microsoft Outlook Express 4.x/5.x/6.0 Plaintext Email Security Policy Bypass Vulnerability
11065| [24449] Cisco Unity Express Multiple Vulnerabilities
11066| [24436] Kohana Framework 2.3.3 - Directory Traversal Vulnerability
11067| [24158] Oracle Application Framework Diagnostic Mode Bypass Vulnerability
11068| [24118] Microsoft Outlook Express 6.0 URI Obfuscation Vulnerability
11069| [24002] Microsoft Outlook Express 6.0 - Remote Denial of Service Vulnerability
11070| [23401] Microsoft Outlook Express 6.0 MHTML Forced File Execution Vulnerability (2)
11071| [23400] Microsoft Outlook Express 6.0 MHTML Forced File Execution Vulnerability (1)
11072| [22959] Microsoft Outlook Express 5/6 Script Execution Weakness
11073| [22937] PRADO PHP Framework 3.2.0 Arbitrary File Read Vulnerability
11074| [22877] Yii Framework 1.1.8 Search SQL Injection Vulnerability
11075| [22287] Netscape 7.0 JavaScript Regular Expression Denial of Service Vulnerability
11076| [22280] Microsoft Outlook2000/Express 6.0 Arbitrary Program Execution Vulnerability
11077| [21932] Microsoft Outlook Express 5.5/6.0 S/MIME Buffer Overflow Vulnerability
11078| [21891] vOlk Botnet Framework 4.0 - Multiple Vulnerabilities
11079| [21789] Alleged Outlook Express 5/6 Link Denial of Service Vulnerability
11080| [21711] Microsoft Outlook Express 5/6 MHTML URL Handler File Rendering Vulnerability
11081| [21662] Microsoft Outlook Express 6 XML File Attachment Script Execution Vulnerability
11082| [21631] Microsoft Outlook Express 5/6 Spoofable File Extensions Vulnerability
11083| [21432] BEA Systems WebLogic Server and Express 7.0 Null Character DoS
11084| [21419] Microsoft Outlook Express 5.5 DoS Device Denial of Service Vulnerability
11085| [21096] Outlook Express 6 Attachment Security Bypass Vulnerability
11086| [20870] Express Burn Plus 4.58 - EBP Project File Handling Buffer Overflow PoC
11087| [20571] Microsoft Outlook 2000 0/98 0/Express 5.5 Concealed Attachment Vulnerability
11088| [20079] Microsoft Outlook 97/98/2000, Outlook Express 4.0/5.0 GMT Field Buffer Overflow (2)
11089| [20078] Microsoft Outlook 97/98/2000, Outlook Express 4.0/5.0 GMT Field Buffer Overflow (1)
11090| [20027] BEA Systems WebLogic Express 3.1.8/4/5 Source Code Disclosure
11091| [19951] QuickCommerce 2.5/3.0,Cart32 2.5 a/3.0,Shop Express 1.0,StoreCreator 3.0 Web Shopping Cart Hidden Form Field Vulnerability
11092| [19943] Intel Corporation Express 8100 ISDN Router Fragmented ICMP Vulnerability
11093| [19738] MS Outlook Express 5 Javascript Email Access Vulnerability
11094| [19603] MS IE 4.x/5.0,Outlook 2000 0/98 0/Express 4.x ActiveX CAB File Execution
11095| [19575] .Net Framework Tilde Character DoS
11096| [19408] Zend Framework Local File Disclosure
11097| [19207] Microsoft Outlook Express 4.27.3110/4.72.3120 POP Denial of Service Vulnerability
11098| [18871] Travelon Express CMS 6.2.2 - Multiple Vulnerabilities
11099| [18777] .NET Framework EncoderParameter Integer Overflow Vulnerability
11100| [18727] IBM Tivoli Provisioning Manager Express for Software Distribution Isig.isigCtl.1 ActiveX RunAndUploadFile() Method Overflow
11101| [17995] NoNumber Framework Joomla! Plugin Multiple Vulnerabilities
11102| [16764] IBM Tivoli Storage Manager Express CAD Service Buffer Overflow
11103| [16428] IBM Tivoli Storage Manager Express RCA Service Buffer Overflow
11104| [16421] IBM Tivoli Storage Manager Express CAD Service Buffer Overflow
11105| [16379] Microsoft Outlook Express NNTP Response Parsing Buffer Overflow
11106| [16116] Qcodo Development Framework 0.3.3 Full Info Disclosure
11107| [16006] SmoothWall Express 3.0 - Multiple Vulnerabilities
11108| [15959] Macro Express Pro 4.2.2.1 MXE File Syntactic Analysis Buffer Overflow PoC
11109| [15840] ardeaCore 2.25 - PHP Framework Remote File Inclusion
11110| [15544] Web Wiz NewsPad Express Edition 1.03 Database File Disclosure Vulnerability
11111| [14911] Gantry Framework 3.0.10 (Joomla) Blind SQL Injection Exploit
11112| [14602] Play! Framework <= 1.0.3.1 Directory Transversal Vulnerability
11113| [13918] Spring Framework arbitrary code execution
11114| [12564] Microsoft Windows Outlook Express and Windows Mail Integer Overflow
11115| [11784] PostNuke FormExpress Module Blind SQL Injection
11116| [11723] Trouble Ticket Express <= 3.01 Remote Code Execution/Directory Traversal
11117| [10902] Nero Express 7.9.6.4 - Local Heap PoC
11118| [10758] Calendar Express 2.0 - SQL Injection Vulnerability
11119| [9627] Enlightenment - Linux Null PTR Dereference Exploit Framework
11120| [9527] Simple CMS FrameWork <= 1.0 (page) Remote SQL Injection Vuln
11121| [8333] Sun Calendar Express Web Server - (DoS/XSS) Multiple Remote Vulns
11122| [7368] Product Sale Framework 0.1b (forum_topic_id) SQL Injection Vulnerability
11123| [6700] DFF PHP Framework API (Data Feed File) RFI Vulnerabilities
11124| [5945] Seagull PHP Framework <= 0.6.4 (fckeditor) Arbitrary File Upload Exploit
11125| [5643] Ajax framework (lang) Local File Inclusion Vulnerability
11126| [5343] Mcafee EPO 4.0 FrameworkService.exe Remote Denial of Service Exploit
11127| [4573] IBM Tivoli Storage Manager 5.3 Express CAD Service BoF Exploit
11128| [3237] Cadre PHP Framework Remote File Include Vulnerability
11129| [3217] PhP Generic library & framework (include_path) RFI Vulnerability
11130| [1870] BlueShoes Framework <= 4.6 - Remote File Include Vulnerabilities
11131| [1066] MS Outlook Express NNTP Buffer Overflow Exploit (MS05-030)
11132| [315] MS Outlook Express Javascript Execution Vulnerability
11133| [313] MS Outlook Express Window Opener Vulnerability
11134|
11135| OpenVAS (Nessus) - http://www.openvas.org:
11136| [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
11137| [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
11138| [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
11139| [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
11140| [902832] MS Security Update For Microsoft Office, .NET Framework, and Silverlight (2681578)
11141| [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
11142| [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
11143| [902806] Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2638420)
11144| [902672] Joomla! JA T3 Framework Component Directory Traversal Vulnerability
11145| [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
11146| [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
11147| [902551] Microsoft .NET Framework Information Disclosure Vulnerability (2567951)
11148| [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
11149| [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
11150| [902518] Microsoft .NET Framework Security Bypass Vulnerability
11151| [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
11152| [902294] Metasploit Framework Local Privilege Escalation Vulnerability
11153| [902293] Metasploit Framework Version Detection (Windows)
11154| [902193] Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343)
11155| [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
11156| [900031] Security Update for Outlook Express (951066)
11157| [864539] Fedora Update for php-ZendFramework FEDORA-2012-9979
11158| [864533] Fedora Update for php-ZendFramework FEDORA-2012-9978
11159| [863119] Fedora Update for php-ZendFramework FEDORA-2011-7388
11160| [863118] Fedora Update for php-ZendFramework FEDORA-2011-7409
11161| [862903] Fedora Update for php-ZendFramework FEDORA-2011-2678
11162| [862890] Fedora Update for php-ZendFramework FEDORA-2011-2689
11163| [861950] Fedora Update for php-ZendFramework FEDORA-2010-8495
11164| [861941] Fedora Update for php-ZendFramework FEDORA-2010-8498
11165| [861735] Fedora Update for php-ZendFramework FEDORA-2010-0601
11166| [861712] Fedora Update for php-ZendFramework FEDORA-2010-0652
11167| [855581] Solaris Update for USB and Audio Framework 109896-37
11168| [855502] Solaris Update for Solaris Crypto Framework 118919-21
11169| [855395] Solaris Update for USB Drivers and Framework 115553-29
11170| [855234] Solaris Update for Solaris Crypto Framework 118918-24
11171| [855200] Solaris Update for USB and Audio Framework 109897-20
11172| [855006] Solaris Update for USB Drivers and Framework 115554-25
11173| [831061] Mandriva Update for kolab-horde-framework MDVSA-2010:108 (kolab-horde-framework)
11174| [803116] PRADO PHP Framework 'sr' Parameter Multiple Directory Traversal Vulnerabilities
11175| [801716] Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability (929123)
11176| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
11177| [800967] Perl UTF-8 Regular Expression Processing DoS Vulnerability (Windows)
11178| [800263] ExpressionEngine CMS Cross Site Scripting Vulnerability
11179| [800262] ExpressionEngine CMS Version Detection
11180| [800083] Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
11181| [103251] Zikula Application Framework 'themename' Parameter Cross Site Scripting Vulnerability
11182| [100787] Horde Application Framework 'icon_browser.php' Cross-Site Scripting Vulnerability
11183| [100757] Play! Framework Directory Traversal Vulnerability
11184| [100562] ViewVC Regular Expression Search Cross Site Scripting Vulnerability
11185| [72503] FreeBSD Ports: ZendFramework
11186| [71484] Debian Security Advisory DSA 2505-1 (zendframework)
11187| [69768] FreeBSD Ports: ZendFramework
11188| [67296] FreeBSD Ports: ZendFramework
11189| [66821] FreeBSD Ports: ZendFramework
11190| [64235] Fedora Core 10 FEDORA-2009-2823 (php-ZendFramework)
11191| [63430] FreeBSD Ports: ZendFramework
11192| [58523] Debian Security Advisory DSA 1352-1 (pdfkit.framework)
11193| [56284] Debian Security Advisory DSA 979-1 (pdfkit.framework)
11194| [56282] Debian Security Advisory DSA 972-1 (pdfkit.framework)
11195| [56220] Debian Security Advisory DSA 961-1 (pdfkit.framework)
11196| [19749] Calendar Express Multiple Flaws
11197| [11965] SIP Express Router Register Buffer Overflow
11198| [11964] SIP Express Router Missing To in ACK DoS
11199|
11200| SecurityTracker - https://www.securitytracker.com:
11201| [1028864] Apache Struts Wildcard Matching and Expression Evaluation Bugs Let Remote Users Execute Arbitrary Code
11202| [1028851] Cisco Wide Area Application Services Web Service Framework Bug Lets Remote Users Execute Arbitrary Code
11203| [1028537] Cisco Unified Presence Web Framework Bug Lets Remote Users Deny Service
11204| [1028075] Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks
11205| [1028074] Cisco Unity Express Input Validation Hole Permits Cross-Site Scripting Attacks
11206| [1027553] Zend Framework Input Validation Flaws Permit Cross-Site Scripting Attacks
11207| [1027270] Oracle Application Express Listener Discloses Data to Remote Users
11208| [1027208] Zend Framework XML Entity Processing Flaw Lets Remote Users View Files
11209| [1027036] Microsoft .NET Framework Serialization Bugs Let Remote Users Execute Arbitrary Code
11210| [1027009] Cisco Unified Contact Center Express Unspecified Flaw Lets Remote Users Deny Service
11211| [1026796] HP Data Protector Express Bugs Let Remote Users Deny Service and Execute Arbitrary Code
11212| [1026791] Microsoft Expression Design DLL Loading Error Lets Remote Users Execute Arbitrary Code
11213| [1026393] ISC DHCP Regular Expressions Bug Lets Remote Users Deny Service
11214| [1025581] IBM Tivoli Management Framework Buffer Overflow in 'lcfd.exe' Lets Remote Authenticated Users Execute Arbitrary Code
11215| [1024777] Horde Application Framework Input Validation Flaw in Displaying vCard Attachments Permits Cross-Site Scripting Attacks
11216| [1024543] Microsoft .NET Framework JIT Compiler Memory Access Error Lets Remote Users Execute Arbitrary Code
11217| [1024410] HP Data Protector Express Bugs Let Local Users Deny Service or Execute Arbitrary Code
11218| [1024409] HP Data Protector Express Bugs Let Local Users Deny Service or Execute Arbitrary Code
11219| [1024399] Horde Application Framework Input Validation Flaw in 'icon_browser.php' Permits Cross-Site Scripting Attacks
11220| [1024305] Microsoft .NET Framework Virtual Method Delegate Processing Error Lets Remote Users Execute Arbitrary Code
11221| [1024253] JBoss Seam Input Validation Flaw in Processing JBoss Expression Language Expressions Lets Remote Users Execute Arbitrary Code
11222| [1024082] Cisco Unified Contact Center Express Directory Traversal Flaw Lets Remote Users View Arbitrary Files on the Target System
11223| [1024081] Cisco Unified Contact Center Express CTI Server Bug Lets Remote Users Deny Service
11224| [1023972] Microsoft Outlook Express Integer Overflow in Processing POP3/IMAP Responses Lets Remote Users Execute Arbitrary Code
11225| [1023879] Sun Java System Communications Express Address Book Access Control Flaw Lets Remote Users View Files on the Target System
11226| [1023636] IBM Cognos Express Default Management Account Lets Remote User Access the System
11227| [1023365] Horde Application Framework Input Validation Flaw in Administrator Scripts Permits Cross-Site Scripting Attacks
11228| [1022989] Symantec SecurityExpressions Audit and Compliance Server Input Validation Hole Permits Cross-Site Scripting Attacks
11229| [1022973] Solaris Bug in Solaris IP(7P) Module and STREAMS Framework Lets Local Users Deny Service
11230| [1022932] Cisco Unified Communications Manager Express Buffer Overflow Lets Remote Users Execute Arbitrary Code
11231| [1022921] Horde Application Framework 'Horde_Form_Type_image' Bug May Let Remote Users Overwrite Files
11232| [1022633] Network Security Services Library Heap Overflow in Regular Expression Parser Lets Remote Users Execute Arbitrary Code
11233| [1022569] Cisco Unified Contact Center Express Express Administration Pages Permit Script Injection and Directory Traversal Attacks
11234| [1022266] Sun Java System Communications Express Input Validation Flaw in 'search.xml' and 'UWCMain' Permits Cross-Site Scripting Attacks
11235| [1022220] HP Data Protector Express Lets Local Users Gain Elevated Privileges and Deny Service
11236| [1021837] IBM Tivoli Storage Manager Express Heap Overflow in 'adsmdll.dll' Lets Remote Users Execute Arbitrary Code
11237| [1021786] MySQL Bug in ExtractValue()/UpdateXML() in Processing XPath Expressions Lets Remote Authenticated Users Deny Service
11238| [1021724] Mac OS X FSEvents Framework Bug Discloses Filesystem Activity to Local Users
11239| [1020772] Red Hat Directory Server Administration Express and Directory Server Gateway Input Validation Hole Permits Cross-Site Scripting Attacks
11240| [1020679] Microsoft Outlook Express MTHML Redirect Bug Lets Remote Users Obtain Information
11241| [1020566] Horde Application Framework Input Validation Hole in Contact Names Permits Cross-Site Scripting Attacks
11242| [1019870] Safari WebKit Bug in Processing JavaScript Regular Expressions Lets Remote Users Execute Arbitrary Code
11243| [1019768] Cisco Unified Communications Disaster Recovery Framework Lets Remote Users Execute Arbitrary Commadns
11244| [1019439] WebLogic Server and WebLogic Express Session Security Bug Lets Remote Authenticated Users Gain Elevated Privileges
11245| [1019269] ICU Regular Expression Processing Bug May Let Users Execute Arbitrary Code
11246| [1019182] IBM Tivoli Storage Manager Express Server Heap Overflow Lets Remote Users Execute Arbitrary Code
11247| [1019045] IBM Tivoli Provisioning Manager Express Input Validation Hole Permits Cross-Site Scripting Attacks
11248| [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
11249| [1018233] Outlook Express MHTML Protocol Handler Content-Disposition Bug Lets Remote Users Obtain Information
11250| [1018231] Outlook Express MHTML Protocol Handler Redirect Bug Lets Remote Users Obtain Information
11251| [1017933] IBM Tivoli Monitoring Express Heap Overflow in Universal Agent Lets Remote Users Execute Arbitrary Code
11252| [1017785] Horde Application Framework Cleanup Script Lets Local Users Delete Files
11253| [1017775] Horde Application Framework Input Validation Flaw in 'NLS.php' Permits Cross-Site Scripting Attacks
11254| [1017369] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Book Files Let Remote Users Execute Arbitrary Code
11255| [1017298] Mac OS X Security Framework May Use Weaker or No Encryption, Fail to Check CRLs, and Let Remote Users Deny Service
11256| [1016713] Horde Application Framework Input Validation Holes in 'index.php' and IMP's 'search.php' Permit Cross-Site Scripting Attacks
11257| [1016654] Microsoft Outlook Express MHTML Parsing Error Lets Remote Users Execute Arbitrary Code
11258| [1016627] Cisco CallManager Express Lets Remote Users Determine SIP User Names
11259| [1016442] Horde Application Framework Input Validation Hole Permits Cross-Site Scripting Attacks
11260| [1016310] Horde Application Framework Multiple Input Validation Holes Permit Cross-Site Scripting Attacks
11261| [1016259] Docebo Include File Flaw in GLOBALS['where_framework'] and GLOBALS['where_cms'] Parameters Let Remote Users Execute Arbitrary Code
11262| [1016015] Cisco Unity Express Lets Remote Authenticated Users Gain Administrative Privileges
11263| [1016005] Microsoft Outlook Express 'mhtml:' Redirect URL Processing Lets Remote Users Bypass Security Domains
11264| [1015898] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Books Lets Remote Users Execute Arbitrary Code
11265| [1015841] Horde Application Framework Bug Lets Remote Users Execute Arbitrary Code
11266| [1015509] F-Secure Personal Express Overflow in Processing ZIP Archives Lets Remote Users Execute Arbitrary Code
11267| [1015135] Sun Java System Communications Express Discloses Configuration File to Remote Users
11268| [1015117] RockLiffe MailSite Express WebMail Discloses WebMail Files to Remote Users and Permits Cross-Site Scripting Attacks
11269| [1015063] MailSite Express Lets Remote Users Upload Scripting Files and Execute Them
11270| [1014424] Tivoli Management Framework Endpoint Service (lcfd) Lets Remote Users Deny Service
11271| [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
11272| [1014045] Cisco Unity Express Can Be Crashed With Specially Crafted Compressed DNS Data
11273| [1013763] LogWatch Regular Expression Error May Let Users Deny Service to Avoid Detection
11274| [1013594] Horde Application Framework Input Validation in Page Title Lets Remote Users Conduct Cross-Site Scripting Attacks
11275| [1013140] F-Secure Personal Express Buffer Overflow in Processing ARJ Archives Lets Remote Users Execute Arbitrary Code
11276| [1011959] Horde Application Framework Input Validation Bug in Help Window Lets Remote Users Conduct Cross-Site Scripting
11277| [1011550] Express-Web Input Validation Error Lets Remote Users Conduct Cross-Site Scripting Attacks
11278| [1011171] Cosminexus Portal Framework May Disclose Cached Content to the Wrong User
11279| [1011067] Microsoft Outlook Express May Disclose 'bcc:' Recipient Addresses
11280| [1010166] Microsoft Outlook Express Mail Troubleshooting Function May Disclose SMTP Password to Local Users
11281| [1009743] Microsoft Outlook Express Can Be Crashed By Remote Users With Specially Crafted EML File
11282| [1009603] Microsoft Outlook Express Does Not Correctly Display Links With Embedded FORM Data
11283| [1009014] Vim Folding Expression Modeline Lets Remote Users Execute Arbitrary Shell Commands on the Target User's System
11284| [1008866] WebLogic Server and Express Input Validation Flaw in Processing HTTP TRACE Requests Permits Cross-Site Scripting
11285| [1008813] Cisco IP Call Center Express Default Configuration on IBM Servers Grants Administrative Access to Remote Users
11286| [1008682] BEA WebLogic Server and Express Ant Tasks May Disclose the Administrator Password
11287| [1007306] Microsoft Outlook Express Again Executes Scripting Code in Plain Text E-mail Messages
11288| [1007131] BEA WebLogic Server and Express May Disclose 'Admin' Password to 'Operator' Users
11289| [1007130] Rockliffe MailSite Express Discloses Attachments to Remote Users
11290| [1006809] Microsoft Outlook Express Lets Remote Users Silently Install Arbitrary Code Using Audio and Media Files
11291| [1006808] Microsoft Outlook Express May Be Affected by W32/Palyh@MM Mass-Mailing Worm
11292| [1006777] Java Media Framework Bug May Let Remote Applets Crash the Java Virtual Machine or Gain Unauthorized Privileges
11293| [1006771] Microsoft Outlook Express Integer Overflow Lets Remote IMAP Servers Cause the Client to Crash
11294| [1006748] Microsoft Outlook Express May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
11295| [1006310] BEA WebLogic Server and Express Access Control Bug Lets Remote Authenticated Users Delete Empty Sub-Contexts
11296| [1006306] WebLogic Server and Express Authentication Flaw May Let Remote Users Access Administrative Functions
11297| [1006148] Microsoft Outlook Express Security Domain Flaw Lets Remote Users Silently Install and Execute Arbitrary Code
11298| [1006141] iptel.org SIP Express Router SIP Protocol Bugs Let Remote Users Deny Service
11299| [1006017] BEA WebLogic Server and Express Access Control Error May Disclose Passwords to Local Users
11300| [1005511] Prometheus Web Application Framework Include Path Bug Lets Remote Users Execute Arbitrary PHP Commands
11301| [1005489] Microsoft Outlook Express May Fail to Delete E-mail Messages from Local Storage
11302| [1005472] IBM Web Traffic Express Caching Proxy Server Allows Cross-Site Scripting Attacks
11303| [1005471] IBM Web Traffic Express Caching Proxy Server Can Be Crashed By Remote Users
11304| [1005405] Microsoft Outlook Express Buffer Overflow in Parsing S/MIME Messages Lets Remote Users Execute Arbitrary Code
11305| [1005310] BEA Systems WebLogic Server and Express May Return a Response to the Wrong Remote User
11306| [1005207] Microsoft Outlook Express Can Be Crashed By Remote Users Sending HTML Mail With Long Links Embedded
11307| [1004862] Microsoft Outlook Express Flaw in Parsing XML Using Internet Explorer Allows a Remote User to Silently Deliver and Install an Executable on a Target User's Computer
11308| [1004805] Microsoft Outlook Express (and Possibly Outlook) Has File Attachment Name Bugs That Let Remote Users Send Malicious Mail to Bypass Attachment Type Filters and Modify the Apparent File Name and File Size
11309| [1004778] IBM's Tivoli Management Framework Endpoint and ManagedNode Component Buffer Overflows Let Remote Users Crash the Service and Execute Arbitrary Code with High Privileges
11310| [1004278] BEA Systems WebLogic Server and Express May Disclose an Administrative Password to Local Users
11311| [1004051] Microsoft Outlook Express for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
11312| [1003677] Cisco IOS-based Devices That Use Cisco Express Forwarding (CEF) May Leak Data from One Packet into Another Packet in Certain Situations
11313| [1003463] eshare Expressions Web Site Software Discloses Files on the Hard Drive to Remote Users
11314| [1003434] Microsoft ASP.NET Web Application Framework Allows Cross Site Scritping Attacks and Discloses Path Information to Remote Users
11315| [1002890] Outlook Express for Macintosh May Crash While Downloading POP3 Mail Containing a Long Line
11316| [1002808] Outlook Express Secure Password Authentication Method is Vulnerable to Man-in-the-Middle Attacks
11317| [1002413] Microsoft Outlook Express Will Execute Active Scripting in Plain Text E-mail Messages, Circumventing Some Scripting Controls
11318| [1002348] Outlook Express Lets Remote Users Send Malicious Attachments That Will Bypass Security Features
11319| [1001687] Microsoft Outlook Express May Allow A Remote User to Obtain E-mail Destined for a Different User
11320| [1001380] Microsoft Internet Explorer and Outlook Express May Execute Arbitrary Code Without User Authorization or Intervention
11321| [1001209] Microsoft Telnet Can Be Crashed Locally, Causing Other Applications Including Outlook Express To Crash
11322| [1001147] Microsoft Outlook Express Crashes When Reading Certain E-mail Messages
11323| [1001134] IBM's Consumer Transaction Framework Can Be Crashed By Remote Users
11324|
11325| OSVDB - http://www.osvdb.org:
11326| [75264] Spring Framework Expression Language (EL) MVC Tag Parsing Information Disclosure
11327| [96003] Atlassian Confluence OGNL Expression Handling Double Evaluation Error Remote Code Execution
11328| [95878] Cisco Multiple Content Network / Video Delivery Products Web Framework Command Line Interface Remote Command Execution
11329| [95877] Cisco Wide Area Application Services (WAAS) Web Service Framework Crafted Request Handling Remote Code Execution
11330| [95827] 389 Directory Server Search Filter Expression Evaluation Crafted Query Handling Information Disclosure
11331| [95522] Apache OFBiz Nested Expression Evaluation Arbitrary UEL Function Execution
11332| [95303] Oracle Solaris Kernel/STREAMS framework Subcomponent Unspecified Remote DoS
11333| [95290] Oracle Agile PLM Framework Security Subcomponent Unspecified Remote Information Disclosure
11334| [95288] Oracle Agile Collaboration Framework Manufacturing/Mfg Parts Subcomponent Unspecified Remote Issue
11335| [95287] Oracle Agile PLM Framework Web Client (CS) Subcomponent Unspecified Remote Issue
11336| [95279] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component User Interface Framework Subcomponent Unspecified Remote Issue
11337| [95277] Oracle Hyperion BI+ Intelligence Service Subcomponent raframework/ihtml/GetResource ResourceName Parameter Traversal Arbitrary File Access
11338| [95185] BMC Service Desk Express /SDE/QV_admin.aspx SelTab Parameter XSS
11339| [95184] BMC Service Desk Express /SDE/QV_grid.aspx CallBack Parameter XSS
11340| [95183] BMC Service Desk Express /SDE/commonhelp.aspx Helppage Parameter XSS
11341| [95182] BMC Service Desk Express /SDE/DashBoardGUI.aspx Multiple Parameter SQL Injection
11342| [95181] BMC Service Desk Express /SDE/login.aspx UID Parameter SQL Injection
11343| [94959] Microsoft .NET Framework / Silverlight Multidimensional Arrays Small Structure Handling Arbitrary Code Execution
11344| [94957] Microsoft .NET Framework Delegate Object Serialization Permission Validation Privilege Escalation
11345| [94956] Microsoft .NET Framework Small Structure Array Allocation Remote Code Execution
11346| [94955] Microsoft .NET Framework Anonymous Method Injection Reflection Objection Permission Validation Privilege Escalation
11347| [94954] Microsoft .NET Framework Delegate Reflection Bypass Reflection Objection Permission Validation Privilege Escalation
11348| [94656] JS-YAML Module for Node.js !!js/function Tag Handling Arbitrary Code Execution
11349| [94625] Apache Santuario (XML Security for C++) XML Signature Reference Crafted XPointer Expression Handling Heap Buffer Overflow
11350| [94609] Cisco Multiple Product Web Framework GUI HTTP / HTTPS Request Handling Remote DoS
11351| [94605] Cisco Multiple Product Web Framework Crafted URL Handling Remote Command Execution
11352| [94604] Cisco Multiple Product Web Framework IronPort Spam Quarantine (ISQ) Function TCP Connection Request Saturation Remote DoS
11353| [94603] Cisco Web Security Appliance Web Framework Crafted URL Handling Remote Command Execution
11354| [93969] Apache Struts OGNL Expression Handling Double Evaluation Error Remote Command Execution
11355| [93876] Novell ZENworks Configuration Management zcc-framework.jar fwdToURL Parameter Arbitrary Site Redirect
11356| [93763] Horde Application Framework Smartphone Portal XSS
11357| [93542] Apache ManifoldCF (Connectors Framework) org.apache.manifoldcf.crawler.ExportConfiguration Class Configuration Export Password Disclosure
11358| [93302] Microsoft .NET Framework WCF Endpoint Authentication Unspecified Policy Requirement Weakness Authentication Bypass
11359| [93301] Microsoft .NET Framework XML File Signature Validation Spoofing Weakness
11360| [93185] Cisco Unified Presence (CUP) Web Framework Malformed TCP Packet Handling Memory Exhaustion Remote DoS
11361| [92632] Cisco Unified Contact Center Express (CCX) Editor Script Repository Disclosure
11362| [92419] Oracle Application Express Unspecified Remote Issue
11363| [92418] Oracle Siebel CRM Siebel UI Framework Component Open UI Client Subcomponent Unspecified Remote Issue
11364| [92415] Oracle Siebel CRM Siebel UI Framework Component Open UI Client Subcomponent Unspecified Remote Information Disclosure
11365| [92411] Oracle Siebel CRM Siebel UI Framework Component Portal Framework Subcomponent Unspecified Remote Information Disclosure
11366| [92229] Hero Framework /users/forgot_password error Parameter XSS
11367| [91712] ISC BIND Crafted Regular Expression Handling Memory Exhaustion Remote DoS
11368| [91616] Hero Framework /users/login username Parameter XSS
11369| [91614] Zend Framework Zend\View\Helper\ServerUrl Helper URL Generation Weakness
11370| [91613] Zend Framework Multiple Class HTTP Header Proxy Information Handling Spoofing Weakness
11371| [91612] Zend Framework Zend\Session\Validator\RemoteAddr Proxy URL Detection Weakness
11372| [91608] Libxslt xsltCompileLocationPathPattern Invalid XPath Expression Processing Double-free DoS Weakness
11373| [91480] Zend Framework Zend\Mvc RouteMatch Captured Routing Parameter Manipulation
11374| [91479] Zend Framework Zend\Validate\Csrf mt_rand() Predictable CSRF Token Generation
11375| [91478] Zend Framework Zend\Db\Adapter\Platform Multiple Method Unspecified SQL Injection
11376| [91020] Intel SOA Expressway XSLT Processor Malformed XML Handling DoS
11377| [90836] IBM WebSphere Commerce Web Services Framework Unspecified Remote DoS
11378| [90412] Fluid Extbase Development Framework (fed) Extension for TYPO3 Unserialize() Function Unspecified Remote Command Execution
11379| [90261] Zend Framework DOCTYPE XML External Entity (XXE) Data Parsing Arbitrary File Disclosure
11380| [90130] Microsoft .NET Framework Windows Form Object Creation Callback Function Arbitrary Code Execution
11381| [89936] Adobe Flash Player / AIR SWF Content Regular Expression Parsing Heap Overflow
11382| [89841] Cisco Unity Express /Web/SA3/AddHoliday.do holiday.description Parameter XSS
11383| [89837] Cisco Unity Express /Web/SA2/ScriptList.do gui_pagenotableData Parameter XSS
11384| [89836] Cisco Unity Express /Web/SA/SaveConfiguration.do Multiple Action CSRF
11385| [89694] SAP NetWeaver Web Application Server (WAS) AdapterFramework Servlet Information Disclosure
11386| [89636] IBM InfoSphere Information Services Framework (ISF) Insecure Authorization Controls Remote Privilege Escalation
11387| [89607] Kohana Framework /master/classes/Kohana/Filebrowser.php path Parameter Traversal Arbitrary File Access
11388| [89317] Rack Regular Expressions Engine Content-Disposition Header Parsing Infinite Loop Remote DoS
11389| [89245] Oracle Solaris Kernel/DTrace Framework Subcomponent Unspecified Local DoS
11390| [89240] Oracle Siebel CRM Siebel UI Framework Subcomponent Unspecified Remote Information Disclosure
11391| [89217] Oracle Agile PLM Framework Security Subcomponent Unspecified Remote Information Disclosure
11392| [89216] Oracle E-Business Suite Oracle Applications Framework Component Bookmarkable Pages Subcomponent Unspecified Remote Issue
11393| [89213] Oracle E-Business Suite Oracle Applications Framework Component Diagnostics Subcomponent Unspecified Remote Issue
11394| [89209] Oracle E-Business Suite Oracle CRM Technical Foundation Component Application Framework Subcomponent Unspecified Remote Issue
11395| [89208] Oracle E-Business Suite Oracle Applications Framework Component Diagnostics Subcomponent /OA_HTML/RF.jsp Unauthorized Diagnostic Mode Manipulation
11396| [89207] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component User Interface Framework Subcomponent Unspecified Remote Issue
11397| [89204] Oracle Enterprise Manager Grid Control Enterprise Manager Base Platform Component Policy Framework Subcomponent /em/console/ecm/policy/policyViewSettings pagename Parameter HTTP Response Splitting
11398| [88968] Microsoft .NET Framework Replace() Function Open Data Protocol (OData) HTTP Request Parsing Remote DoS
11399| [88965] Microsoft .NET Framework Double Construction Privilege Escalation
11400| [88964] Microsoft .NET Framework System.DirectoryServices.Protocols.SortRequestControl.GetValue() Method this.keys.Length Parameter Heap Buffer Overflow
11401| [88963] Microsoft .NET Framework Windows Forms (WinForms) Component System.Drawing.Imaging.EncoderParameters.ConvertToMemory() Method this.param.Length Parameter Multiple Application Handling Heap Buffer Overflow
11402| [88962] Microsoft .NET Framework System Drawing Memory Pointer Handling CAS Bypass Information Disclosure
11403| [88733] Hero Framework Name Manipulation CSRF
11404| [88732] Hero Framework search q Parameter XSS
11405| [88731] Hero Framework users/login username Parameter XSS
11406| [88553] IBM Rational Automation Framework (RAF) Web UI Authentication Bypass
11407| [88522] Zend Framework Zend_Feed_Rss / Zend_Feed_Atom XML External Entity (XXE) Data Parsing Arbitrary File Disclosure
11408| [88521] Zend Framework Zend_Feed::import() Factory Method XML External Entity (XXE) Data Parsing Arbitrary File Disclosure
11409| [88457] Smartphone Pentest Framework directdownload.pl Remote Command Execution
11410| [88456] Smartphone Pentest Framework androidwebkit.pl Remote Command Execution
11411| [88280] ExpressionEngine swfupload_f9.swf movieName Parameter XSS
11412| [88087] Fortinet FortiWeb /waf/pcre_expression/validate Multiple Parameter XSS
11413| [88041] ExpressionEngine Arbitrary String Parsing Unspecified Issue
11414| [88035] ExpressionEngine Arbitrary Private Message Attachment Deletion
11415| [88032] ExpressionEngine register_globals Unspecified PHP Global Variable Manipulation
11416| [88030] ExpressionEngine Session Class Unspecified SQL Injection
11417| [88029] ExpressionEngine Post-delivery Private Message Content Manipulation
11418| [88028] ExpressionEngine Plugin Manager Unspecified Issue
11419| [88027] ExpressionEngine Private Message / Forum Attachment Predictable URL Weakness
11420| [88026] ExpressionEngine XML-RPC Library Unspecified Issue
11421| [88022] ExpressionEngine CP Home page Unauthorized Entry Title Disclosure
11422| [87964] IBM Rational Automation Framework was_common_configure_create_ssl_certs SSL Certificate Creation Unencrypted Password Weakness
11423| [87852] Smartphone Pentest Framework (SPF) /frameworkgui/getDatabase.pl Multiple Parameter SQL Injection
11424| [87851] Smartphone Pentest Framework (SPF) /frameworkgui/SEAttack.pl modemNoDD Parameter SQL Injection
11425| [87850] Smartphone Pentest Framework (SPF) /frameworkgui/sendSMS.pl Multiple Parameter SQL Injection
11426| [87849] Smartphone Pentest Framework (SPF) /frameworkgui/takePic.pl Multiple Parameter SQL Injection
11427| [87848] Smartphone Pentest Framework (SPF) /frameworkgui/CSAttack.pl modemNoDD2 Parameter SQL Injection
11428| [87847] Smartphone Pentest Framework (SPF) /frameworkgui/escalatePrivileges.pl Multiple Parameter SQL Injection
11429| [87846] Smartphone Pentest Framework (SPF) /frameworkgui/getContacts.pl Multiple Parameter SQL Injection
11430| [87828] Yii Framework Search Form SQL Injection
11431| [87770] ExpressionEngine Template Manager Unspecified Issue
11432| [87769] ExpressionEngine Forgot Password Functionality Error Message Email Address Enumeration
11433| [87768] ExpressionEngine Multiple Authentication Field Autocomplete Weakness Authentication Bypass
11434| [87751] ExpressionEngine Edit Only Group New Entry Creation Restriction Bypass
11435| [87750] ExpressionEngine Member Module Unspecified XSS
11436| [87746] ExpressionEngine Unspecified XSS
11437| [87745] ExpressionEngine redirect Function Unspecified CRLF Injection
11438| [87727] ExpressionEngine Mail List Subscriber Mass Unsubscribe Weakness
11439| [87711] ExpressionEngine Unprivileged User Super Admin Account Manipulation
11440| [87710] ExpressionEngine Unspecified XSS
11441| [87709] ExpressionEngine Unspecified CSRF
11442| [87699] ExpressionEngine Pending Member Privilege Escalation
11443| [87698] ExpressionEngine Discussion Forum Module mod.forum_core.php IP Restriction Bypass
11444| [87697] ExpressionEngine Malformed Request Search Function DoS
11445| [87689] ExpressionEngine Comment Preview Unspecified Issue
11446| [87688] ExpressionEngine Unspecified XSS
11447| [87687] ExpressionEngine Unspecified Email Module Recipient Parameter Manipulation
11448| [87685] ExpressionEngine File Upload Unspecified XSS
11449| [87682] ExpressionEngine Unspecified Arbitrary Code Execution
11450| [87674] ExpressionEngine Guest User Unspecified Privilege Escalation
11451| [87673] ExpressionEngine Private Message Attachment Upload SQL Error Message Path Disclosure
11452| [87667] Premier Election Solutions (Diebold) ExpressPoll Operating System Unauthorized Upgrade
11453| [87663] ExpressionEngine Content Edit Page Access Privilege Bypass
11454| [87662] ExpressionEngine Member Groups Access Role Unprivileged File Manager Directory Access
11455| [87661] ExpressionEngine Themes Folder Permission Weakness Arbitrary Theme Manipulation
11456| [87660] ExpressionEngine Info Accessory SSL Error Message Path Disclosure
11457| [87659] ExpressionEngine Unspecified Privilege Escalation
11458| [87502] Zend Framework Development Environment Error View (error/error.phtml) Request Parameters XSS
11459| [87479] Zend Framework Zend_Filter_StripTags Whitespace / Newline Injection XSS Filter Bypass
11460| [87356] Oracle MySQL do_div_mod DIV Expression Handling Remote DoS
11461| [87328] Smartphone Pentest Framework (SPF) /frameworkgui/ Permission Weakness Local Arbitrary File Manipulation
11462| [87327] Smartphone Pentest Framework (SPF) Multiple Function CSRF
11463| [87326] Smartphone Pentest Framework (SPF) frameworkgui/config Configuration File Direct Request Remote Information Disclosure
11464| [87325] Smartphone Pentest Framework (SPF) /frameworkgui/attachMobileModem.pl Multiple Parameter SQL Injection
11465| [87324] Smartphone Pentest Framework (SPF) /frameworkgui/attach2Agents.pl Multiple Parameter SQL Injection
11466| [87323] Smartphone Pentest Framework (SPF) /frameworkgui/attach2agents.pl Multiple Parameter Remote Command Execution
11467| [87322] Smartphone Pentest Framework (SPF) /frameworkgui/attachMobileModem.pl Multiple Parameter Remote Command Execution
11468| [87321] Smartphone Pentest Framework (SPF) /frameworkgui/guessPassword.pl ipAddressTB Parameter Remote Command Execution
11469| [87320] Smartphone Pentest Framework (SPF) /frameworkgui/CSAttack.pl Multiple Parameter Remote Command Execution
11470| [87319] Smartphone Pentest Framework (SPF) /frameworkgui/SEAttack.pl Multiple Parameter Remote Command Execution
11471| [87267] Microsoft .NET Framework WPF Reflection Optimization Object Permission Handling Arbitrary Code Execution
11472| [87266] Microsoft .NET Framework Web Proxy Setting Auto-Discovery (WPAD) Handling Remote Code Execution
11473| [87265] Microsoft .NET Framework Path Subversion Arbitrary DLL Injection Code Execution
11474| [87264] Microsoft .NET Framework Partially Trusted Code Function Handling Information Disclosure
11475| [87263] Microsoft .NET Framework Reflection Object Permission Handling Arbitrary Code Execution
11476| [87245] Zend Framework Multiple Class XML DOCTYPE Declaration Handling XEE Injection DoS
11477| [86991] Archin Theme for WordPress /wordpress/wp-content/themes/archin/hades_framework/option_panel/ajax.php Configuration Option Manipulation
11478| [86988] WPsc-MijnPress Plugin for WordPress mijnpress_plugin_framework.php rwflush Parameter XSS
11479| [86883] TomatoCart PayPal Express Checkout Module Redirection URL Modification Payment Requirement Bypass
11480| [86670] Android vold Daemon Crafted FrameworkCommand Local Privilege Escalation (zergRush)
11481| [86383] Oracle Siebel CRM Siebel UI Framework Component Portal Framework Subcomponent Unspecified Remote Information Disclosure
11482| [86382] Oracle Siebel CRM Siebel UI Framework Component Siebel Documentation Subcomponent Unspecified Remote Information Disclosure
11483| [86326] Oracle Agile PLM Framework ROLESPRV Subcomponent Unspecified Remote Information Disclosure
11484| [86325] Oracle Agile PLM Framework Web Client (CS) Subcomponent Unspecified Remote Issue
11485| [86324] Oracle Agile PLM Framework ATTACH Subcomponent Unspecified Remote Information Disclosure
11486| [86318] Oracle E-Business Suite Oracle Applications Framework Component MDS loading Subcomponent Unspecified Local Information Disclosure
11487| [86249] Condor condor_history Constraint Expression Handling Overflow
11488| [85873] Smartphone Pentest Framework (SPF) remoteAttack.pl ipAddressTB Parameter Remote Code Execution
11489| [85741] IBM WebSphere Commerce Enterprise REST Services Framework Unspecified Access Restriction Bypass
11490| [85689] Zend Framework Zend\Tag\Cloud\Decorator Unspecified XSS
11491| [85688] Zend Framework Zend\Uri Unspecified XSS
11492| [85687] Zend Framework Zend\View\Helper\HeadStyle Unspecified XSS
11493| [85686] Zend Framework Zend\View\Helper\Navigation\Sitemap Unspecified XSS
11494| [85685] Zend Framework Zend\View\Helper\Placeholder\Container\AbstractStandalone Unspecified XSS
11495| [85684] Zend Framework Zend\Log\Formatter\Xml Unspecified XSS
11496| [85683] Zend Framework Zend\Feed\PubSubHubbub Unspecified XSS
11497| [85049] Atlassian Bamboo Struts / Freemarker Templates OGNL Expression Parsing Remote Command Execution
11498| [85009] Apache Struts Request Parameter OGNL Expression Parsing Remote DoS
11499| [84981] Oracle Java SE / JRE java.beans.Expression Class Privileged Class Reflection Handling Remote Code Execution
11500| [84966] Express Burn EBP File Handling Overflow
11501| [84809] Atlassian FishEye / Crucible Third-Party Framework Anonymous Signup / Access Enabling
11502| [84753] Tridium NiagaraAX Framework Plaintext Credential Storage
11503| [84752] Tridium NiagaraAX Framework Predictable Session ID Generation Brute Force Weakness
11504| [84478] Android Framework Zero Permission Android Application Multiple Function Information Disclosure
11505| [84477] Android Framework Zero Permission Android Application URI ACTION_VIEW Intent Data Exfiltration
11506| [84359] Django Authentication Framework Multiple View Redirection Functionality data: Scheme URL XSS
11507| [84087] FreePBX admin/modules/framework/bin/gen_amp_conf.php Direct Request Plaintext Admin Credential Disclosure
11508| [83950] Oracle Application Express Listener Unspecified Remote Information Disclosure
11509| [83923] Oracle Siebel CRM UI Framework Subcomponent Unspecified Remote Issue
11510| [83922] Oracle Siebel CRM UI Framework Subcomponent Unspecified Remote DoS (2012-1742)
11511| [83921] Oracle Siebel CRM Portal Framework Subcomponent Unspecified Remote Issue
11512| [83920] Oracle Siebel CRM UI Framework Subcomponent Unspecified Remote Information Disclosure (2012-1754)
11513| [83919] Oracle Siebel CRM UI Framework Subcomponent Unspecified Remote Information Disclosure (2012-1732)
11514| [83918] Oracle Siebel CRM UI Framework Subcomponent Unspecified Remote DoS (2012-1760)
11515| [83816] Tridium NiagaraAX Framework Unspecified Traversal Arbitrary File Access
11516| [83815] Tridium NiagaraAX Framework Insecure Credential Storage Information Disclosure
11517| [83720] Microsoft .NET Framework Crafted Tilde (~) Request Resource Consumption Remote DoS
11518| [83529] Docebo class.dashboard_lms.php where_framework Parameter Remote File Inclusion
11519| [83493] Magix CMS framework/js/ckeditor/plugins/pdw_file_browser/swfupload/upload.php Multiple File Extension Upload Arbitrary Code Execution
11520| [83492] Magix CMS framework/js/tiny_mce/plugins/pdw_file_browser/swfupload/upload.php Multiple File Extension Upload Arbitrary Code Execution
11521| [83221] Zend Framework SimpleXMLElement Class External Entity XML (XXE) Data Parsing Arbitrary File Disclosure
11522| [82902] User Meta Plugin for WordPress framework/helper/uploader.php File Upload PHP Code Execution
11523| [82859] Microsoft .NET Framework Memory Access Function Pointer Handling Memory Corruption
11524| [82574] Yellow Duck Framework index.php id Parameter Arbitrary File Access
11525| [82571] Perl-Compatible Regular Expression (PCRE) String Minimum Length Calculation Overflow
11526| [82570] Perl-Compatible Regular Expression (PCRE) pcregrep Long Line Handling Overflow
11527| [82569] Perl-Compatible Regular Expression (PCRE) Non-UTF-8 Repeated Unicode Property Match DoS
11528| [82568] Perl-Compatible Regular Expression (PCRE) Conditional Group Handling Infinite Loop DoS
11529| [82567] Perl-Compatible Regular Expression (PCRE) pcre_study() Function Group Zero Qualifier Handling DoS
11530| [82480] Perl-Compatible Regular Expression (PCRE) Recursive Subpattern Handling Infinite Loop DoS
11531| [82397] Restlet Framework XML External Entity Parsing (XXE) Unspecified Remote Issue
11532| [82225] Apple Mac OS X Security Framework Unspecified Remote Memory Corruption
11533| [82223] Apple Mac OS X LoginUIFramework Race Condition Guest User Login Handling Authentication Bypass
11534| [81889] Travelon Express Multiple Script Arbitrary File Upload
11535| [81888] Travelon Express admin/holiday-view.php holiday name Field XSS
11536| [81887] Travelon Express admin/holiday-add.php holiday name Field XSS
11537| [81886] Travelon Express admin/customer-edit.php cid Parameter SQL Injection
11538| [81885] Travelon Express admin/airline-edit.php fid Parameter SQL Injection
11539| [81884] Travelon Express holiday_book.php hid Parameter SQL Injection
11540| [81883] Travelon Express pages.php id Parameter SQL Injection
11541| [81882] Travelon Express holiday.php hid Parameter SQL Injection
11542| [81842] Cisco Unified Contact Center Express (CCX) Network Traffic Parsing Remote DoS
11543| [81737] Node.js HTTP Parser String Parsing HTTP Header Disclosure
11544| [81734] Microsoft .NET Framework Untrusted User Input Serialization Remote Code Execution
11545| [81733] Microsoft .NET Framework Partially Trusted Assembly Object Serialization Remote Code Execution
11546| [81722] Microsoft .NET Framework Buffer Allocation XBAP / .NET Application Handling Remote Code Execution
11547| [81721] Microsoft .NET Framework WPF Application Index Value Comparison Request Parsing Remote DoS
11548| [81394] Oracle Database Server Application Express Component Unspecified Remote Issue
11549| [81180] JA T3 Framework Component for Joomla! index.php file Parameter Traversal Arbitrary File Access
11550| [81133] Microsoft .NET Framework CRL (Common Language Runtime) Function Parameter Parsing Remote Code Execution
11551| [80759] TYPO3 Extbase Framework Missing HMAC Arbitrary Object Unserialization Weakness
11552| [80702] Cisco IOS Wide Area Application Services (WAAS) Express Feature Message Parsing Remote DoS
11553| [80105] HP Data Protector Express dpwindtb.dll Folder Creation Remote Overflow
11554| [80104] HP Data Protector Express Unspecified Remote Code Execution (2012-0123)
11555| [80103] HP Data Protector Express dpwinsdr.exe Opcode 0x330 Parsing Remote Overflow
11556| [80102] HP Data Protector Express dpwinsdr.exe Opcode 0x320 Parsing Remote Overflow
11557| [80001] Microsoft Expression Design Path Subversion Arbitrary DLL Injection Code Execution
11558| [79735] IBM Tivoli Provisioning Manager Express for Software Distribution Isig.isigCtl.1 ActiveX RunAndUploadFile() Method Boundary Error Remote Overflow
11559| [79734] IBM Tivoli Provisioning Manager Express for Software Distribution getAttachment Servlet Asset.getMimeType() Function SQL Injection
11560| [79733] IBM Tivoli Provisioning Manager Express for Software Distribution CallHomeExec Servlet Asset.getHWKey() Function SQL Injection
11561| [79732] IBM Tivoli Provisioning Manager Express for Software Distribution logon.do Servlet User.isExistingUser() Function SQL Injection
11562| [79731] IBM Tivoli Provisioning Manager Express for Software Distribution register.do Servlet User.updateUserValue() Function SQL Injection
11563| [79730] IBM Tivoli Provisioning Manager Express for Software Distribution SoapServlet Servlet Printer.getPrinterAgentKey SQL Injection
11564| [79673] SystemTap Invalid Pointer DWARF Expression Parsing Local DoS
11565| [79261] Microsoft .NET Framework / Silverlight Buffer Length Calculation XAML Browser Application Handling Remote Memory Corruption
11566| [79260] Microsoft .NET Framework / Silverlight Unmanaged Object XAML Browser Application Handling Remote Code Execution
11567| [78693] Barracuda Backup Expressions Module Unspecified XSS
11568| [78665] Android libsysutils FrameworkListener::dispatchCommand Method Application Handling Buffer Overflow
11569| [78501] Apache Struts ParameterInterceptor Class OGNL Expression Parsing Remote Command Execution
11570| [78454] OpenNMS web/springframework/security/SecurityAuthenticationEventOnmsEventBuilder.java Username Field XSS
11571| [78250] ExpressView Browser Plug-In (MrSID) Multiple Uninitialized Object Pointer SID Image File Handling Remote Code Execution
11572| [78249] ExpressView Browser Plug-In (MrSID) Multiple SID Image File Handling Remote Overflow
11573| [78076] PHPIDS Regular Expression Denial of Service (ReDoS) Filter Weakness PHP Sequence File Manipulation
11574| [78057] Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
11575| [78056] Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content Parsing Remote Code Execution
11576| [78055] Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
11577| [78054] Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary Site Redirect
11578| [77951] Mozilla Multiple Products YARR Regular Expression Library Javascript Parsing Remote Code Execution
11579| [77593] Apache Struts Conversion Error OGNL Expression Injection
11580| [77584] ISC DHCP Regular Expressions dhcpd.conf DHCP Request Packet Parsing Remote DoS
11581| [77490] Novell XTier Framework HTTP Server Component Header Parsing Remote Overflow
11582| [77462] Hero Framework Template File Events month Parameter XSS
11583| [77414] ExpressionEngine Unspecified XSS
11584| [77374] Apache MyFaces Java Bean includeViewParameters Parsing EL Expression Security Weakness
11585| [77373] Oracle Mojarra Java Bean includeViewParameters Parsing EL Expression Security Weakness
11586| [77315] IBM System Storage TS3100 / TS3200 Tape Library Express Library Admin Authentication Bypass
11587| [77297] JBoss Enterprise SOA Platform JRuby scripting_chain Application Regular Expressions XSS
11588| [77071] Atlassian Confluence Seraph Web Framework HTTP Header Injection
11589| [76527] Oracle E-Business Suite REST Services Component Unspecified Remote Applications Framework Data Disclosure
11590| [76516] Oracle Database Application Express Component Unspecified Remote Code Execution
11591| [76214] Microsoft .NET Framework / Silverlight Class Inheritance Restriction Web Page Handling Remote Code Execution
11592| [76160] Elastix PBX admin/modules/framework/bin/generate_hints.php Extension Enumeration
11593| [75914] Zend Framework / Server Multiple Script Direct Request Path Disclosure
11594| [75837] Mozilla Firefox Regular Expression Unspecified Underflow
11595| [75560] Libxml2 xmlXPathCompOpEval Invalid XPath Expression Error Handling Double-free Issue
11596| [75386] Microsoft Office Excel Unspecified Conditional Expression Parsing Excel File Handling Memory Corruption
11597| [75263] Spring Framework Multiple Unspecified Object Deserialization Arbitrary Command Execution
11598| [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
11599| [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
11600| [75226] Zikula Application Framework index.php themename Parameter XSS
11601| [75008] GNU C Library (glibc) glob Expression Pathname Matching Remote DoS (2010-4756)
11602| [75007] GNU C Library (glibc) glob Expression Pathname Matching Remote DoS (2010-4754)
11603| [74916] Linux SCSI Target Framework (tgt) tgt daemon (tgtd) iscsi_rx_handler() Function Double-free
11604| [74777] Cisco Unified Communications Manager Service Advertisement Framework (SAF) Packet Parsing Remote DoS (2011-2564)
11605| [74776] Cisco Unified Communications Manager Service Advertisement Framework (SAF) Packet Parsing Remote DoS (2011-2563)
11606| [74695] Libxml2 xmlXPathCompOpEvalPositionalPredicate Invalid XPath Expression Error Handling Double Free Issue
11607| [74404] Microsoft .NET Framework System.Net.Sockets Code Access Security Bypass Information Disclosure
11608| [74403] Microsoft .NET Framework Chart Control Special URI Character GET Request Parsing Remote Information Disclosure
11609| [74277] JBoss Seam jboss-seam.jar FacesMessages Expression Language Statement Remote Java Code Execution
11610| [73932] Oracle Enterprise Manager Grid Control Security Framework Authentication Unspecified Remote Issue
11611| [73929] Oracle Enterprise Manager Grid Control Security Framework User Model Unspecified Remote Issue
11612| [73741] Kay Framework Attribute Exchange Signature Verification Failure AX Information Manipulation
11613| [73387] Zend Framework PDO_MySql Character Set Security Bypass
11614| [73381] IBM WebSphere Application Server (WAS) Security Component TIP/eWAS Framework AuthCache Entry Remote Access Bypass
11615| [73340] vsftpd ls.c vsf_filename_passes_filter STAT Command glob Expression Remote DoS
11616| [73223] IBM Tivoli Management Framework Endpoint Built-in Account Default HTTP Password Remote Restricted Page Access
11617| [72957] Horde_Auth Framework Composite Driver Authentication Bypass
11618| [72932] Microsoft .NET Framework JIT Object Validation Arbitrary Code Execution
11619| [72931] Microsoft .NET Framework / Silverlight Array Offset Remote Code Execution
11620| [72783] Google Chrome Extension Framework Stale Pointer Unspecified Issue
11621| [72713] IBM Tivoli Management Framework Endpoint lcfd.exe opts Field Overflow
11622| [72599] Cisco TelePresence Java Servlet Framework Crafted Request Unauthenticated Command Execution (2011-0384)
11623| [72598] Cisco TelePresence Java Servlet Framework Crafted Request Unauthenticated Command Execution (2011-0383)
11624| [72493] Google Chrome Regular-Expression Reentry Implementation Memory Corruption
11625| [72413] CiscoWorks Common Services Framework Help Servlet cwhp/device.center.do device Parameter XSS
11626| [72242] Exponent CMS framework/modules/pixidou/download.php file Parameter Traversal Arbitrary File Access
11627| [72123] Horde framework/Text_Filter/lib/Horde/Text/Filter/Xss.php Unspecified XSS
11628| [72122] Horde framework/Share/lib/Horde/Share/Object/Sql.php Guest User Access Restriction Bypass
11629| [71782] Microsoft .NET Framework x86 JIT Compiler XAML Browser Application (XBAP) Processing Stack Corruption
11630| [71721] qooxdoo framework/source/resource/qx/test/part/delay.php file Parameter Traversal Arbitrary File Access
11631| [71720] qooxdoo framework/source/resource/qx/test/jsonp_primitive.php callback Parameter XSS
11632| [71719] eyeOS framework/source/resource/qx/test/part/delay.php file Parameter Traversal Arbitrary File Access
11633| [71718] eyeOS framework/source/resource/qx/test/jsonp_primitive.php callback Parameter XSS
11634| [71665] Microsoft .NET Framework on XP KB982671 Persistent Firewall Disablement
11635| [71013] .NET Framework Runtime Optimization Service Insecure File Permissions Privilege Escalation
11636| [70857] Metasploit Framework on Windows Insecure Filesystem Permissions Local Privilege Escalation
11637| [70751] Zikula Application Framework User Permissions Modification CSRF
11638| [70586] Oracle Sun Products Suite Sun Java System Communications Express Component Web Mail Unspecified Remote Issue
11639| [70497] SmoothWall Express shutdown.cgi System Reboot CSRF
11640| [70496] SmoothWall Express cgi-bin/ipinfo.cgi IP Parameter XSS
11641| [70348] Cisco IOS CallManager Express (CME) SIP TRUNK Traffic Rate Burst Request Size Remote DoS
11642| [70341] Cisco IOS CallManager Express (CME) Extension Mobility Phone SNR Number Change Remote DoS
11643| [70086] Embedthis Appweb Ejscript Web Framework XSS
11644| [70023] IBM ENOVIA emxFramework.FilterParameterPattern Property XSS
11645| [69861] Expression CMS Multiple Parameter XSS
11646| [69394] MySQL Temporary Table Expression Re-Evaluation DoS
11647| [69159] Horde Application Framework Preference Form CSRF
11648| [68791] Camtasia Studio ExpressShow SWF Files Unspecified XSS
11649| [68556] Microsoft .NET Framework x64 JIT Compiler Unprivileged Application Remote Code Execution
11650| [68064] OTRS (Open Ticket Request System) Crafted Email Regular Expression Processing DoS
11651| [67975] HP Data Protector Express dpwinsup PrvRecvRqu() Function NULL Dereference Remote DoS
11652| [67974] HP Data Protector Express on Linux libdplindtb.so DtbClsLogin() Function Overflow
11653| [67973] HP Data Protector Express on Windows dpwindtb.dll DtbClsLogin() Function Overflow
11654| [67839] Horde Application Framework util/icon_browser.php subdir Parameter XSS
11655| [67804] Seagull PHP Framework fog/lib/pear/Config/Container.php includeFile Parameter Remote File Inclusion
11656| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
11657| [67689] Seagull PHP Framework index.php/user/password frmQuestion Parameter SQL Injection
11658| [67503] Microsoft Outlook Express Path Subversion Arbitrary DLL Injection Code Execution
11659| [67028] Play Framework public/ Traversal Arbitrary File Access
11660| [66993] Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote Code Execution
11661| [66881] JBoss Seam 2 JBoss Expression Language Crafted URL Arbitrary Code Execution
11662| [66856] WebKit emitDisjunction Regular Expression Interpretation Memory Corruption
11663| [66346] Oracle E-Business Suite Applications Framework Component Unspecified Remote Issue (2010-0912)
11664| [66343] Oracle E-Business Suite Applications Framework Unspecified Remote Information Disclosure (2010-0909)
11665| [66342] Oracle E-Business Suite Applications Framework Unspecified Remote Issue (2010-0908)
11666| [66331] Oracle Database Server Application Express Component Unspecified Remote Issue (2010-0892)
11667| [66253] Diem Content Management Framework Blog Items Filter Module article_form_filter[name][text] Parameter XSS
11668| [66252] Diem Content Management Framework dmCore Script text Parameter XSS
11669| [66251] Diem Content Management Framework Page Metas Managing Script value Parameter XSS
11670| [65993] Open Text ECM Expression Builder Unspecified XSS
11671| [65991] Linux SCSI Target Framework (tgt) iSNS Message Remote Overflow
11672| [65661] Spring Framework class.classLoader.URLs[0]=jar: Crafted JAR File HTTP Request Arbitrary Code Execution
11673| [65430] Oracle Mojarra Unencrypted ViewState Serialized View Object Manipulation Arbitrary Expression Language (EL) Statement Execution
11674| [65429] Apache MyFaces Unencrypted ViewState Serialized View Object Manipulation Arbitrary Expression Language (EL) Statement Execution
11675| [65376] MS IE Style Expression Handling Unspecified DoS
11676| [65285] Cisco Unified Contact Center Express (CCX) Traversal Arbitrary File Access
11677| [65284] Cisco Unified Contact Center Express (CCX) CTI Server Component Malformed Message Remote DoS
11678| [64799] Oracle Sun Products Suite Sun Java System Communications Express Component cmd.msc Message Box Deletion CSRF
11679| [64530] Microsoft Outlook Express / Windows Mail STAT Response Overflow
11680| [64447] Tirzen Framework (TZN) tzn_mysql.php Username Parameter SQL Injection Authentication Bypass
11681| [64397] Perl-Compatible Regular Expression (PCRE) pcre_compile.c. compile_branch() Function Overflow
11682| [64269] Zikula Application Framework Users Module CSRF
11683| [64096] Zikula Application Framework index.php func Parameter XSS
11684| [64095] Zikula Application Framework ZLanguage.php lang Parameter XSS
11685| [64071] Oracle Sun Product Suite Sun Java System Communications Express Component Address Book Unspecified Remote Information Disclosure
11686| [63520] Oracle Sun Products Suite Sun Java System Communications Express Component Message Subject Field XSS
11687| [63418] Linux SCSI Target Framework (tgt) usr/iscsi/isns.c Multiple Function Format String
11688| [63313] ViewVC Regular Expression Search Functionality XSS
11689| [63177] Cisco IOS Unified Communications Manager Express SCCP Message Handling Unspecified Remote DoS (CSCsz49741)
11690| [63176] Cisco IOS Unified Communications Manager Express SCCP Message Handling Unspecified Remote DoS (CSCsz48614)
11691| [63172] Mime Mail Module for Drupal PCRE Regular Expression Engine Arbitrary PHP Code Execution
11692| [62997] Trouble Ticket Express ttx.cgi fid Parameter Arbitrary Command Execution
11693| [62788] Download Protect Framework/EmailTemplates.class.php GLOBALS[RootPath] Parameter Remote File Inclusion
11694| [62585] Hitachi Multiple Products uCosminexus Portal Framework Unspecified XSS
11695| [62581] WebsiteBaker framework/class.wb.php print_error() Function Security Bypass
11696| [62118] IBM Cognos Express Tomcat Manager Hardcoded Credentials
11697| [62027] PHP Fuzzer Framework Insecure File Creation Local Privilege Escalation
11698| [61959] SAP BusinessObjects AdminTools/querybuilder/logonform.jsp framework Parameter XSS
11699| [61958] SAP BusinessObjects AdminTools/querybuilder/ie.jsp framework Parameter XSS
11700| [61731] Oracle Database Application Express Application Builder HTTP Unspecified Remote Issue
11701| [61707] Zend Framework Zend_Service_ReCaptcha_MailHide Function email Argument XSS
11702| [61706] Zend Framework Zend_Json_Encoder Forward Slash XSS
11703| [61705] Zend Framework Zend_Dojo_View_Helper_Editor Function HTML DIV Tag XSS
11704| [61704] Zend Framework Zend_Filter_StripTags Function Whitelisted HTML Comment Bypass XSS
11705| [61703] Zend Framework Zend_File_Transfer Function MIME Type Unspecified Weakness
11706| [61702] Zend Framework Multiple Function Encoded Request XSS
11707| [61340] Zend Framework Zend_Log_Writer_Mail Class shutdown Function Arbitrary Mail Relay
11708| [59502] Microsoft IE / Outlook Express Crafted XML Stylesheet (XSL) Arbitrary Script Execution
11709| [59394] Mozilla Multiple Browsers Proxy Auto-configuration (PAC) File Regular Expression Parsing Arbitrary Code Execution
11710| [59128] Oracle E-Business Suite Applications Framework Unspecified Remote Information Disclosure
11711| [59108] Oracle Database Application Express FLOWS_030000. WWV_EXECUTE_IMMEDIATE Unspecified Remote Issue
11712| [58851] Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulation Arbitrary Code Execution
11713| [58850] Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution
11714| [58849] Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary Code Execution
11715| [58651] Symantec SecurityExpressions Audit and Compliance Server Unspecified XSS
11716| [58650] Symantec SecurityExpressions Audit and Compliance Server Unspecified HTML Injection
11717| [58564] Premier Election Solutions (Diebold) ExpressPoll Audit Log Voter Privacy Violation
11718| [58563] Premier Election Solutions (Diebold) ExpressPoll DB3 Database Unauthorized Manipulation
11719| [58562] Premier Election Solutions (Diebold) ExpressPoll Boot Loader / OS Unauthorized Upgrade
11720| [58552] Premier Election Solutions (Diebold) EMP / ExpressPoll Server Log Integrity Weakness
11721| [58450] Solaris STREAMS Framework Unspecified Local DoS
11722| [58335] Cisco IOS Unified Communications Manager Express (CME) Extension Mobility Feature Login Component Remote Overflow
11723| [58334] Cisco IOS Cisco Express Forwarding Malformed Packet Handling Remote DoS (2009-2873)
11724| [58333] Cisco IOS Cisco Express Forwarding Malformed Packet Handling Remote DoS (2009-2872)
11725| [58228] ipMonitor Malformed Regular Expression Backreference Handling DoS
11726| [58109] Horde Application Framework Numeric Preference Type XSS
11727| [58108] Horde Application Framework MIME Viewer Text Part Rendering XSS
11728| [58107] Horde Application Framework Form Library Image Form Field Arbitrary File Overwrite
11729| [57893] Symantec Altiris eXpress NS SC Download Altiris.AeXNSPkgDL.1 ActiveX (AeXNSPkgDLLib.dll) DownloadAndInstall() Method Arbitrary Code Execution
11730| [57638] Microsoft Outlook Express IMAP Client literal_size Remote Overflow
11731| [57340] Adobe Flex SDK express-install Templates index.template.html Query String XSS
11732| [57062] Microsoft IE STYLE Element / CSS Expression Property Double Content Injection XSS Filter Bypass
11733| [56972] OpenJDK IcedTea Java Web Start Framework JAR File Trust Weakness Privilege Escalation
11734| [56905] Microsoft .NET Framework Request Scheduling Crafted HTTP Request Remote DoS
11735| [56414] Apache Tiles Duplicate Expression Language (EL) Expression Evaluation XSS
11736| [55939] Google Chrome JavaScript Regular Expressions Evaluation Memory Corruption
11737| [55937] Cisco Unified Contact Center Express (CCX) Database Unspecified XSS
11738| [55936] Cisco Unified Contact Center Express (CCX) Customer Response Solutions (CRS) Administration Interface Traversal Arbitrary File Manipulation
11739| [55900] Oracle E-Business Suite Applications Framework /OA_HTML/OA.jsp Multiple Parameter XSS
11740| [55198] Zend Framework Zend_View::render() Function Traversal Local File Inclusion
11741| [54641] Novell GroupWise WebAccess Unfiltered Style Expressions XSS
11742| [54610] Sun Java System Communications Express uwc/abs/search.xml abperson_displayName Parameter XSS
11743| [54609] Sun Java System Communications Express uwc/base/UWCMain URL Parameter XSS
11744| [54509] HP Data Protector Express dpwinsup Module Crafted Traffic Remote Memory Disclosure
11745| [53941] Scorpio Framework baseAdminSite Implementation view Action Object Restriction Bypass
11746| [53940] Spring Framework RegEx Serialized Data Handling CPU Consumption DoS
11747| [53754] Oracle E-Business Suite Applications Framework Unspecified Remote Issue
11748| [53738] Oracle Database Application Express (APEX) FLOWS_030000.WWV_FLOW_USER User Password Hash Disclosure
11749| [53540] Horde Application Framework framework/Text_Filter/Filter/xss.php Style Attributes XSS
11750| [52930] Benjile PHP Security Framework lib/common/SecureHttpRequest.class.php SQL Injection Protection Bypass
11751| [52929] Benjile PHP Security Framework lib/control/AuthentificationController.class.php SQL Injection
11752| [52928] Benjile PHP Security Framework lib/base.inc.php Multiple Parameter Remote File Inclusion
11753| [52845] ExpressionEngine system/index.php avatar Parameter XSS
11754| [52718] Sun Java System Communications Express Multiple Field XSS
11755| [52707] Atlassian JIRA Enterprise Edition Webwork 1 Framework Dynamic URL Transformation Security Bypass
11756| [52617] IBM Tivoli Storage Manager (TSM) Express adsmdll.dll Length Value Handling Remote Overflow
11757| [52282] Extrakt Framework index.php plugins[file][id] Parameter XSS
11758| [51973] Apple Mac OS X FSEvents Framework fseventsd Credential Management Local Information Disclosure
11759| [51887] Horde Multiple Products framework/Image/Image.php Horde_ImageDriver Name Traversal Local File Inclusion
11760| [51650] htmLawed Crafted CSS Expressions XSS
11761| [51329] Oracle E-Business Suite Applications Framework System Configuration Remote Information Disclosure
11762| [51314] Oracle BEA WebLogic Server / Express Console Unspecified Privilege Escalation
11763| [51313] Oracle BEA WebLogic Server / Express JSP Servlets Unspecified Information Disclosure
11764| [51312] Oracle BEA WebLogic Server / Express Web Services Unspecified Policy Bypass
11765| [50974] Microsoft Outlook Express InetComm.dll MimeOleClearDirtyTree Function Malformed Email Header Handling Infinite Loop DoS
11766| [50851] Product Sale Framework customer.forumtopic.php forum_topic_id Parameter SQL Injection
11767| [50620] ColdFusion Application Server Expression Evaluator openfile.cfm Arbitrary File Upload
11768| [50302] Microsoft .NET Framework Strong Name Implementation DLL File Public Key Token Subversion Multiple Mechanism Authentication Bypass
11769| [49843] IBM Metrica Service Assurance Framework ReportRequest :tasklabel Parameter XSS
11770| [49842] IBM Metrica Service Assurance Framework Launch jnlpname Parameter XSS
11771| [49841] IBM Metrica Service Assurance Framework ReportTree elementid Parameter XSS
11772| [49732] XWork ParameterInterceptor OGNL Expression Arbitrary SSO Modification
11773| [49442] IBM Tivoli Storage Manager (TSM) Express for Microsoft SQL SQL CAD Data Protection (dsmcat.exe) Remote Overflow
11774| [49329] Oracle Database Application Express (APEX) Session Creation Unspecified Remote Issue
11775| [49308] Oracle E-Business Suite Applications Framework Unspecified Remote Issue
11776| [49176] Midgard Components Framework Multiple Unspecified Issues
11777| [48962] DataFeedFile (DFF) PHP Framework API DFF_sku.func.php DFF_config[dir_include] Parameter Remote File Inclusion
11778| [48961] DataFeedFile (DFF) PHP Framework API DFF_rss.func.php DFF_config[dir_include] Parameter Remote File Inclusion
11779| [48960] DataFeedFile (DFF) PHP Framework API DFF_paging.func.php DFF_config[dir_include] Parameter Remote File Inclusion
11780| [48959] DataFeedFile (DFF) PHP Framework API DFF_mer_prdt.func.php DFF_config[dir_include] Parameter Remote File Inclusion
11781| [48958] DataFeedFile (DFF) PHP Framework API DFF_mer.func.php DFF_config[dir_include] Parameter Remote File Inclusion
11782| [48957] DataFeedFile (DFF) PHP Framework API DFF_featured_prdt.func.php DFF_config[dir_include] Parameter Remote File Inclusion
11783| [48956] DataFeedFile (DFF) PHP Framework API DFF_affiliate_client_API.php DFF_config[dir_include] Parameter Remote File Inclusion
11784| [48174] Red Hat Directory Server Directory Server Administration Express Interface adminutil Library Unspecified XSS
11785| [47292] Firebird 2 Crafted Expression Handling Unspecified Memory Corruption
11786| [46931] Microsoft Outlook/Express Unspecified URI Handling Arbitrary Command Injection
11787| [46690] Perl-Compatible Regular Expression (PCRE) pcre_compile.c Crafted Pattern Handling Overflow
11788| [46312] Prototype JavaScript Framework prototype.js Cross-site Ajax Request Unspecified Issue
11789| [46311] Prototype JavaScript Framework prototype.js script Tag Cross-site JSON String Information Disclosure
11790| [45882] Kaya CGI Framework HTTP Header XSS
11791| [45757] PHPIDS Arithmetic Expressions Handling XSS
11792| [44978] Red Hat Directory Server slapd LDAP Search Regular Expression Handler Overflow
11793| [44501] Oracle Application Express HTTP Unspecified Remote Issue
11794| [44500] Oracle Application Express flows_030000.wwv_execute_immediate Unspecified Remote Issue
11795| [44489] Oracle Applications Framework HTTP Unspecified Remote Information Disclosure
11796| [44266] WoltLab Community Framework (WCF) Multiple Parameter XSS
11797| [44265] WoltLab Community Framework (WCF) Multiple Variable Path Disclosure
11798| [44161] McAfee Common Management Agent (CMA) Framework Service Crafted Request Remote DoS
11799| [44117] RoundCube Webmail Style Sheet Expression Commands XSS
11800| [44053] Sympa wwsympa/wwsympa.fcgi arcsearch Malformed Expression Remote DoS
11801| [44032] Cisco Unified Communications Disaster Recovery Framework (DRF) Arbitrary Remote Command Execution
11802| [43697] IBM Tivoli Provisioning Manager Express Login Error Username Enumeration
11803| [43696] IBM Tivoli Provisioning Manager Express Account Creation Username Enumeration
11804| [43693] IBM Tivoli Provisioning Manager Express assess modification Unspecified XSS
11805| [43419] ExpressionEngine index.php URL Parameter CLRF Injection HTTP Response Splitting
11806| [43376] CUPS CGI Backend IPP Request Search Expression Handling (cgiCompileSearch) Remote Overflow
11807| [43328] Prototype (prototypejs) Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
11808| [43327] Moo.fx Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
11809| [43326] MochiKit Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
11810| [43325] Microsoft Atlas Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
11811| [43324] Yahoo! UI Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
11812| [43323] Dojo Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
11813| [43322] Direct Web Remoting (DWR) Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
11814| [43321] Google Web Toolkit (GWT) Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
11815| [43320] jQuery Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
11816| [43319] Script.aculo.us Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
11817| [43182] Google Android SDK WebKit Framework GIF Library GIF Handling Overflow
11818| [42853] McAfee ePolicy Orchestrator Framework Service Crafted UDP Packet Handling Format String
11819| [42631] JBoss Seam org.jboss.seam.framework.Query Class getRenderedEjbql Method order Variable Arbitrary Arbitrary EJBQL Command Execution
11820| [42101] MVEL set-expression Compiler Virtual Objects (Maps) Unspecified Code Injection
11821| [42021] Solaris 10 DTrace Dynamic Tracing Framework Kernel Tracing Information Disclosure
11822| [41989] Perl-Compatible Regular Expression (PCRE) Character Class Handling Remote Overflow
11823| [41585] ExpressionEngine index.php URL Parameter XSS
11824| [41417] Bubbling Library examples/dispatcher/framework/dispatcher.php uri Parameter Traversal Arbitrary File Access
11825| [41313] Oracle Application Express (APEX) NOTIFICATION_MSG Parameter XSS
11826| [40902] TCL in PostgreSQL Regular Expression Parser Crafted Doubly-nested State Regexp Parsing DoS
11827| [40766] Perl-Compatible Regular Expression (PCRE) Singleton Unicode Sequence Handling Overflow
11828| [40765] Perl-Compatible Regular Expression (PCRE) Unmatched Brackets / Parentheses Search Crafted Regexp DoS
11829| [40764] Perl-Compatible Regular Expression (PCRE) Character Class Calculation overflow
11830| [40763] Perl-Compatible Regular Expression (PCRE) Unmatched "
11831| [40761] Perl-Compatible Regular Expression (PCRE) Non-UTF-8 Mode Pattern Matching Information Disclosure
11832| [40760] Perl-Compatible Regular Expression (PCRE) \P Sequence DoS
11833| [40759] Perl-Compatible Regular Expression (PCRE) Unspecified Escape (backslash) Sequence DoS
11834| [40758] Perl-Compatible Regular Expression (PCRE) Compiled UTF-8 Options Pattern DoS
11835| [40757] Perl-Compatible Regular Expression (PCRE) Malformed POSIX Character Class Regexp DoS
11836| [40756] Perl-Compatible Regular Expression (PCRE) Regexp Subpattern Handling Overflow
11837| [40755] Perl-Compatible Regular Expression (PCRE) Compiled Memory Allocation Miscalculation Failure DoS
11838| [40754] Perl-Compatible Regular Expression (PCRE) Crafted Regexp Parsing Overflow
11839| [40753] Perl-Compatible Regular Expression (PCRE) Named Capturing Subpatterns Counting DoS
11840| [40752] Perl-Compatible Regular Expression (PCRE) Subpattern Recursive Reference DoS
11841| [40751] Perl-Compatible Regular Expression (PCRE) Subpattern Unlimited Repeat DoS
11842| [40527] Seagull PHP Framework optimizer.php files Parameter Traversal Arbitrary File Access
11843| [40409] Perl Regular Expression Engine (regcomp.c) Polymorphic opcode Support UTF Regexp Handling Remote Overflow
11844| [40353] IBM Tivoli Storage Manager (TSM) Express Backup Server service (dsmsvc.exe) Packet Handling Remote Overflow
11845| [40286] Oracle E-Business Suite Applications Framework Unspecified Remote Information Disclosure
11846| [39970] Oracle Application Express wwv_flow_security.check_db_password Function SQL Injection
11847| [39925] Oracle Database Rules Manager Expression Filter RLMGR_TRUNCATE_MAINT Trigger Race Condition
11848| [39145] aurora framework db_mysql.lib pack_var() value Parameter SQL Injection
11849| [39118] Microsoft IE Object setExpression Function Memory Corruption
11850| [38943] PHP Lite Calendar Express subscribe.php cid Parameter SQL Injection
11851| [38942] PHP Lite Calendar Express auth.php cid Parameter SQL Injection
11852| [38941] PHP Lite Calendar Express login.php cid Parameter SQL Injection
11853| [38905] Django Internationalization Framework USE_I18N Option Multiple HTTP Request Remote DoS
11854| [38600] epesi framework Gallery Image Unrestricted File Upload
11855| [38495] Microsoft IE Outlook Express Address Book Activex DoS
11856| [38486] Microsoft Expression Media IVC File Cleartext Catalog Password Disclosure
11857| [38418] PHP Object Framework dbmodules/DB_adodb.class.php PHPOF_INCLUDE_PATH Parameter Remote File Inclusion
11858| [38335] EasyMail Objects EasyMailSMTPObj ActiveX (emsmtp.dll) SubmitToExpress Method Arbitrary Code Execution
11859| [38154] phpBasic basicFramework includes.php root Parameter Remote File Inclusion
11860| [37779] Broderbund Expressit 3DGreetings Player ActiveX Multiple Unspecified Overflows
11861| [37749] SAP Internet Communication Framework (BC-MID-ICF) Default Login Error Page XSS
11862| [37104] Cisco IOS Regular Expressions (Regexp) Processing DoS
11863| [36453] Apple Safari / iPhone WebKit Perl-Compatible Regular Expressions (PCRE) Multiple Overflows
11864| [36101] McAfee Multiple Products ePolicy Orchestrator CMA Framework Service Remote Overflow
11865| [35956] Microsoft .NET Framework Just In Time (JIT) Compiler Service Unspecified Arbitrary Code Execution
11866| [35955] Microsoft .NET Framework NULL Byte URL Arbitrary File Access
11867| [35954] Microsoft .NET Framework PE Loader Service Unspecified Arbitrary Code Execution
11868| [35346] Microsoft Outlook Express / Windows Mail MHTML Content Disposition Parsing Cross Domain Information Disclosure
11869| [35345] Microsoft Outlook Express / Windows Mail URL Parsing Cross Domain Information Disclosure
11870| [35284] phpTodo Unspecified Regular Expression Newline Injection
11871| [35269] Microsoft ASP .NET Framework Comment Enclosure Handling Request Weakness
11872| [35020] IBM Tivoli Monitoring Express kde.dll Remote Overflow
11873| [34870] Apple Mac OS X VideoConference Framework Crafted SIP Packet Remote Overflow
11874| [34866] Apple Mac OS X WebFoundation Framework Subdomain Cookie Information Disclosure
11875| [34656] RSPA rspa/framework/Controller_v4.php Multiple Parameter Remote File Inclusion
11876| [34655] RSPA rspa/framework/Controller_v5.php Multiple Parameter Remote File Inclusion
11877| [34180] Calendar Express search.php allwords Parameter XSS
11878| [33820] Mirapoint WebMail expression CSS XSS
11879| [33631] Cadre PHP Framework fw/class.Quick_Config_Browser.php GLOBALS[config][framework_path] Parameter Remote File Inclusion
11880| [33320] OpenSER parse_config parse_expression Function Overflow
11881| [32620] Sun iPlanet Messaging Server Expression CSS XSS
11882| [32399] NeoTrace Express/Pro NeoTraceExplorer.NeoTraceLoader ActiveX TraceTarget Method Overflow
11883| [31615] Yana Framework Guestbook Unspecified Authorization Bypass
11884| [31503] Oracle Application Express Authenticated Unspecified Remote Information Disclosure
11885| [31502] Oracle Application Express Authenticated Unspecified Issue (APEX34)
11886| [31501] Oracle Application Express Unauthenticated Complex Unspecified Issue (APEX33)
11887| [31500] Oracle Application Express Unauthenticated Complex Unspecified Issue (APEX32)
11888| [31499] Oracle Application Express Unauthenticated Complex Unspecified Issue (APEX31)
11889| [31498] Oracle Application Express Authenticated Unspecified Issue (APEX30)
11890| [31497] Oracle Application Express Authenticated Unspecified Issue (APEX29)
11891| [31496] Oracle Application Express Unauthenticated Unspecified Issue (APEX28)
11892| [31495] Oracle Application Express Unauthenticated Unspecified Issue (APEX27)
11893| [31494] Oracle Application Express Unauthenticated Unspecified Issue (APEX26)
11894| [31493] Oracle Application Express Unspecified Unauthenticated Remote Partial DoS
11895| [31492] Oracle Application Express Unauthenticated Unspecified Issue (APEX24)
11896| [31491] Oracle Application Express Unauthenticated Unspecified Issue (APEX23)
11897| [31490] Oracle Application Express Unauthenticated Unspecified Issue (APEX22)
11898| [31489] Oracle Application Express Unauthenticated Unspecified Issue (APEX21)
11899| [31488] Oracle Application Express Unauthenticated Unspecified Issue (APEX20)
11900| [31487] Oracle Application Express Simple Unspecified Issue (APEX19)
11901| [31486] Oracle Application Express Simple Unspecified Issue (APEX18)
11902| [31485] Oracle Application Express Unspecified Unauthenticated Remote Complete DoS
11903| [31484] Oracle Application Express Developer SQL Workshop Unspecified Issue (APEX16)
11904| [31483] Oracle Application Express Developer SQL Workshop Unspecified Issue (APEX15)
11905| [31482] Oracle Application Express Unauthenticated Complex Unspecified Issue (APEX14)
11906| [31481] Oracle Application Express Unauthenticated Complex Unspecified Issue (APEX13)
11907| [31480] Oracle Application Express Unauthenticated Complex Unspecified Issue (APEX12)
11908| [31479] Oracle Application Express synonym Creation Unspecified Authenticated Issue
11909| [31478] Oracle Application Express htmldb_plsql_job Unspecified Authenticated Issue
11910| [31477] Oracle Application Express Unauthenticated Simple Unspecified Issue (APEX09)
11911| [31476] Oracle Application Express Unauthenticated Simple Unspecified Issue (APEX08)
11912| [31475] Oracle Application Express Unauthenticated Simple Unspecified Issue (APEX07)
11913| [31474] Oracle Application Express Unauthenticated Simple Unspecified Issue (APEX06)
11914| [31473] Oracle Application Express Unauthenticated Simple Unspecified Issue (APEX05)
11915| [31472] Oracle Application Express Unauthenticated Complex Unspecified Issue (APEX04)
11916| [31471] Oracle Application Express Unauthenticated Complex Unspecified Issue (APEX03)
11917| [31470] Oracle Application Express Unauthenticated Complex Unspecified Issue (APEX02)
11918| [31469] Oracle Application Express Unauthenticated Simple Unspecified Issue (APEX01)
11919| [31416] Oracle E-Business Suite Applications Framework HTTP Unspecified Issue
11920| [31218] Zend Framework Preview testRedirections.php XSS
11921| [30821] Microsoft Outlook Express Windows Address Book Contact Record Code Execution
11922| [30731] Apple Mac OS X Security Framework Secure Transport Cipher Negotiation Weakness
11923| [30730] Apple Mac OS X Security Framework Crafted X.509 Certificate Handling Remote DoS
11924| [30729] Apple Mac OS X Security Framework Online Certificate Status Protocol (OCSP) Revoked Certificate Weakness
11925| [30728] Apple Mac OS X Security Framework Certificate Revocation List (CRL) Search Weakness
11926| [30425] SiteXpress E-Commerce System dept.asp id Parameter SQL Injection
11927| [30151] Sun Java System Messenger Express errorHTML Function XSS
11928| [29431] Microsoft .NET Framework AutoPostBack Property Unspecified XSS
11929| [28458] IBM Tivoli Lightweight Client Framework HTTP http_disable Default Setting Weakness
11930| [27760] Cisco CallManager Express SIP Message User Enumeration
11931| [27153] Microsoft .NET Framework Crafted Request Access Restriction Bypass
11932| [26836] Microsoft IE OutlookExpress.AddressBook COM Object NULL Dereference
11933| [26711] Docebo CMS lib.php GLOBALS[where_framework] Parameter Remote File Inclusion
11934| [26710] Docebo CMS body.php GLOBALS[where_framework] Parameter Remote File Inclusion
11935| [26708] Docebo CMS content_class.php GLOBALS[where_framework] Parameter Remote File Inclusion
11936| [26707] Docebo CMS news_class.php GLOBALS[where_framework] Parameter Remote File Inclusion
11937| [26640] PHP Lite Calendar Express month.php Multiple Parameter SQL Injection
11938| [26002] BlueShoes Framework websearchengine/Bs_Wse_Profile.class.php APP[path][plugins] Parameter Remote File Inclusion
11939| [26001] BlueShoes Framework mailinglist/Bs_Ml_User.class.php GLOBALS[APP][path][core] Parameter Remote File Inclusion
11940| [26000] BlueShoes Framework imagearchive/Bs_ImageArchive.class.php?APP[path][core] Parameter Remote File Inclusion
11941| [25999] BlueShoes Framework filemanager/viewer.php?APP[path][core] Parameter Remote File Inclusion
11942| [25998] BlueShoes Framework filemanager/file.php?APP[path][core] Parameter Remote File Inclusion
11943| [25997] BlueShoes Framework filebrowser/fileBrowserInner.php?APP[path][core] Parameter Remote File Inclusion
11944| [25996] BlueShoes Framework faq/Bs_Faq.class.php?APP[path][applications] Parameter Remote File Inclusion
11945| [25613] FileProtection Express Crafted Cookie Authentication Bypass
11946| [25165] Cisco Unity Express Arbitrary User Expired Password Modification
11947| [24830] Oracle Enterprise Manager CORE: Reporting Framework Unspecified HTTP Information Disclosure
11948| [24829] Oracle Enterprise Manager CORE: Reporting Framework Unspecified HTTP Issue
11949| [24661] Mozilla Multiple Products Javascript Regular Expression Parsing Overflow
11950| [24519] Microsoft Outlook Express Windows Address Book (.wab) Processing Overflow
11951| [24208] Microsoft .NET Framework ILDASM Overflow
11952| [24207] Microsoft .NET Framework ILASM .il File Processing Overflow
11953| [24161] Calendar Express search.php Multiple Parameter XSS
11954| [23675] enTrac ExpressPay SLE4442 Chip Card Authentication Bypass
11955| [22724] ExpressionEngine index.php $_SERVER['HTTP_REFERER'] XSS
11956| [22682] Rockliffe MailSite Express Cookie Plaintext Password Storage
11957| [22606] Oracle E-Business Suite/Applications Applications Framework HTTP Unspecified Authenticated Issue
11958| [21915] Adaptive Website Framework (AWF) Unspecified Script mode Variable Path Disclosure
11959| [21914] Adaptive Website Framework (AWF) Multiple Templates page Parameter XSS
11960| [21607] Horde Framework CSV Import Multiple Field Arbitrary Script Execution
11961| [21606] Horde Framework Multiple Field XSS
11962| [21405] PHP Lite Calendar Express year.php Multiple Parameter SQL Injection
11963| [21404] PHP Lite Calendar Express month.php Multiple Parameter SQL Injection
11964| [21403] PHP Lite Calendar Express week.php Multiple Parameter SQL Injection
11965| [21402] PHP Lite Calendar Express day.php Multiple Parameter SQL Injection
11966| [21341] Omnistar KBase Express category.php id Parameter SQL Injection
11967| [21340] Omnistar KBase Express search.php search Parameter SQL Injection
11968| [20490] Rockliffe MailSite Express WebMail AttachPath Arbitrary Attachment Access
11969| [20489] Rockliffe MailSite Express WebMail File Upload Arbitrary Command Execution
11970| [20488] Rockliffe MailSite Express WebMail Email Message Body XSS
11971| [20448] Sun Java System Communications Express Remote Configuration File Disclosure
11972| [20083] Hitachi Cosminexus Portal Framework Cached Content Manipulation
11973| [20064] Rockliffe MailSite Express Attachment Arbitrary File Upload
11974| [19654] mwcollect Perl-Compatible Regular Expression (PCRE) Usage Unspecified DoS
11975| [19200] Express-Web Content Management System default.asp email Parameter XSS
11976| [19199] Express-Web Content Management System login.asp referer XSS
11977| [18906] Perl-Compatible Regular Expression (PCRE) Quantifier Value Processing Overflow
11978| [18780] Apple Mac OS X Server CoreFoundation Framework Command Line Overflow
11979| [18779] Apple Mac OS X CoreFoundation Framework Gregorian Date Processing Algorithmic Complexity DoS
11980| [18638] PHP Lite Calendar Express search.php allwords Parameter XSS
11981| [18495] Metasploit Framework msfweb Defanged Mode Remote Bypass
11982| [18241] Microsoft Outlook Express begin Keyword Message Handling DoS
11983| [18019] Oracle Express Server Unauthenticated Trivial Remote DoS
11984| [17778] IBM Tivoli Management Framework Endpoint lcfd Process Connection Saturation DoS
11985| [17606] Adobe Reader/Acrobat for Mac OS Updater Safari Frameworks Privilege Escalation
11986| [17472] mwcollect HoD Bind Crafted Perl-Compatible Regular Expression (PCRE) Request DoS
11987| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
11988| [16077] Apple Mac OS X Foundation Framework Environment Variable Overflow
11989| [16014] IBM Web Traffic Express Caching Proxy Server HTTP GET Request XSS
11990| [13884] Hursley Software Laboratories Consumer Transaction Framework Long HTTP Request DoS
11991| [13550] Celtech ExpressFS FTP Server Long USER Command Overflow
11992| [12864] Apple AirPort Express/Extreme WDS UDP DoS
11993| [11957] Microsoft Outlook Express Troubleshooting Feature SMTP Auth Credential Disclosure
11994| [11956] Microsoft Outlook/Express Message body NUL Character DoS
11995| [11954] Microsoft Outlook Express .dbx Deleted E-mail Persistence
11996| [11953] Microsoft Outlook Express A HREF Link Overflow DoS
11997| [11952] Microsoft Outlook Express S/MIME CA Certificate Spoofing
11998| [11950] Microsoft Outlook Express MIME Header Manipulation File Extension Spoofing Weakness
11999| [11948] Microsoft IE/Outlook Express IFRAME Tag Parsing Remote DoS
12000| [11942] Microsoft Outlook Express Email Forward Blocked Attachment Access
12001| [11941] Microsoft Outlook Express HTML Frame base64 Attachment Security Bypass
12002| [11938] Microsoft Outlook Express Attachment Filename Overflow
12003| [11422] Microsoft Outlook Express S/MIME Parsing Routine Remote Overflow
12004| [11419] Microsoft Outlook Express Header Carriage Return Filter Bypass
12005| [11418] Microsoft Outlook Express text/plain MIME Content Embedded SCRIPT Tag Command Execution
12006| [11417] Microsoft Outlook/Express VCard Handler Remote Overflow
12007| [11416] Microsoft Outlook/Express Blank Header DoS
12008| [11415] Microsoft Outlook Express Forced POP3 Command Mode DoS
12009| [11164] Horde Application Framework Help Window Multiple Parameter XSS
12010| [10865] Intel Express 500 Series Switches Malformed ICMP DoS
12011| [10765] Express-Web Content Management System default.asp Multiple Parameter XSS
12012| [9904] Squid Internet Object Cache Regular Expression ACL Bypass
12013| [9825] Disney Go Express Search HTTP Information Disclosure
12014| [9739] Cosminexus Portal Framework Cached Content Modification
12015| [9225] IBM Web Traffic Express Caching Proxy Server Location: Header XSS
12016| [9224] Cute PHP Library Unspecified Regular Expressions Issue
12017| [9167] Microsoft Outlook Express BCC: Recipient Information Disclosure
12018| [8662] eshare Expressions Unspecified Traversal Arbitrary File Access
12019| [7902] Microsoft IE / Outlook Express Active Scripting Arbitrary E-mail Message Access
12020| [7793] Microsoft Outlook Express Header Validation DoS
12021| [7096] Microsoft Outlook Express Mac OS Auto HTML Download
12022| [7055] Microsoft Outlook Express for Mac OS E-mail Long Line DoS
12023| [6768] IBM Tivoli Management Framework ManagedNode Web Server GET Request Remote Overflow
12024| [6767] IBM Tivoli Management Framework Endpoint Web Server GET Request Remote Overflow
12025| [6121] Microsoft Outlook Express BASE HREF Web Content Loading
12026| [5795] HP Web JetAdmin Framework:CheckPassword Authentication Bypass
12027| [5792] HP Web JetAdmin framework.ini Password Disclosure
12028| [5791] HP Web JetAdmin framework.ini Path Disclosure
12029| [5243] Ipswitch IMail Express Web Messaging Buffer Overflow
12030| [2213] Java Media Framework Unsigned Applet Privilege Escalation
12031| [2048] PCexpress BBS Backdoor Password
12032| [1528] Intel Express Switch 500 Series Malformed IP Packet Remote DoS
12033| [1475] Microsoft Outlook/Express Cache Bypass
12034| [1467] Microsoft Outlook/Express GMT Field Buffer Overflow
12035| [1414] BEA WebLogic Server/Express file Servlet Source Code Disclosure
12036| [1344] Intel Express 8100 ISDN Router Fragmented ICMP Parsing Remote DoS
12037| [806] Cisco IOS Cisco Express Forwarding (CEF) Previous Packet Information Disclosure
12038|_
12039445/tcp filtered microsoft-ds
120403306/tcp open mysql MySQL 5.5.62-0ubuntu0.14.04.1
12041| vulscan: VulDB - https://vuldb.com:
12042| [121800] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 Encryption weak encryption
12043| [121799] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 Options unknown vulnerability
12044| [121796] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 MyISAM information disclosure
12045| [121794] Oracle MySQL Server up to 5.5.60 Privileges denial of service
12046| [121785] Oracle MySQL Client up to 5.5.60/5.6.40/5.7.22/8.0.11 Client Programs denial of service
12047| [121777] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 Client mysqldump denial of service
12048| [125564] Oracle MySQL Server up to 5.5.61/5.6.41/5.7.23/8.0.12 Storage Engines denial of service
12049| [125543] Oracle MySQL Server up to 5.5.61/5.6.41/5.7.23/8.0.12 Parser denial of service
12050| [125535] Oracle MySQL Server up to 5.5.61/5.6.41/5.7.23/8.0.12 InnoDB unknown vulnerability
12051|
12052| MITRE CVE - https://cve.mitre.org:
12053| [CVE-2010-3839] MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements.
12054| [CVE-2010-3838] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function's result is "processed using an intermediate temporary table."
12055| [CVE-2010-3837] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.
12056| [CVE-2010-3836] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers.
12057| [CVE-2010-3835] MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table.
12058| [CVE-2010-3834] Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments."
12059| [CVE-2010-3833] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a "CREATE TABLE ... SELECT."
12060|
12061| SecurityFocus - https://www.securityfocus.com/bid/:
12062| [52154] RETIRED: MySQL 5.5.20 Unspecified Remote Code Execution Vulnerability
12063|
12064| IBM X-Force - https://exchange.xforce.ibmcloud.com:
12065| [85724] Oracle MySQL Server XA Transactions denial of service
12066| [85723] Oracle MySQL Server Server Replication denial of service
12067| [85722] Oracle MySQL Server InnoDB denial of service
12068| [85721] Oracle MySQL Server Server Privileges unspecified
12069| [85720] Oracle MySQL Server Server Partition denial of service
12070| [85719] Oracle MySQL Server Server Parser denial of service
12071| [85718] Oracle MySQL Server Server Options denial of service
12072| [85717] Oracle MySQL Server Server Options denial of service
12073| [85716] Oracle MySQL Server Server Optimizer denial of service
12074| [85715] Oracle MySQL Server Server Optimizer denial of service
12075| [85714] Oracle MySQL Server Prepared Statements denial of service
12076| [85713] Oracle MySQL Server InnoDB denial of service
12077| [85712] Oracle MySQL Server Full Text Search denial of service
12078| [85711] Oracle MySQL Server Data Manipulation Language denial of service
12079| [85710] Oracle MySQL Server Data Manipulation Language denial of service
12080| [85709] Oracle MySQL Server Audit Log unspecified
12081| [85708] Oracle MySQL Server MemCached unspecified
12082| [84846] Debian mysql-server package information disclosure
12083| [84375] Wireshark MySQL dissector denial of service
12084| [83554] Oracle MySQL Server Server Partition denial of service
12085| [83553] Oracle MySQL Server Server Locking denial of service
12086| [83552] Oracle MySQL Server Server Install unspecified
12087| [83551] Oracle MySQL Server Server Types denial of service
12088| [83550] Oracle MySQL Server Server Privileges unspecified
12089| [83549] Oracle MySQL Server InnoDB denial of service
12090| [83548] Oracle MySQL Server InnoDB denial of service
12091| [83547] Oracle MySQL Server Data Manipulation Language denial of service
12092| [83546] Oracle MySQL Server Stored Procedure denial of service
12093| [83545] Oracle MySQL Server Server Replication denial of service
12094| [83544] Oracle MySQL Server Server Partition denial of service
12095| [83543] Oracle MySQL Server Server Optimizer denial of service
12096| [83542] Oracle MySQL Server InnoDB denial of service
12097| [83541] Oracle MySQL Server Information Schema denial of service
12098| [83540] Oracle MySQL Server Data Manipulation Language denial of service
12099| [83539] Oracle MySQL Server Data Manipulation Language denial of service
12100| [83538] Oracle MySQL Server Server Optimizer unspecified
12101| [83537] Oracle MySQL Server MemCached denial of service
12102| [83536] Oracle MySQL Server Server Privileges unspecified
12103| [83535] Oracle MySQL Server Server Privileges unspecified
12104| [83534] Oracle MySQL Server Server unspecified
12105| [83533] Oracle MySQL Server Information Schema unspecified
12106| [83532] Oracle MySQL Server Server Locking unspecified
12107| [83531] Oracle MySQL Server Data Manipulation Language denial of service
12108| [83388] MySQL administrative login attempt detected
12109| [82963] Mambo MySQL database information disclosure
12110| [82946] Oracle MySQL buffer overflow
12111| [82945] Oracle MySQL buffer overflow
12112| [82895] Oracle MySQL and MariaDB geometry queries denial of service
12113| [81577] MySQL2JSON extension for TYPO3 unspecified SQL injection
12114| [81325] Oracle MySQL Server Server Privileges denial of service
12115| [81324] Oracle MySQL Server Server Partition denial of service
12116| [81323] Oracle MySQL Server Server Optimizer denial of service
12117| [81322] Oracle MySQL Server Server Optimizer denial of service
12118| [81321] Oracle MySQL Server Server denial of service
12119| [81320] Oracle MySQL Server MyISAM denial of service
12120| [81319] Oracle MySQL Server InnoDB denial of service
12121| [81318] Oracle MySQL Server InnoDB denial of service
12122| [81317] Oracle MySQL Server Server Locking denial of service
12123| [81316] Oracle MySQL Server Server denial of service
12124| [81315] Oracle MySQL Server Server Replication unspecified
12125| [81314] Oracle MySQL Server Server Replication unspecified
12126| [81313] Oracle MySQL Server Stored Procedure denial of service
12127| [81312] Oracle MySQL Server Server Optimizer denial of service
12128| [81311] Oracle MySQL Server Information Schema denial of service
12129| [81310] Oracle MySQL Server GIS Extension denial of service
12130| [80790] Oracle MySQL yaSSL buffer overflow
12131| [80553] Oracle MySQL and MariaDB salt security bypass
12132| [80443] Oracle MySQL Server unspecified code execution
12133| [80442] Oracle MySQL Server acl_get() buffer overflow
12134| [80440] Oracle MySQL Server table buffer overflow
12135| [80435] Oracle MySQL Server database privilege escalation
12136| [80434] Oracle MySQL Server COM_BINLOG_DUMP denial of service
12137| [80433] Oracle MySQL Server Stuxnet privilege escalation
12138| [80432] Oracle MySQL Server authentication information disclosure
12139| [79394] Oracle MySQL Server Server Installation information disclosure
12140| [79393] Oracle MySQL Server Server Replication denial of service
12141| [79392] Oracle MySQL Server Server Full Text Search denial of service
12142| [79391] Oracle MySQL Server Server denial of service
12143| [79390] Oracle MySQL Server Client information disclosure
12144| [79389] Oracle MySQL Server Server Optimizer denial of service
12145| [79388] Oracle MySQL Server Server Optimizer denial of service
12146| [79387] Oracle MySQL Server Server denial of service
12147| [79386] Oracle MySQL Server InnoDB Plugin denial of service
12148| [79385] Oracle MySQL Server InnoDB denial of service
12149| [79384] Oracle MySQL Server Client unspecified
12150| [79383] Oracle MySQL Server Server denial of service
12151| [79382] Oracle MySQL Server Protocol unspecified
12152| [79381] Oracle MySQL Server Information Schema unspecified
12153| [78954] SilverStripe MySQLDatabase.php information disclosure
12154| [78948] MySQL MyISAM table symlink
12155| [77865] MySQL unknown vuln
12156| [77864] MySQL sort order denial of service
12157| [77768] MySQLDumper refresh_dblist.php information disclosure
12158| [77177] MySQL Squid Access Report unspecified cross-site scripting
12159| [77065] Oracle MySQL Server Optimizer denial of service
12160| [77064] Oracle MySQL Server Optimizer denial of service
12161| [77063] Oracle MySQL Server denial of service
12162| [77062] Oracle MySQL InnoDB denial of service
12163| [77061] Oracle MySQL GIS Extension denial of service
12164| [77060] Oracle MySQL Server Optimizer denial of service
12165| [76189] MySQL unspecified error
12166| [76188] MySQL attempts security bypass
12167| [75287] MySQLDumper restore.php information disclosure
12168| [75286] MySQLDumper filemanagement.php directory traversal
12169| [75285] MySQLDumper main.php cross-site request forgery
12170| [75284] MySQLDumper install.php cross-site scripting
12171| [75283] MySQLDumper install.php file include
12172| [75282] MySQLDumper menu.php code execution
12173| [75022] Oracle MySQL Server Server Optimizer denial of service
12174| [75021] Oracle MySQL Server Server Optimizer denial of service
12175| [75020] Oracle MySQL Server Server DML denial of service
12176| [75019] Oracle MySQL Server Partition denial of service
12177| [75018] Oracle MySQL Server MyISAM denial of service
12178| [75017] Oracle MySQL Server Server Optimizer denial of service
12179| [74672] Oracle MySQL Server multiple unspecified
12180| [73092] MySQL unspecified code execution
12181| [72540] Oracle MySQL Server denial of service
12182| [72539] Oracle MySQL Server unspecified
12183| [72538] Oracle MySQL Server denial of service
12184| [72537] Oracle MySQL Server denial of service
12185| [72536] Oracle MySQL Server unspecified
12186| [72535] Oracle MySQL Server denial of service
12187| [72534] Oracle MySQL Server denial of service
12188| [72533] Oracle MySQL Server denial of service
12189| [72532] Oracle MySQL Server denial of service
12190| [72531] Oracle MySQL Server denial of service
12191| [72530] Oracle MySQL Server denial of service
12192| [72529] Oracle MySQL Server denial of service
12193| [72528] Oracle MySQL Server denial of service
12194| [72527] Oracle MySQL Server denial of service
12195| [72526] Oracle MySQL Server denial of service
12196| [72525] Oracle MySQL Server information disclosure
12197| [72524] Oracle MySQL Server denial of service
12198| [72523] Oracle MySQL Server denial of service
12199| [72522] Oracle MySQL Server denial of service
12200| [72521] Oracle MySQL Server denial of service
12201| [72520] Oracle MySQL Server denial of service
12202| [72519] Oracle MySQL Server denial of service
12203| [72518] Oracle MySQL Server unspecified
12204| [72517] Oracle MySQL Server unspecified
12205| [72516] Oracle MySQL Server unspecified
12206| [72515] Oracle MySQL Server denial of service
12207| [72514] Oracle MySQL Server unspecified
12208| [71965] MySQL port denial of service
12209| [70680] DBD::mysqlPP unspecified SQL injection
12210| [70370] TaskFreak! multi-mysql unspecified path disclosure
12211| [68799] mod_authnz_external module for Apache mysql-auth.pl SQL injection
12212| [68294] MySQLDriverCS statement.cs sql injection
12213| [68175] Prosody MySQL denial of service
12214| [67539] Zend Framework MySQL PDO security bypass
12215| [67254] DirectAdmin MySQL information disclosure
12216| [66567] Xoops mysql.sql information disclosure
12217| [65871] PyWebDAV MySQLAuthHandler class SQL injection
12218| [65543] MySQL Select Arbitrary data into a File
12219| [65529] MySQL Eventum full_name field cross-site scripting
12220| [65380] Oracle MySQL Eventum forgot_password.php cross-site scripting
12221| [65379] Oracle MySQL Eventum list.php cross-site scripting
12222| [65266] Accellion File Transfer Appliance MySQL default password
12223| [64878] MySQL Geometry denial of service
12224| [64877] MySQL EXPLAIN EXTENDED denial of service
12225| [64876] MySQL prepared statement denial of service
12226| [64845] MySQL extreme-value denial of service
12227| [64844] MySQL Gis_line_string::init_from_wkb denial of service
12228| [64843] MySQL user-variable denial of service
12229| [64842] MySQL view preparation denial of service
12230| [64841] MySQL prepared statement denial of service
12231| [64840] MySQL LONGBLOB denial of service
12232| [64839] MySQL invocations denial of service
12233| [64838] MySQL Gis_line_string::init_from_wkb denial of service
12234| [64689] MySQL dict0crea.c denial of service
12235| [64688] MySQL SET column denial of service
12236| [64687] MySQL BINLOG command denial of service
12237| [64686] MySQL InnoDB denial of service
12238| [64685] MySQL HANDLER interface denial of service
12239| [64684] MySQL Item_singlerow_subselect::store denial of service
12240| [64683] MySQL OK packet denial of service
12241| [63518] MySQL Query Browser GUI Tools information disclosure
12242| [63517] MySQL Administrator GUI Tools information disclosure
12243| [62272] MySQL PolyFromWKB() denial of service
12244| [62269] MySQL LIKE predicates denial of service
12245| [62268] MySQL joins denial of service
12246| [62267] MySQL GREATEST() or LEAST() denial of service
12247| [62266] MySQL GROUP_CONCAT() denial of service
12248| [62265] MySQL expression values denial of service
12249| [62264] MySQL temporary table denial of service
12250| [62263] MySQL LEAST() or GREATEST() denial of service
12251| [62262] MySQL replication privilege escalation
12252| [61739] MySQL WITH ROLLUP denial of service
12253| [61343] MySQL LOAD DATA INFILE denial of service
12254| [61342] MySQL EXPLAIN denial of service
12255| [61341] MySQL HANDLER denial of service
12256| [61340] MySQL BINLOG denial of service
12257| [61339] MySQL IN() or CASE denial of service
12258| [61338] MySQL SET denial of service
12259| [61337] MySQL DDL denial of service
12260| [61318] PHP mysqlnd_wireprotocol.c buffer overflow
12261| [61317] PHP php_mysqlnd_read_error_from_line buffer overflow
12262| [61316] PHP php_mysqlnd_auth_write buffer overflow
12263| [61274] MySQL TEMPORARY InnoDB denial of service
12264| [59905] MySQL ALTER DATABASE denial of service
12265| [59841] CMySQLite updateUser.php cross-site request forgery
12266| [59112] MySQL Enterprise Monitor unspecified cross-site request forgery
12267| [59075] PHP php_mysqlnd_auth_write() buffer overflow
12268| [59074] PHP php_mysqlnd_read_error_from_line() buffer overflow
12269| [59073] PHP php_mysqlnd_rset_header_read() buffer overflow
12270| [59072] PHP php_mysqlnd_ok_read() information disclosure
12271| [58842] MySQL DROP TABLE file deletion
12272| [58676] Template Shares MySQL information disclosure
12273| [58531] MySQL COM_FIELD_LIST buffer overflow
12274| [58530] MySQL packet denial of service
12275| [58529] MySQL COM_FIELD_LIST security bypass
12276| [58311] ClanSphere the captcha generator and MySQL driver SQL injection
12277| [57925] MySQL UNINSTALL PLUGIN security bypass
12278| [57006] Quicksilver Forums mysqldump information disclosure
12279| [56800] Employee Timeclock Software mysqldump information disclosure
12280| [56200] Flex MySQL Connector ActionScript SQL injection
12281| [55877] MySQL yaSSL buffer overflow
12282| [55622] kiddog_mysqldumper extension for TYPO3 information disclosure
12283| [55416] MySQL unspecified buffer overflow
12284| [55382] Ublog UblogMySQL.sql information disclosure
12285| [55251] PHP-MySQL-Quiz editquiz.php SQL injection
12286| [54597] MySQL sql_table.cc security bypass
12287| [54596] MySQL mysqld denial of service
12288| [54365] MySQL OpenSSL security bypass
12289| [54364] MySQL MyISAM table symlink
12290| [53950] The mysql-ocaml mysql_real_escape_string weak security
12291| [52978] Zmanda Recovery Manager for MySQL mysqlhotcopy privilege escalation
12292| [52977] Zmanda Recovery Manager for MySQL socket-server.pl command execution
12293| [52660] iScouter PHP Web Portal MySQL Password Retrieval
12294| [52220] aa33code mysql.inc information disclosure
12295| [52122] MySQL Connector/J unicode SQL injection
12296| [51614] MySQL dispatch_command() denial of service
12297| [51406] MySQL Connector/NET SSL spoofing
12298| [49202] MySQL UDF command execution
12299| [49050] MySQL XPath denial of service
12300| [48919] Cisco Application Networking Manager MySQL default account password
12301| [48163] libapache2-mod-auth-mysql module for Debian multibyte encoding SQL injection
12302| [47544] MySQL Calendar index.php SQL injection
12303| [47476] MySQL Calendar index.php nodstrumCalendarV2 security bypass
12304| [45649] MySQL MyISAM symlink security bypass
12305| [45648] MySQL MyISAM symlinks security bypass
12306| [45607] MySQL Quick Admin actions.php file include
12307| [45606] MySQL Quick Admin index.php file include
12308| [45590] MySQL command-line client cross-site scripting
12309| [45436] PromoteWeb MySQL go.php SQL injection
12310| [45042] MySQL empty bit-string literal denial of service
12311| [44662] mysql-lists unspecified cross-site scripting
12312| [42267] MySQL MyISAM security bypass
12313| [42211] GEDCOM_to_MySQL2 index.php, info.php and prenom.php cross-site scripting
12314| [42014] miniBB setup_mysql.php and setup_options.php SQL injection
12315| [40920] MySQL sql_select.cc denial of service
12316| [40734] MySQL Server BINLOG privilege escalation
12317| [40350] MySQL password information disclosure
12318| [39415] Debian GNU/Linux libdspam7-drv-mysql cron job password disclosure
12319| [39402] PHP LOCAL INFILE and MySQL extension security bypass
12320| [38999] aurora framework db_mysql.lib SQL injection
12321| [38990] MySQL federated engine denial of service
12322| [38989] MySQL DEFINER value privilege escalation
12323| [38988] MySQL DATA DIRECTORY and INDEX DIRECTORY privilege escalation
12324| [38964] MySQL RENAME TABLE symlink
12325| [38733] ManageEngine EventLog Analyzer MySQL default password
12326| [38284] MySQL ha_innodb.cc convert_search_mode_to_innobase() denial of service
12327| [38189] MySQL default root password
12328| [37235] Asterisk-Addons cdr_addon_mysql module SQL injection
12329| [37099] RHSA update for MySQL case sensistive database name privilege escalation not installed
12330| [36555] PHP MySQL extension multiple functions security bypass
12331| [35960] MySQL view privilege escalation
12332| [35959] MySQL CREATE TABLE LIKE information disclosure
12333| [35958] MySQL connection protocol denial of service
12334| [35291] MySQLDumper main.php security bypass
12335| [34811] MySQL udf_init and mysql_create_function command execution
12336| [34809] MySQL mysql_update privilege escalation
12337| [34349] MySQL ALTER information disclosure
12338| [34348] MySQL mysql_change_db privilege escalation
12339| [34347] MySQL RENAME TABLE weak security
12340| [34232] MySQL IF clause denial of service
12341| [33388] Advanced Website Creator (AWC) mysql_escape_string SQL injection
12342| [33285] Eve-Nuke mysql.php file include
12343| [32957] MySQL Commander dbopen.php file include
12344| [32933] cPanel load_language.php and mysqlconfig.php file include
12345| [32911] MySQL filesort function denial of service
12346| [32462] cPanel passwdmysql cross-site scripting
12347| [32288] RHSA-2006:0544 updates for mysql not installed
12348| [32266] MySQLNewsEngine affichearticles.php3 file include
12349| [31244] The Address Book MySQL export.php password information disclosure
12350| [31037] Php/Mysql Site Builder (PHPBuilder) htm2php.php directory traversal
12351| [30760] BTSaveMySql URL file disclosure
12352| [30191] StoryStream mysql.php and mysqli.php file include
12353| [30085] MySQL MS-DOS device name denial of service
12354| [30031] Agora MysqlfinderAdmin.php file include
12355| [29438] MySQLDumper mysqldumper_path/sql.php cross-site scripting
12356| [29179] paBugs class.mysql.php file include
12357| [29120] ZoomStats MySQL file include
12358| [28448] MySQL case sensitive database name privilege escalation
12359| [28442] MySQL GRANT EXECUTE privilege escalation
12360| [28387] FunkBoard admin/mysql_install.php and admin/pg_install.php unauthorized access
12361| [28202] MySQL multiupdate subselect query denial of service
12362| [28180] MySQL MERGE table security bypass
12363| [28176] PHP MySQL Banner Exchange lib.inc information disclosure
12364| [27995] Opsware Network Automation System MySQL plaintext password
12365| [27904] MySQL date_format() format string
12366| [27635] MySQL Instance Manager denial of service
12367| [27212] MySQL SELECT str_to_date denial of service
12368| [26875] MySQL ASCII escaping SQL injection
12369| [26420] Apple Mac OS X MySQL Manager blank password
12370| [26236] MySQL login packet information disclosure
12371| [26232] MySQL COM_TABLE_DUMP buffer overflow
12372| [26228] MySQL sql_parce.cc information disclosure
12373| [26042] MySQL running
12374| [25313] WoltLab Burning Board class_db_mysql.php cross-site scripting
12375| [24966] MySQL mysql_real_query logging bypass
12376| [24653] PAM-MySQL logging function denial of service
12377| [24652] PAM-MySQL authentication double free code execution
12378| [24567] PHP/MYSQL Timesheet index.php and changehrs.php SQL injection
12379| [24095] PHP ext/mysqli exception handling format string
12380| [23990] PHP mysql_connect() buffer overflow
12381| [23596] MySQL Auction search module could allow cross-site scripting
12382| [22642] RHSA-2005:334 updates for mysql not installed
12383| [21757] MySQL UDF library functions command execution
12384| [21756] MySQL LoadLibraryEx function denial of service
12385| [21738] MySQL UDF mysql_create_function function directory traversal
12386| [21737] MySQL user defined function buffer overflow
12387| [21640] MySQL Eventum multiple class SQL injection
12388| [21638] MySQL Eventum multiple scripts cross-site scripting
12389| [20984] xmysqladmin temporary file symlink
12390| [20656] MySQL mysql_install_db script symlink
12391| [20333] Plans MySQL password information disclosure
12392| [19659] MySQL CREATE TEMPORARY TABLE command creates insecure files
12393| [19658] MySQL udf_init function gain access
12394| [19576] auraCMS mysql_fetch_row function path disclosure
12395| [18922] MySQL mysqlaccess script symlink attack
12396| [18824] MySQL UDF root privileges
12397| [18464] mysql_auth unspecified vulnerability
12398| [18449] Sugar Sales plaintext MySQL password
12399| [17783] MySQL underscore allows elevated privileges
12400| [17768] MySQL MATCH ... AGAINST SQL statement denial of service
12401| [17667] MySQL UNION change denial of service
12402| [17666] MySQL ALTER TABLE RENAME bypass restriction
12403| [17493] MySQL libmysqlclient bulk inserts buffer overflow
12404| [17462] MySQLGuest AWSguest.php script cross-site scripting
12405| [17047] MySQL mysql_real_connect buffer overflow
12406| [17030] MySQL mysqlhotcopy insecure temporary file
12407| [16612] MySQL my_rnd buffer overflow
12408| [16604] MySQL check_scramble_323 function allows unauthorized access
12409| [15883] MySQL mysqld_multi script symlink attack
12410| [15617] MySQL mysqlbug script symlink attack
12411| [15417] Confixx db_mysql_loeschen2.php SQL injection
12412| [15280] Proofpoint Protection Server MySQL allows unauthorized access
12413| [13404] HP Servicecontrol Manager multiple vulnerabilities in MySQL could allow execution of code
12414| [13153] MySQL long password buffer overflow
12415| [12689] MySQL AB ODBC Driver stores ODBC passwords and usernames in plain text
12416| [12540] Teapop PostSQL and MySQL modules SQL injection
12417| [12337] MySQL mysql_real_connect function buffer overflow
12418| [11510] MySQL datadir/my.cnf modification could allow root privileges
12419| [11493] mysqlcc configuration and connection files are world writable
12420| [11340] SuckBot mod_mysql_logger denial of service
12421| [11199] MySQL mysql_change_user() double-free memory pointer denial of service
12422| [10850] MySQL libmysql client read_one_row buffer overflow
12423| [10849] MySQL libmysql client read_rows buffer overflow
12424| [10848] MySQL COM_CHANGE_USER password buffer overflow
12425| [10847] MySQL COM_CHANGE_USER command password authentication bypass
12426| [10846] MySQL COM_TABLE_DUMP unsigned integer denial of service
12427| [10483] Bugzilla stores passwords in plain text in the MySQL database
12428| [10455] gBook MySQL could allow administrative access
12429| [10243] MySQL my.ini "
12430| [9996] MySQL SHOW GRANTS command discloses adminstrator`s encrypted password
12431| [9909] MySQL logging disabled by default on Windows
12432| [9908] MySQL binding to the loopback adapter is disabled
12433| [9902] MySQL default root password could allow unauthorized access
12434| [8748] Cyrus SASL LDAP+MySQL patch allows user unauthorized POP access
12435| [8105] PHP MySQL client library allows an attacker to bypass safe_mode restrictions
12436| [7923] Conectiva Linux MySQL /var/log/mysql file has insecure permissions
12437| [7206] WinMySQLadmin stores MySQL password in plain text
12438| [6617] MySQL "
12439| [6419] MySQL drop database command buffer overflow
12440| [6418] MySQL libmysqlclient.so buffer overflow
12441| [5969] MySQL select buffer overflow
12442| [5447] pam_mysql authentication input
12443| [5409] MySQL authentication algorithm obtain password hash
12444| [5057] PCCS MySQL Database Admin Tool could reveal username and password
12445| [4228] MySQL unauthenticated remote access
12446| [3849] MySQL default test account could allow any user to connect to the database
12447| [1568] MySQL creates readable log files
12448|
12449| Exploit-DB - https://www.exploit-db.com:
12450| [18269] MySQL 5.5.8 - Remote Denial of Service (DOS)
12451|
12452| OpenVAS (Nessus) - http://www.openvas.org:
12453| [53251] Debian Security Advisory DSA 562-1 (mysql)
12454| [53230] Debian Security Advisory DSA 540-1 (mysql)
12455|
12456| SecurityTracker - https://www.securitytracker.com:
12457| [1028790] MySQL Multiple Bugs Let Remote Users Deny Service and Partially Access and Modify Data
12458| [1028449] MySQL Multiple Bugs Let Remote Authenticated Users Deny Service and Partially Access and Modify Data
12459| [1028004] MySQL Multiple Bugs Let Remote Authenticated Users Take Full Control or Deny Service and Let Local Users Access and Modify Data
12460| [1027829] MySQL Bug in UpdateXML() Lets Remote Authenticated Users Deny Service
12461| [1027828] MySQL Heap Overflow May Let Remote Authenticated Users Execute Arbitrary Code
12462| [1027827] MySQL Stack Overflow May Let Remote Authenticated Users Execute Arbitrary Code
12463| [1027665] MySQL Multiple Bugs Let Remote Authenticated Users Access and Modify Data and Deny Service and Local Users Access Data
12464| [1027263] MySQL Multiple Bugs Let Remote Authenticated Users Deny Service
12465| [1027143] MySQL memcmp() Comparison Error Lets Remote Users Bypass Authentication
12466| [1026934] MySQL Multiple Bugs Let Remote Users Deny Service
12467| [1026896] MySQL Unspecified Flaws Have Unspecified Impact
12468| [1026659] MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code
12469| [1026530] MySQL Multiple Bugs Let Local and Remote Users Partially Access and Modifiy Data and Partially Deny Service
12470| [1024508] MySQL Replication Flaw Lets Remote Authenticated Users Gain Elevated Privileges
12471| [1024507] MySQL Multiple Flaws Let Remote Authenticated Users Deny Service
12472| [1024360] MySQL Multiple Flaws Let Remote Authenticated Users Deny Service
12473| [1024160] MySQL ALTER DATABASE Processing Error Lets Remote Authenticated Users Deny Service
12474| [1024033] MySQL COM_FIELD_LIST Packet Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
12475| [1024032] MySQL Large Packet Processing Flaw in my_net_skip_rest() Lets Remote Users Deny Service
12476| [1024031] MySQL COM_FIELD_LIST Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges
12477| [1024004] MySQL mi_delete_table() Symlink Flaw Lets Remote Authenticated Users Delete Data and Index Files
12478| [1023402] MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code
12479| [1023220] MySQL Client Fails to Check Server Certificates in Certain Cases
12480| [1022812] MySQL Unspecified Buffer Overflow Lets Remote Users Execute Arbitrary Code
12481| [1022533] MySQL Format String Bug in dispatch_command() Lets Remote Users Deny Service
12482| [1022482] MySQL Connector/Net is Missing SSL Certificate Validation
12483| [1021786] MySQL Bug in ExtractValue()/UpdateXML() in Processing XPath Expressions Lets Remote Authenticated Users Deny Service
12484| [1021714] (Red Hat Issues Fix) mod_auth_mysql Input Validation Flaw Lets Remote Users Inject SQL Commands
12485| [1020858] MySQL Item_bin_string::Item_bin_string() Binary Value Processing Bug Lets Remote Authenticated Users Deny Service
12486| [1019995] MySQL MyISAM Options Let Local Users Overwrite Table Files
12487| [1019085] MySQL Bugs Let Remote Authenticated Users Gain Elevated Privileges and Deny Service
12488| [1019084] MySQL DATA DIRECTORY and INDEX DIRECTORY Options May Let Remote Authenticated Users Gain Elevated Privileges
12489| [1019083] MySQL BINLOG Filename Path Bug May Let Remote Authenticated Users Gain Elevated Privileges
12490| [1019060] MySQL Rename Table Bug Lets Remote Authenticated Users Modify System Table Information
12491| [1018978] MySQL convert_search_mode_to_innobase() Bug Lets Remote Authenticated Users Deny Service
12492| [1018824] Asterisk-Addons Input Validation Flaw in cdr_addon_mysql Lets Remote Users Inject SQL Commands
12493| [1018663] MySQL Table View Access Bug Lets Remote Authenticated Users Gain Elevated Privileges
12494| [1018629] MySQL Authentication Protocol Bug Lets Remote Users Deny Service
12495| [1018071] MySQL ALTER TABLE Function Lets Remote Authenticated Users Obtain Potentially Sensitive Information
12496| [1018070] MySQL SQL SECURITY INVOKER Routines Let Remote Authenticated Users Gain Elevated Privileges
12497| [1018069] MySQL Lets Remote Authenticated Users Issue the RENAME TABLE Command
12498| [1017746] MySQL Single Row Subselect Statements Let Remote Users Deny Service
12499| [1016790] MySQL Replication Error Lets Local Users Deny Service
12500| [1016710] MySQL Case-Sensitive Database Names May Let Users Access Restricted Databases
12501| [1016709] MySQL Error in Checking suid Routine Arguments May Let Users Gain Elevated Privileges
12502| [1016617] MySQL MERGE Access Control Error May Let Users Access a Restricted Table
12503| [1016566] Opsware Network Automation System Discloses MySQL Password to Local Users
12504| [1016216] MySQL Error in Parsing Multibyte Encoded Data in mysql_real_escape() Lets Remote Users Inject SQL Commands
12505| [1016077] Apple MySQL Manager Database Initialization Bug May Let Local Users Access the Database
12506| [1016017] MySQL Anonymous Login Processing May Disclose Some Memory Contents to Remote Users
12507| [1016016] MySQL COM_TABLE_DUMP Processing Lets Remote Authenticated Users Execute Arbitrary Code or Obtain Information
12508| [1015789] Woltlab Burning Board Input Validation Hole in 'class_db_mysql.php' Permits Cross-Site Scripting Attacks
12509| [1015693] MySQL Query Bug Lets Remote Users Bypass Query Logging
12510| [1015603] PAM-MySQL pam_get_item() Double Free May Let Remote Users Execute Arbitrary Code
12511| [1015485] PHP mysqli Extension Error Mode Format String Flaw May Let Users Execute Arbitrary Code
12512| [1014603] MySQL Eventum Input Validation Hole in 'class.auth.php' Permits SQL Injection and Other Input Validation Bugs Permit Cross-Site Scripting Attacks
12513| [1014172] xMySQLadmin Lets Local Users Delete Files
12514| [1013995] MySQL 'mysql_install_db' Uses Unsafe Temporary Files and May Let Local Users Gain Elevated Privilege
12515| [1013994] MySQL Non-existent '--user' Error May Allow the Database to Run With Incorrect Privileges
12516| [1013415] MySQL CREATE FUNCTION Lets Authenticated Users Invoke libc Functions to Execute Arbitrary Code
12517| [1013414] MySQL udf_init() Path Validation Flaw Lets Authenticated Users Execute Arbitrary Libraries
12518| [1013413] MySQL CREATE TEMPORARY TABLE Uses Predictable Temporary Files That May Let Users Gain Elevated Privileges
12519| [1012914] MySQL 'mysqlaccess.sh' Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
12520| [1012893] MySQL MaxDB Buffer Overflow in websql Password Parameter Lets Remote Users Execute Arbitrary Code
12521| [1012500] mysql_auth Memory Leak Has Unspecified Impact
12522| [1011741] MySQL Access Control Error in Databases With Underscore Wildcard Character May Grant Unauthorized Access
12523| [1011606] MySQL May Let Remote Authenticated Users Access Restricted Tables or Crash the System
12524| [1011408] MySQL libmysqlclient Buffer Overflow in Executing Prepared Statements Has Unspecified Impact
12525| [1011376] MySQLGuest Lack of Input Validation Lets Remote Users Conduct Cross-Site Scripting Attacks
12526| [1011008] MySQL Buffer Overflow in mysql_real_connect() May Let Remote Users Execute Arbitrary Code
12527| [1010979] MySQL 'mysqlhotcopy' Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
12528| [1010645] MySQL check_scramble_323() Zero-Length Comparison Lets Remote Users Bypass Authentication
12529| [1009784] MySQL 'mysqld_multi' Temporary File Flaw Lets Local Users Overwrite Files
12530| [1009554] MySQL 'mysqlbug' Temporary File Flaw Lets Local Users Overwrite Files
12531| [1007979] MySQL mysql_change_user() Double Free Error Lets Remote Authenticated Users Crash mysqld
12532| [1007673] MySQL acl_init() Buffer Overflow Permits Remote Authenticated Administrators to Execute Arbitrary Code
12533| [1007518] DWebPro Discloses MySQL Database Password to Local Users
12534| [1007312] MySQL World-Writable Configuration File May Let Local Users Gain Root Privileges
12535| [1006976] MySQL Buffer Overflow in 'mysql_real_connect()' Client Function May Let Remote or Local Users Execute Arbitrary Code
12536| [1005800] MySQL Overflow and Authentication Bugs May Let Remote Users Execute Code or Access Database Accounts
12537| [1005345] MySQL Buffer Overflow Lets Local Users Gain System Privileges on Windows NT
12538| [1004506] vBulletin PHP-based Forum Software Has Unspecified Security Flaw in the 'db_mysql.php' Module
12539| [1004172] PHP-Survey Script Discloses Underlying MySQL Database Username and Password to Remote Users
12540| [1003955] 3rd Party Patch for Cyrus SASL ('auxprop for mysql and ldap') Lets Remote Users Access Protected POP Mail Accounts Without Authentication
12541| [1003290] Conectiva Linux MySQL Distribution May Allow Local Users to Obtain Sensitive Information
12542| [1002993] PurePostPro Script Add-on for PureFTPd and MySQL Allows Remote Users to Execute SQL Commands on the Server
12543| [1002485] WinMySQLadmin Database Administration Tool Discloses MySQL Password to Local Users
12544| [1002324] Vpopmail Mail Server Discloses Database Password to Local Users When Installed with MySQL
12545| [1001411] phpMyAdmin Administration Tool for MySQL Allows Remote Users to Execute Commands on the Server
12546| [1001118] MySQL Database Allows Authorized Users to Modify Server Files to Deny Service or Obtain Additional Access
12547|
12548| OSVDB - http://www.osvdb.org:
12549| [95337] Oracle MySQL Server XA Transactions Subcomponent Unspecified Remote DoS
12550| [95336] Oracle MySQL Server Replication Subcomponent Unspecified Remote DoS
12551| [95335] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
12552| [95334] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue
12553| [95333] Oracle MySQL Server Partition Subcomponent Unspecified Remote DoS
12554| [95332] Oracle MySQL Server Parser Subcomponent Unspecified Remote DoS
12555| [95331] Oracle MySQL Server Options Subcomponent Unspecified Remote DoS (2013-3801)
12556| [95330] Oracle MySQL Server Options Subcomponent Unspecified Remote DoS (2013-3808)
12557| [95329] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2013-3796)
12558| [95328] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2013-3804)
12559| [95327] Oracle MySQL Server Prepared Statements Subcomponent Unspecified Remote DoS
12560| [95326] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
12561| [95325] Oracle MySQL Server Full Text Search Subcomponent Unspecified Remote DoS
12562| [95324] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-3795)
12563| [95323] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-3793)
12564| [95322] Oracle MySQL Server Audit Log Subcomponent Unspecified Remote Issue
12565| [95321] Oracle MySQL Server MemCached Subcomponent Unspecified Remote Issue
12566| [95131] AutoMySQLBackup /usr/sbin/automysqlbackup Database Name Arbitrary Code Injection
12567| [94076] Debian Linux MySQL Server mysql-server-5.5.postinst Race Condition debian.cnf Plaintext Credential Local Disclosure
12568| [93505] Wireshark MySQL Dissector (packet-mysql.c) Malformed Packet Handling Infinite Loop Remote DoS
12569| [93174] MySQL Crafted Derived Table Handling DoS
12570| [92967] MySQL2JSON (mn_mysql2json) Extension for TYPO3 Unspecified SQL Injection
12571| [92950] MySQL Running START SLAVE Statement Process Listing Plaintext Local Password Disclosure
12572| [92485] Oracle MySQL Server Partition Subcomponent Unspecified Local DoS
12573| [92484] Oracle MySQL Server Locking Subcomponent Unspecified Remote DoS (2013-1506)
12574| [92483] Oracle MySQL Server Install Subcomponent Unspecified Local Issue
12575| [92482] Oracle MySQL Server Types Subcomponent Unspecified Remote DoS
12576| [92481] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-2381)
12577| [92480] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-1566)
12578| [92479] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-1511)
12579| [92478] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1567)
12580| [92477] Oracle MySQL Server Stored Procedure Subcomponent Unspecified Remote DoS
12581| [92476] Oracle MySQL Server Replication Subcomponent Unspecified Remote DoS
12582| [92475] Oracle MySQL Server Partition Subcomponent Unspecified Remote DoS
12583| [92474] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS
12584| [92473] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-2389)
12585| [92472] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote DoS
12586| [92471] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1512)
12587| [92470] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1544)
12588| [92469] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote Issue
12589| [92468] Oracle MySQL Server MemCached Subcomponent Unspecified Remote DoS
12590| [92467] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-2375)
12591| [92466] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-1531)
12592| [92465] Oracle MySQL Server Server Subcomponent Unspecified Remote Issue
12593| [92464] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote Issue
12594| [92463] Oracle MySQL Server Locking Subcomponent Unspecified Remote Issue (2013-1521)
12595| [92462] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-2395)
12596| [91536] Oracle MySQL yaSSL Unspecified Overflow (2012-0553)
12597| [91534] Oracle MySQL yaSSL Unspecified Overflow (2013-1492)
12598| [91415] MySQL Raw Geometry Object String Conversion Remote DoS
12599| [91108] Juju mysql Charm Install Script mysql.passwd MySQL Password Plaintext Local Disclosure
12600| [89970] Site Go /site-go/admin/extra/mysql/index.php idm Parameter Traversal Arbitrary File Access
12601| [89265] Oracle MySQL Server Server Privileges Subcomponent Unspecified Remote DoS
12602| [89264] Oracle MySQL Server Server Partition Subcomponent Unspecified Remote DoS
12603| [89263] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-0578)
12604| [89262] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-1705)
12605| [89261] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-0574)
12606| [89260] Oracle MySQL Server MyISAM Subcomponent Unspecified Remote DoS
12607| [89259] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2012-0572)
12608| [89258] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-0368)
12609| [89257] Oracle MySQL Server Server Locking Subcomponent Unspecified Remote DoS
12610| [89256] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-1702)
12611| [89255] Oracle MySQL Server Server Replication Subcomponent Unspecified Remote Issue
12612| [89254] Oracle MySQL Server Server Replication Subcomponent Unspecified Local Issue
12613| [89253] Oracle MySQL Server Stored Procedure Subcomponent Unspecified Remote DoS
12614| [89252] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS
12615| [89251] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote DoS
12616| [89250] Oracle MySQL Server GIS Extension Subcomponent Unspecified Remote DoS
12617| [89042] ViciBox Server MySQL cron Service Default Credentials
12618| [88415] Oracle MySQL Server COM_CHANGE_USER Account Password Brute-Force Weakness
12619| [88118] Oracle MySQL Server FILE Privilege Database Privilege Escalation
12620| [88067] Oracle MySQL Server Authentication Error Message User Enumeration
12621| [88066] Oracle MySQL Server for Linux Access Rights Checking Routine Database Name Handling Stack Buffer Overflow
12622| [88065] Oracle MySQL Server COM_BINLOG_DUMP Invalid Data Handling DoS
12623| [88064] Oracle MySQL Server Multiple-Table DELETE Heap Buffer Overflow
12624| [87704] CodeIgniter MySQL / MySQLi Driver Database Client Multi-byte Character Set Unspecified SQL Injection
12625| [87507] Oracle MySQL Statement Logging Multiple Log Plaintext Local Password Disclosure
12626| [87501] Oracle MySQL optimizer_switch Malformed Value Processing Local DoS
12627| [87494] Oracle MySQL on Windows Field_new_decimal::store_value dbug_buff Variable Overflow DoS
12628| [87480] MySQL Malformed XML Comment Handling DoS
12629| [87466] MySQL SSL Certificate Revocation Weakness
12630| [87356] Oracle MySQL do_div_mod DIV Expression Handling Remote DoS
12631| [87355] Oracle MySQL handler::pushed_cond Table Cache Handling mysqld DoS
12632| [87354] Oracle MySQL Polygon Union / Intersection Spatial Operations DoS
12633| [86273] Oracle MySQL Server Server Installation Subcomponent Unspecified Local Information Disclosure
12634| [86272] Oracle MySQL Server Server Replication Subcomponent Unspecified Remote DoS
12635| [86271] Oracle MySQL Server Server Full Text Search Subcomponent Unspecified Remote DoS
12636| [86270] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3156)
12637| [86269] Oracle MySQL Server MySQL Client Subcomponent Unspecified Remote Information Disclosure
12638| [86268] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-3180)
12639| [86267] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-3150)
12640| [86266] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3144)
12641| [86265] Oracle MySQL Server InnoDB Plugin Subcomponent Unspecified Remote DoS
12642| [86264] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
12643| [86263] Oracle MySQL Server MySQL Client Subcomponent Unspecified Remote Issue
12644| [86262] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3177)
12645| [86261] Oracle MySQL Server Protocol Subcomponent Unspecified Remote Issue
12646| [86260] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote Code Execution
12647| [86175] Oracle MySQL on Windows Path Subversion Arbitrary DLL Injection Code Execution
12648| [85155] Icinga module/idoutils/db/scripts/create_mysqldb.sh Icinga User Database Access Restriction Bypass
12649| [84755] Oracle MySQL Sort Order Index Calculation Remote DoS
12650| [84719] MySQLDumper index.php page Parameter XSS
12651| [84680] MySQL Squid Access Report access.log File Path XSS
12652| [83980] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1689)
12653| [83979] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1734)
12654| [83978] Oracle MySQL Server Subcomponent Unspecified Remote DoS
12655| [83977] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
12656| [83976] Oracle MySQL Server GIS Extension Subcomponent Unspecified Remote DoS
12657| [83975] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1735)
12658| [83661] Oracle MySQL Unspecified Issue (59533)
12659| [82804] Oracle MySQL Authentication Protocol Token Comparison Casting Failure Password Bypass
12660| [82803] Oracle MySQL Unspecified Issue (59387)
12661| [82120] Oracle MySQL Version Specific Comment Handling Arbitrary SQL Command Execution
12662| [81897] Viscacha classes/database/mysql.inc.php Multiple Parameter SQL Injection
12663| [81616] MySQLDumper Multiple Script Direct Request Information Disclosure
12664| [81615] MySQLDumper filemanagement.php f Parameter Traversal Arbitrary File Access
12665| [81614] MySQLDumper File Upload PHP Code Execution
12666| [81613] MySQLDumper main.php Multiple Function CSRF
12667| [81612] MySQLDumper restore.php filename Parameter XSS
12668| [81611] MySQLDumper sql.php Multiple Parameter XSS
12669| [81610] MySQLDumper install.php Multiple Parameter XSS
12670| [81609] MySQLDumper install.php language Parameter Traversal Arbitrary File Access
12671| [81378] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1690)
12672| [81377] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1696)
12673| [81376] Oracle MySQL Server Server DML Component Unspecified Remote DoS
12674| [81375] Oracle MySQL Server Partition Component Unspecified Remote DoS
12675| [81374] Oracle MySQL Server MyISAM Component Unspecified Remote DoS
12676| [81373] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1703)
12677| [81059] Oracle MySQL Server Multiple Unspecified Issues
12678| [79038] Webmin Process Listing MySQL Password Local Disclosure
12679| [78919] Oracle MySQL Unspecified Pre-authentication Remote Code Execution
12680| [78710] WordPress wp-admin/setup-config.php MySQL Query Saturation Brute-Force Proxy Weakness
12681| [78708] WordPress wp-admin/setup-config.php MySQL Database Verification Code Injection Weakness
12682| [78707] WordPress wp-admin/setup-config.php MySQL Credentials Error Message Brute-Force Weakness
12683| [78394] Oracle MySQL Server Unspecified Remote DoS (2012-0493)
12684| [78393] Oracle MySQL Server Unspecified Remote DoS (2012-0492)
12685| [78392] Oracle MySQL Server Unspecified Remote DoS (2012-0117)
12686| [78391] Oracle MySQL Server Unspecified Remote DoS (2012-0112)
12687| [78390] Oracle MySQL Server Unspecified Remote DoS (2012-0495)
12688| [78389] Oracle MySQL Server Unspecified Remote DoS (2012-0491)
12689| [78388] Oracle MySQL Server Unspecified Remote DoS (2012-0490)
12690| [78387] Oracle MySQL Server Unspecified Remote DoS (2012-0489)
12691| [78386] Oracle MySQL Server Unspecified Remote DoS (2012-0488)
12692| [78385] Oracle MySQL Server Unspecified Remote DoS (2012-0487)
12693| [78384] Oracle MySQL Server Unspecified Remote DoS (2012-0486)
12694| [78383] Oracle MySQL Server Unspecified Remote DoS (2012-0485)
12695| [78382] Oracle MySQL Server Unspecified Remote DoS (2012-0120)
12696| [78381] Oracle MySQL Server Unspecified Remote DoS (2012-0119)
12697| [78380] Oracle MySQL Server Unspecified Remote DoS (2012-0115)
12698| [78379] Oracle MySQL Server Unspecified Remote DoS (2012-0102)
12699| [78378] Oracle MySQL Server Unspecified Remote DoS (2012-0101)
12700| [78377] Oracle MySQL Server Unspecified Remote DoS (2012-0087)
12701| [78376] Oracle MySQL Server Unspecified Remote DoS (2011-2262)
12702| [78375] Oracle MySQL Server Unspecified Local DoS
12703| [78374] Oracle MySQL Server Unspecified Remote Issue (2012-0075)
12704| [78373] Oracle MySQL Server Unspecified Local Issue
12705| [78372] Oracle MySQL Server Unspecified Remote Information Disclosure
12706| [78371] Oracle MySQL Server Unspecified Remote Issue (2012-0496)
12707| [78370] Oracle MySQL Server Unspecified Remote Issue (2012-0118)
12708| [78369] Oracle MySQL Server Unspecified Remote Issue (2012-0116)
12709| [78368] Oracle MySQL Server Unspecified Remote Issue (2012-0113)
12710| [78283] Oracle MySQL NULL Pointer Dereference Packet Parsing Remote DoS
12711| [77042] e107 CMS install_.php MySQL Server Name Parsing Remote PHP Code Execution
12712| [77040] DBD::mysqlPP Unspecified SQL Injection
12713| [75888] TaskFreak! multi-mysql Multiple Script Direct Request Path Disclosure
12714| [74120] Apache HTTP Server mod_authnz_external mysql/mysql-auth.pl user Field SQL Injection
12715| [73555] Prosody MySQL Value Column Invalid Data Type Handling DoS
12716| [73387] Zend Framework PDO_MySql Character Set Security Bypass
12717| [72836] Arctic Fox CMS Multiple Script Direct Request MySQL Settings Disclosure
12718| [72660] MySQL GUI Tools Administrator / Query Browser Command Line Credentials Local Disclosure
12719| [72120] DirectAdmin mysql_backups Folder MySQL Database Backup Local Disclosure
12720| [71368] Accellion File Transfer Appliance Weak MySQL root Password
12721| [70967] MySQL Eventum Admin User Creation CSRF
12722| [70966] MySQL Eventum preferences.php full_name Parameter XSS
12723| [70961] MySQL Eventum list.php Multiple Parameter XSS
12724| [70960] MySQL Eventum forgot_password.php URI XSS
12725| [70947] PyWebDAV DAVServer/mysqlauth.py get_userinfo() Multiple Parameter SQL Injection
12726| [70610] PHP MySQLi Extension set_magic_quotes_runtime Function mysqli_fetch_assoc Function Interaction Weakness
12727| [69885] SilverStripe modules/sapphire/trunk/core/model/MySQLDatabase.php showqueries Parameter SQL Command Disclosure
12728| [69395] MySQL Derived Table Grouping DoS
12729| [69394] MySQL Temporary Table Expression Re-Evaluation DoS
12730| [69393] MySQL GROUP_CONCAT() WITH ROLLUP Modifier DoS
12731| [69392] MySQL Extreme-Value Functions Mixed Arguments DoS
12732| [69391] MySQL Stored Procedures / Prepared Statements Nested Joins DoS
12733| [69390] MySQL Extreme-Value Functions Argument Parsing Type Error DoS
12734| [69389] MySQL CONVERT_TZ() Function Empty SET Column DoS
12735| [69388] MySQL InnoDB Storage Engine Table Handling Overflow
12736| [69387] MySQL LIKE Predicates Pre-Evaluation DoS
12737| [69001] MySQL PolyFromWKB() Function WKB Data Remote DoS
12738| [69000] MySQL HANDLER Interface Unspecified READ Request DoS
12739| [68997] MySQL Prepared-Statement Mode EXPLAIN DoS
12740| [68996] MySQL EXPLAIN EXTENDED Statement DoS
12741| [68995] MySQL GeometryCollection non-Geometry Value Assignment DoS
12742| [67488] phpMyAdmin libraries/dbi/mysqli.dbi.lib.php Unspecified Parameter XSS
12743| [67487] phpMyAdmin libraries/dbi/mysql.dbi.lib.php Unspecified Parameter XSS
12744| [67421] PHP Mysqlnd Extension mysqlnd_wireprotocol.c php_mysqlnd_rset_header_read Function Overflow
12745| [67420] PHP Mysqlnd Extension mysqlnd_wireprotocol.c php_mysqlnd_ok_read Function Arbitrary Memory Content Disclosure
12746| [67419] PHP Mysqlnd Extension php_mysqlnd_read_error_from_line Function Negative Buffer Length Value Overflow
12747| [67418] PHP Mysqlnd Extension php_mysqlnd_auth_write Function Multiple Overflows
12748| [67384] MySQL LOAD DATA INFILE Statement Incorrect OK Packet DoS
12749| [67383] MySQL EXPLAIN Statement Item_singlerow_subselect::store Function NULL Dereference DoS
12750| [67381] MySQL InnoDB Temporary Table Handling DoS
12751| [67380] MySQL BINLOG Statement Unspecified Argument DoS
12752| [67379] MySQL Multiple Operation NULL Argument Handling DoS
12753| [67378] MySQL Unique SET Column Join Statement Remote DoS
12754| [67377] MySQL DDL Statement Multiple Configuration Parameter DoS
12755| [66800] PHP Multiple mysqlnd_* Function Unspecified Overflow
12756| [66799] PHP mysqlnd Error Packet Handling Multiple Overflows
12757| [66731] PHP Bundled MySQL Library Unspecified Issue
12758| [66665] PHP MySQL LOAD DATA LOCAL open_basedir Bypass
12759| [65851] MySQL ALTER DATABASE #mysql50# Prefix Handling DoS
12760| [65450] phpGraphy mysql_cleanup.php include_path Parameter Remote File Inclusion
12761| [65085] MySQL Enterprise Monitor Unspecified CSRF
12762| [64843] MySQL DROP TABLE Command Symlink MyISAM Table Local Data Deletion
12763| [64588] MySQL sql/net_serv.cc my_net_skip_rest Function Large Packet Handling Remote DoS
12764| [64587] MySQL COM_FIELD_LIST Command Packet Table Name Argument Overflow
12765| [64586] MySQL COM_FIELD_LIST Command Packet Authentication Bypass
12766| [64524] Advanced Poll misc/get_admin.php mysql_host Parameter XSS
12767| [64447] Tirzen Framework (TZN) tzn_mysql.php Username Parameter SQL Injection Authentication Bypass
12768| [64320] ClanSphere MySQL Driver s_email Parameter SQL Injection
12769| [63903] MySQL sql/sql_plugin.cc mysql_uninstall_plugin Function UNINSTALL PLUGIN Command Privilege Check Weakness
12770| [63115] Quicksilver Forums mysqldump Process List Database Password Disclosure
12771| [62830] Employee Timeclock Software mysqldump Command-line Database Password Disclosure
12772| [62640] PHP mysqli_real_escape_string() Function Error Message Path Disclosure
12773| [62216] Flex MySQL Connector ActionScript SQL Query Arbitrary Code Execution
12774| [61752] kiddog_mysqldumper Extension for TYPO3 Unspecified Information Disclosure
12775| [61497] microTopic admin/mysql.php rating Parameter SQL Injection
12776| [60665] MySQL CREATE TABLE MyISAM Table mysql_unpacked_real_data_home Local Restriction Bypass
12777| [60664] MySQL sql/sql_table.cc Data Home Directory Symlink CREATE TABLE Access Restriction Bypass
12778| [60516] RADIO istek scripti estafresgaftesantusyan.inc Direct Request MySQL Database Credentials Disclosure
12779| [60489] MySQL GeomFromWKB() Function First Argument Geometry Value Handling DoS
12780| [60488] MySQL SELECT Statement WHERE Clause Sub-query DoS
12781| [60487] MySQL vio_verify_callback() Function Crafted Certificate MiTM Weakness
12782| [60356] MySql Client Library (libmysqlclient) mysql_real_connect Function Local Overflow
12783| [59907] MySQL on Windows bind-address Remote Connection Weakness
12784| [59906] MySQL on Windows Default Configuration Logging Weakness
12785| [59616] MySQL Hashed Password Weakness
12786| [59609] Suckbot mod_mysql_logger Shared Object Unspecified Remote DoS
12787| [59495] Cyrus SASL LDAP / MySQL Authentication Patch password Field SQL Injection Authentication Bypass
12788| [59062] phpMyAdmin Extension for TYPO3 MySQL Table Name Unspecified XSS
12789| [59045] phpMyAdmin Crafted MYSQL Table Name XSS
12790| [59030] mysql-ocaml for MySQL mysql_real_escape_string() Function Character Escaping Weakness
12791| [57587] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Local Privilege Escalation
12792| [57586] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Remote Shell Command Execution
12793| [56741] MySQL Connector/J Unicode w/ SJIS/Windows-31J Charset SQL Injection
12794| [56134] Virtualmin MySQL Module Execute SQL Feature Arbitrary File Access
12795| [55734] MySQL sql_parse.cc dispatch_command() Function Format String DoS
12796| [55566] MySQL Connector/NET SSL Certificate Verification Weakness
12797| [53525] MyBlog /config/mysqlconnection.inc Direct Request Information Disclosure
12798| [53524] blog+ includes/window_top.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
12799| [53523] blog+ includes/block_center_down.php row_mysql_blocks_center_down[file] Parameter Traversal Local File Inclusion
12800| [53522] blog+ includes/block_center_top.php row_mysql_blocks_center_top[file] Parameter Traversal Local File Inclusion
12801| [53521] blog+ includes/block_left.php row_mysql_blocks_left[file] Parameter Traversal Local File Inclusion
12802| [53520] blog+ includes/block_right.php row_mysql_blocks_right[file] Parameter Traversal Local File Inclusion
12803| [53519] blog+ includes/window_down.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
12804| [53366] GEDCOM_TO_MYSQL php/info.php Multiple Parameter XSS
12805| [53365] GEDCOM_TO_MYSQL php/index.php nom_branche Parameter XSS
12806| [53364] GEDCOM_TO_MYSQL php/prenom.php Multiple Parameter XSS
12807| [53360] Blogplus includes/window_top.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
12808| [53359] Blogplus includes/window_down.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
12809| [53358] Blogplus includes/block_right.php row_mysql_blocks_right[file] Parameter Traversal Local File Inclusion
12810| [53357] Blogplus includes/block_left.php row_mysql_blocks_left[file] Parameter Traversal Local File Inclusion
12811| [53356] Blogplus block_center_top.php row_mysql_blocks_center_top[file] Parameter Traversal Local File Inclusion
12812| [53355] Blogplus includes/block_center_down.php row_mysql_blocks_center_down[file] Parameter Traversal Local File Inclusion
12813| [53110] XOOPS Cube Legacy ErrorHandler::show() Function MySQL Error Message XSS
12814| [52729] Asterisk-addon cdr_addon_mysql.c Call Detail Record SQL Injection
12815| [52728] Tribox cdr_addon_mysql.c Call Detail Record XSS
12816| [52727] FreePBX cdr_addon_mysql.c Call Detail Record XSS
12817| [52726] Areski cdr_addon_mysql.c Call Detail Record XSS
12818| [52464] MySQL charset Column Truncation Weakness
12819| [52453] MySQL sql/item_xmlfunc.cc ExtractValue() / UpdateXML() Functions Scalar XPath DoS
12820| [52378] Cisco ANM MySQL root Account Default Password
12821| [52264] Broadcast Machine MySQLController.php controllers/baseDir Parameter Remote File Inclusion
12822| [51923] Apache HTTP Server mod-auth-mysql Module mod_auth_mysql.c Multibyte Character Encoding SQL Injection
12823| [51171] MySQL InnoDB convert_search_mode_to_innobase Function DoS
12824| [50892] MySQL Calendar index.php username Parameter SQL Injection
12825| [50827] Nodstrum MySQL Calendar nodstrumCalendarV2 Cookie Manipulation Admin Authentication Bypass
12826| [49875] PromoteWeb MySQL go.php id Parameter SQL Injection
12827| [48710] MySQL Command Line Client HTML Output XSS
12828| [48709] MySQL Quick Admin actions.php lang Parameter Traversal Local File Inclusion
12829| [48708] MySQL Quick Admin index.php language Cookie Traversal Local File Inclusion
12830| [48021] MySQL Empty Bit-String Literal Token SQL Statement DoS
12831| [47789] mysql-lists Unspecified XSS
12832| [47394] Keld PHP-MySQL News Script login.php username Parameter SQL Injection
12833| [45073] MySQLDumper Extension for TYPO3 Unspecified Authentication Bypass
12834| [44937] MySQL MyISAM Table CREATE TABLE Privilege Check Bypass
12835| [44138] Debian GNU/Linux libdspam7-drv-mysql Cron MySQL dspam Database Password Local Disclosure
12836| [44071] Phorum /include/db/mysql.php Unspecified Search SQL Injection
12837| [43180] MySQL sql_select.cc INFORMATION_SCHEMA Table Crafted Query Remote DoS
12838| [43179] MySQL Server BINLOG Statement Rights Checking Failure
12839| [42610] MySQL DEFINER View Value Crafted Statements Remote Privilege Escalation
12840| [42609] MySQL Federated Engine SHOW TABLE STATUS Query Remote DoS
12841| [42608] MySQL RENAME TABLE Symlink System Table Overwrite
12842| [42607] MySQL Multiple table-level DIRECTORY Remote Privilege Escalation
12843| [42460] MySQLDumper HTTP POST Request Remote Authentication Bypass
12844| [42423] AdventNet EventLog Analyzer MySQL Installation Default root Account
12845| [41861] Bacula make_catalog_backup Function MySQL Director Password Cleartext Disclosure
12846| [40232] PHP MySQL Banner Exchange inc/lib.inc Direct Request Database Disclosure
12847| [40188] Password Manager Pro (PMP) mysql Unspecified Remote Command Injection
12848| [39279] PHP mysql_error() Function XSS
12849| [39145] aurora framework db_mysql.lib pack_var() value Parameter SQL Injection
12850| [38567] NetClassifieds Mysql_db.php Halt_On_Error Setting Error Message Path Disclosure
12851| [38112] Excel Parser Pro sample/xls2mysql parser_path Parameter Remote File Inclusion
12852| [37880] Asterisk-Addons source/destination Numbers cdr_addon_mysql Module SQL Injection
12853| [37784] PHP MySQL Extension Multiple Function Security Restriction Bypass
12854| [37783] MySQL Community Server CREATE TABLE LIKE Table Structure Disclosure
12855| [37782] MySQL Community Server External Table View Privilege Escalation
12856| [37781] MySQL ALTER TABLE Information Disclosure
12857| [37539] GPL PHP Board db.mysql.inc.php root_path Parameter Remote File Inclusion
12858| [37195] Eve-Nuke Module for PHP-Nuke db/mysql.php phpbb_root_path
12859| [37015] paBugs class.mysql.php path_to_bt_dir Parameter Remote File Inclusion
12860| [36868] PHP MySQLi Extension LOCAL INFILE Operation Security Restriction Bypass
12861| [36867] PHP MySQL Extension LOCAL INFILE Operation Security Restriction Bypass
12862| [36771] InterWorx-CP SiteWorx mysql.php PATH_INFO Parameter XSS
12863| [36757] InterWorx-CP NodeWorx mysql.php PATH_INFO Parameter XSS
12864| [36732] MySQL Community Server Connection Protocol Malformed Password Packet Remote DoS
12865| [36251] Associated Press (AP) Newspower Default MySQL root Password
12866| [35168] Study Planner (Studiewijzer) db/mysql/db.inc.php SPL_CFG[dirroot] Parameter Remote File Inclusion
12867| [35037] Fantastico for cPanel includes/mysqlconfig.php fantasticopath Parameter Traversal Local File Inclusion
12868| [34780] Backup Manager Command Line Cleartext MySQL Password Disclosure
12869| [34766] MySQL RENAME TABLE Statement Arbitrary Table Name Modification
12870| [34765] MySQL mysql_change_db Function THD::db_access Privilege Escalation
12871| [34734] MySQL Crafted IF Clause Divide-by-zero NULL Dereference DoS
12872| [34038] MySQL Commander ressourcen/dbopen.php home Parameter Remote File Inclusion
12873| [33974] MySQL information_schema Table Subselect Single-Row DoS
12874| [33678] MySQLNewsEngine affichearticles.php3 newsenginedir Parameter Remote File Inclusion
12875| [33447] WGS-PPC (PPC Search Engine) config/mysql_config.php INC Parameter Remote File Inclusion
12876| [33372] deV!L'z Clanportal inc/filebrowser/browser.php MySQL Data Disclosure
12877| [33147] ActiveCalendar data/mysqlevents.php css Parameter XSS
12878| [32784] Storystream mysqli.php baseDir Parameter Remote File Inclusion
12879| [32783] Storystream mysql.php baseDir Parameter Remote File Inclusion
12880| [32421] Contenido CMS conlib/db_mysqli.inc Direct Request Path Disclosure
12881| [32272] JevonCMS /phplib/db_mysql.inc Direct Request Path Disclosure
12882| [32171] Blue Magic Board db_mysql_error.php Direct Request Path Disclosure
12883| [32056] BTSaveMySql Direct Request Config File Disclosure
12884| [32044] cPanel WebHost Manager (WHM) scripts/passwdmysql password Parameter XSS
12885| [32024] TikiWiki tiki-wiki_rss.php ver MySQL Credential Disclosure
12886| [31963] Agora MysqlfinderAdmin.php _SESSION[PATH_COMPOSANT] Parameter Remote File Inclusion
12887| [31431] ZoomStats libs/dbmax/mysql.php GLOBALS[lib][db][path] Parameter Remote File Inclusion
12888| [30172] TikiWiki Multiple Script Empty sort_mode Parameter MySQL Authentication Credential Disclosure
12889| [29696] MySQLDumper sql.php db Parameter XSS
12890| [29453] ConPresso CMS db_mysql.inc.php msg Parameter XSS
12891| [29122] cPanel mysqladmin/hooksadmin Unspecified Privilege Escalation
12892| [28296] MySQL Crafted multiupdate / subselects Query Local DoS
12893| [28288] MySQL Instance_options::complete_initialization Function Overflow
12894| [28030] Tutti Nova class.novaRead.mysql.php TNLIB_DIR Parameter Remote File Inclusion
12895| [28029] Tutti Nova class.novaAdmin.mysql.php TNLIB_DIR Parameter Remote File Inclusion
12896| [28028] Tutti Nova class.novaEdit.mysql.php TNLIB_DIR Parameter Remote File Inclusion
12897| [28013] MySQL SUID Routine Miscalculation Arbitrary DML Statement Execution
12898| [28012] MySQL Case Sensitivity Unauthorized Database Creation
12899| [27919] MySQL VIEW Access information_schema.views Information Disclosure
12900| [27703] MySQL MERGE Table Privilege Persistence
12901| [27593] Drupal database.mysqli.inc Multiple Parameter SQL Injection
12902| [27549] Opsware NAS /etc/init.d/mysqll MySQL root Cleartext Password Local Disclosure
12903| [27416] MySQL Server time.cc date_format Function Format String
12904| [27054] MySQL mysqld str_to_date Function NULL Argument DoS
12905| [26923] PHP/MySQL Classifieds (PHP Classifieds) search.php rate Parameter SQL Injection
12906| [26922] PHP/MySQL Classifieds (PHP Classifieds) AddAsset1.php Multiple Field XSS
12907| [26822] Bee-hive Lite include/listall.inc.php mysqlcall Parameter Remote File Inclusion
12908| [26821] Bee-hive Lite conad/include/mysqlCall.inc.php config Parameter Remote File Inclusion
12909| [26820] Bee-hive Lite conad/logout.inc.php mysqlCall Parameter Remote File Inclusion
12910| [26819] Bee-hive Lite conad/login.inc.php mysqlCall Parameter Remote File Inclusion
12911| [26818] Bee-hive Lite conad/checkPasswd.inc.php mysqlCall Parameter Remote File Inclusion
12912| [26817] Bee-hive Lite conad/changeUserDetails.inc.php mysqlCall Parameter Remote File Inclusion
12913| [26816] Bee-hive Lite conad/changeEmail.inc.php mysqlCall Parameter Remote File Inclusion
12914| [26125] Open Searchable Image Catalogue core.php do_mysql_query Function Error Message XSS
12915| [26123] Open Searchable Image Catalogue core.php do_mysql_query Function SQL Injection
12916| [25987] MySQL Multibyte Encoding SQL Injection Filter Bypass
12917| [25908] Drupal database.mysql.inc Multiple Parameter SQL Injection
12918| [25595] Apple Mac OS X MySQL Manager Blank root Password
12919| [25228] MySQL Crafted COM_TABLE_DUMP Request Arbitrary Memory Disclosure
12920| [25227] MySQL COM_TABLE_DUMP Packet Overflow
12921| [25226] MySQL Malformed Login Packet Remote Memory Disclosure
12922| [24245] Cholod Mysql Based Message Board Unspecified XSS
12923| [24244] Cholod Mysql Based Message Board mb.cgi showmessage Action SQL Injection
12924| [23963] WoltLab Burning Board class_db_mysql.php SQL Error Message XSS
12925| [23915] Netcool/NeuSecure MySQL Database Connection Restriction Bypass
12926| [23611] Aztek Forum index.php msg Variable Forced MySQL Error Information Disclosure
12927| [23526] MySQL Query NULL Charcter Logging Bypass
12928| [23157] PHP/MYSQL Timesheet changehrs.php Multiple Parameter SQL Injection
12929| [23156] PHP/MYSQL Timesheet index.php Multiple Parameter SQL Injection
12930| [22995] PAM-MySQL Authentication pam_get_item() Function Unspecified Privilege Escalation
12931| [22994] PAM-MySQL SQL Logging Facility Segfault DoS
12932| [22485] Recruitment Software admin/site.xml MySQL Authentication Credential Disclosure
12933| [22479] PHP mysqli Extension Error Message Format String
12934| [22232] PHP Pipe Variable mysql_connect() Function Overflow
12935| [21685] MySQL Auction Search Module keyword XSS
12936| [20698] Campsite notifyendsubs Cron MySQL Password Cleartext Remote Disclosure
12937| [20145] Proofpoint Protection Server Embedded MySQL Server Unpassworded root Account
12938| [19457] aMember Pro mysql.inc.php Remote File Inclusion
12939| [19377] MAXdev MD-Pro /MySQL_Tools/admin.php Path Disclosure
12940| [18899] MySQL UDF Library Arbitrary Function Load Privilege Escalation
12941| [18898] MySQL UDF LoadLibraryEx Function Nonexistent Library Load DoS
12942| [18897] MySQL on Windows UDF Create Function Traversal Privilege Escalation
12943| [18896] MySQL User-Defined Function init_syms() Function Overflow
12944| [18895] MySQL libmysqlclient.so host Parameter Remote Overflow
12945| [18894] MySQL drop database Request Remote Overflow
12946| [18622] FunkBoard mysql_install.php Email Field Arbitrary PHP Code Injection
12947| [18620] FunkBoard mysql_install.php Admin/Database Password Manipulation
12948| [18406] MySQL Eventum releases.php SQL Injection
12949| [18405] MySQL Eventum custom_fields_graph.php SQL Injection
12950| [18404] MySQL Eventum custom_fields.php SQL Injection
12951| [18403] MySQL Eventum login.php email Parameter SQL Injection Authentication Bypass
12952| [18402] MySQL Eventum get_jsrs_data.php F Parameter XSS
12953| [18401] MySQL Eventum list.php release Parameter XSS
12954| [18400] MySQL Eventum view.php id Parameter XSS
12955| [18173] MySQL on Windows USE Command MS-DOS Device Name DoS
12956| [17801] Bugzilla MySQL Replication Race Condition Information Disclosure
12957| [17223] xMySQLadmin Symlink Arbitrary File Deletion
12958| [16727] MySQL Nonexistent '--user' Error Incorrect Privilege Database Invocation
12959| [16689] MySQL mysql_install_db Symlink Arbitrary File Overwrite
12960| [16056] Plans Unspecified mySQL Remote Password Disclosure
12961| [15993] MySQL MaxDB Webtool Remote getIfHeader() WebDAV Function Remote Overflow
12962| [15817] MySQL MaxDB Web Tool getLockTokenHeader() Function Remote Overflow
12963| [15816] MySQL MaxDB Web Administration Service Malformed GET Request Overflow
12964| [15451] paNews auth.php mysql_prefix Parameter SQL Injection
12965| [14748] MySQL MS-DOS Device Names Request DoS
12966| [14678] MySQL CREATE FUNCTION Arbitrary libc Code Execution
12967| [14677] MySQL CREATE FUNCTION mysql.func Table Arbitrary Library Injection
12968| [14676] MySQL CREATE TEMPORARY TABLE Symlink Privilege Escalation
12969| [14386] phpMyAdmin mysqli.dbi.lib.php Path Disclosure
12970| [14052] Symantec Brightmail AntiSpam Multiple Default MySQL Accounts
12971| [13086] MySQL MaxDB Web Agent Malformed HTTP Header DoS
12972| [13085] MySQL MaxDB Web Agent WebDAV sapdbwa_GetUserData() Function Remote DoS
12973| [13013] MySQL mysqlaccess.sh Symlink Arbitrary File Manipulation
12974| [12919] MySQL MaxDB WebAgent websql Remote Overflow
12975| [12779] MySQL User Defined Function Privilege Escalation
12976| [12609] MySQL Eventum projects.php Multiple Parameter XSS
12977| [12608] MySQL Eventum preferences.php Multiple Parameter XSS
12978| [12607] MySQL Eventum forgot_password.php email Parameter XSS
12979| [12606] MySQL Eventum index.php email Parameter XSS
12980| [12605] MySQL Eventum Default Vendor Account
12981| [12275] MySQL MaxDB Web Tools wahttp Nonexistent File Request DoS
12982| [12274] MySQL MaxDB Web Tools WebDAV Handler Remote Overflow
12983| [11689] Roxen Web Server MySQL Socket Permission Weakness
12984| [10985] MySQL MATCH..AGAINST Query DoS
12985| [10959] MySQL GRANT ALL ON Privilege Escalation
12986| [10660] MySQL ALTER TABLE/RENAME Forces Old Permission Checks
12987| [10659] MySQL ALTER MERGE Tables to Change the UNION DoS
12988| [10658] MySQL mysql_real_connect() Function Remote Overflow
12989| [10532] MySQL MaxDB webdbm Server Field DoS
12990| [10491] AWS MySQLguest AWSguest.php Script Insertion
12991| [10244] MySQL libmysqlclient Prepared Statements API Overflow
12992| [10226] MySQLGuest AWSguest.php Multiple Field XSS
12993| [9912] PHP safe_mode MySQL Database Access Restriction Bypass
12994| [9911] Inter7 vpopmail MySQL Module Authentication Credential Disclosure
12995| [9910] MySQL mysql_change_user() Double-free Memory Pointer DoS
12996| [9909] MySQL datadir/my.cnf Modification Privilege Escalation
12997| [9908] MySQL my.ini Initialization File datadir Parameter Overflow
12998| [9907] MySQL SELECT Statement String Handling Overflow
12999| [9906] MySQL GRANT Privilege Arbitrary Password Modification
13000| [9509] teapop MySQL Authentication Module SQL Injection
13001| [9018] MySQL Backup Pro getbackup() Method Unspecified Issue
13002| [9015] MySQL mysqlhotcopy Insecure Temporary File Creation
13003| [8997] Cacti config.php MySQL Authentication Credential Cleartext Disclosure
13004| [8979] MySQL SHOW GRANTS Encrypted Password Disclosure
13005| [8889] MySQL COM_TABLE_DUMP Package Negative Integer DoS
13006| [8888] MySQL COM_CHANGE_USER Command Long Repsonse Overflow
13007| [8887] MySQL COM_CHANGE_USER Command One Character Password Brute Force
13008| [8886] MySQL libmysqlclient Library read_one_row Overflow
13009| [8885] MySQL libmysqlclient Library read_rows Overflow
13010| [7476] MySQL Protocol 4.1 Authentication Scramble String Overflow
13011| [7475] MySQL Zero-length Scrambled String Crafted Packet Authentication Bypass
13012| [7245] MySQL Pluggable Authentication Module (pam_mysql) Password Disclosure
13013| [7128] MySQL show database Database Name Exposure
13014| [6716] MySQL Database Engine Weak Authentication Information Disclosure
13015| [6605] MySQL mysqld Readable Log File Information Disclosure
13016| [6443] PowerPhlogger db_dump.php View Arbitrary mySQL Dump
13017| [6421] MySQL mysqld_multi Symlink Arbitrary File Overwrite
13018| [6420] MySQL mysqlbug Symlink Arbitrary File Overwrite
13019| [2537] MySQL sql_acl.cc get_salt_from_password Function Password Handling Remote Overflow
13020| [2144] WinMySQLadmin my.ini Cleartext Password Disclosure
13021| [653] PCCS-Linux MySQL Database Admin Tool Authentication Credential Disclosure
13022| [520] MySQL Database Name Traversal Arbitrary File Modification
13023| [380] MySQL Server on Windows Default Null Root Password
13024| [261] MySQL Short Check String Authentication Bypass
13025|_
130261 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
13027SF-Port80-TCP:V=7.80%I=7%D=3/19%Time=5E73A581%P=x86_64-pc-linux-gnu%r(GetR
13028SF:equest,78,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
13029SF:ps://undefined/\r\nDate:\x20Thu,\x2019\x20Mar\x202020\x2017:01:47\x20GM
13030SF:T\r\nConnection:\x20close\r\n\r\n")%r(HTTPOptions,78,"HTTP/1\.1\x20301\
13031SF:x20Moved\x20Permanently\r\nLocation:\x20https://undefined/\r\nDate:\x20
13032SF:Thu,\x2019\x20Mar\x202020\x2017:01:48\x20GMT\r\nConnection:\x20close\r\
13033SF:n\r\n")%r(RTSPRequest,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnect
13034SF:ion:\x20close\r\n\r\n")%r(X11Probe,2F,"HTTP/1\.1\x20400\x20Bad\x20Reque
13035SF:st\r\nConnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9B,"HTTP/1\.1\
13036SF:x20301\x20Moved\x20Permanently\r\nLocation:\x20https://undefined/nice%2
13037SF:0ports%2C/Tri%6Eity\.txt%2ebak\r\nDate:\x20Thu,\x2019\x20Mar\x202020\x2
13038SF:017:01:50\x20GMT\r\nConnection:\x20close\r\n\r\n")%r(RPCCheck,2F,"HTTP/
13039SF:1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(DNSVe
13040SF:rsionBindReqTCP,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x
13041SF:20close\r\n\r\n")%r(DNSStatusRequestTCP,2F,"HTTP/1\.1\x20400\x20Bad\x20
13042SF:Request\r\nConnection:\x20close\r\n\r\n")%r(Help,2F,"HTTP/1\.1\x20400\x
13043SF:20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SSLSessionReq,2F,"
13044SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(
13045SF:TerminalServerCookie,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnecti
13046SF:on:\x20close\r\n\r\n")%r(TLSSessionReq,2F,"HTTP/1\.1\x20400\x20Bad\x20R
13047SF:equest\r\nConnection:\x20close\r\n\r\n")%r(Kerberos,2F,"HTTP/1\.1\x2040
13048SF:0\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SMBProgNeg,2F,"
13049SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(
13050SF:LPDString,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20clos
13051SF:e\r\n\r\n")%r(LDAPSearchReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nC
13052SF:onnection:\x20close\r\n\r\n")%r(LDAPBindReq,2F,"HTTP/1\.1\x20400\x20Bad
13053SF:\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SIPOptions,2F,"HTTP/1\.
13054SF:1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(LANDesk-
13055SF:RC,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r
13056SF:\n")%r(TerminalServer,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnect
13057SF:ion:\x20close\r\n\r\n");
13058##################################################################################################################################
13059 Anonymous JTSEC #OpChili Full Recon #72